Anbieter: World of Books (was SecondSale), Montgomery, IL, USA
Zustand: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Anbieter: The Happy Book Stack, Murfreesboro, TN, USA
Zustand: good. Book may have some writing and or underlining inside, and is in overall good condition. Cover may have some cosmetic wear. Book has dust jacket if applicable.
Anbieter: Bookmans, Tucson, AZ, USA
paperback. Zustand: Good. Satisfaction 100% guaranteed.
Anbieter: HPB-Red, Dallas, TX, USA
Paperback. Zustand: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Anbieter: Textbooks_Source, Columbia, MO, USA
Erstausgabe
paperback. Zustand: New. 1st Edition. Ships in a BOX from Central Missouri! UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes).
Anbieter: The Maryland Book Bank, Baltimore, MD, USA
Erstausgabe
paperback. Zustand: Very Good. 1st Edition. Used - Very Good.
Anbieter: GoldBooks, Denver, CO, USA
Paperback. Zustand: new. New Copy. Customer Service Guaranteed.
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: New.
Anbieter: BargainBookStores, Grand Rapids, MI, USA
Paperback or Softback. Zustand: New. Cybersecurity Ops with Bash: Attack, Defend, and Analyze from the Command Line. Book.
Anbieter: Lakeside Books, Benton Harbor, MI, USA
Zustand: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
Paperback. Zustand: New. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O'Reilly), provide insight into command line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into every version of Linux to enable offensive operations. With this book, security practitioners, administrators, and students will learn how to: Collect and analyze data, including system logs Search for and through files Detect network and host changes Develop a remote access toolkit Format output for reporting Develop scripts to automate tasks.
Anbieter: GreatBookPrices, Columbia, MD, USA
Zustand: As New. Unread book in perfect condition.
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
EUR 42,70
Anzahl: 4 verfügbar
In den WarenkorbPAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Sprache: Englisch
Verlag: O'Reilly Media, Sebastopol, 2019
ISBN 10: 1492041319 ISBN 13: 9781492041313
Anbieter: Grand Eagle Retail, Bensenville, IL, USA
Paperback. Zustand: new. Paperback. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O'Reilly), provide insight into command line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into every version of Linux to enable offensive operations. With this book, security practitioners, administrators, and students will learn how to: Collect and analyze data, including system logs Search for and through files Detect network and host changes Develop a remote access toolkit Format output for reporting Develop scripts to automate tasks" This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
EUR 52,31
Anzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O'Reilly), provide insight into command line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into every version of Linux to enable offensive operations. With this book, security practitioners, administrators, and students will learn how to: Collect and analyze data, including system logs Search for and through files Detect network and host changes Develop a remote access toolkit Format output for reporting Develop scripts to automate tasks.
Anbieter: Brook Bookstore On Demand, Napoli, NA, Italien
Zustand: new.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 42,69
Anzahl: 8 verfügbar
In den WarenkorbZustand: New.
Zustand: NEW.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 49,61
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Chiron Media, Wallingford, Vereinigtes Königreich
EUR 46,20
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: New.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 49,71
Anzahl: 8 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: THE SAINT BOOKSTORE, Southport, Vereinigtes Königreich
EUR 51,84
Anzahl: 4 verfügbar
In den WarenkorbPaperback / softback. Zustand: New. New copy - Usually dispatched within 4 working days.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 69,54
Anzahl: 3 verfügbar
In den WarenkorbZustand: New. pp. 306.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 63,78
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 281 pages. 9.25x7.00x0.75 inches. In Stock.
Anbieter: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irland
Zustand: New. 2019. Paperback. . . . . .
Anbieter: Books Puddle, New York, NY, USA
Zustand: New. pp. 306.
EUR 43,45
Anzahl: 1 verfügbar
In den WarenkorbZustand: NEW.
EUR 46,35
Anzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O'Reilly), provide insight into command line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into every version of Linux to enable offensive operations. With this book, security practitioners, administrators, and students will learn how to: Collect and analyze data, including system logs Search for and through files Detect network and host changes Develop a remote access toolkit Format output for reporting Develop scripts to automate tasks.
Anbieter: Kennys Bookstore, Olney, MD, USA
Zustand: New. 2019. Paperback. . . . . . Books ship from the US and Ireland.