Bookshelf
-
How to handle social engineering penetration testing results
In the wake of conducting social engineering penetration testing, companies need to have a plan ready to prevent or minimize phishing, vishing and other attacks. Continue Reading
-
How to ethically conduct pen testing for social engineering
Author Joe Gray explores his interest in pen testing for social engineering, what it means to be an ethical hacker and how to get started in the career. Continue Reading
-
Inept cybersecurity education and training feed into skills gap
Learn why former infosec instructor and author of 'How Cybersecurity Really Works' advocates for changes to security education and training to alleviate the industry skills gap. Continue Reading
-
Network reconnaissance techniques for beginners
In this excerpt of 'How Cybersecurity Really Works,' author Sam Grubb breaks down common network reconnaissance techniques used by adversaries to attack wired networks. Continue Reading
-
An introduction to Go network programming
This chapter excerpt from 'Network Programming with Go' dives into logging and metrics, while also providing Go code examples and best practices. Continue Reading
-
Best practices and strategies for logging in Go
Author Adam Woodbeck discusses how network teams can use the Go programming language for logging and metrics. One tip: Log prudently, and use metrics generously. Continue Reading
-
Learn Docker best practices with this interactive book
The author of The Docker Workshop, Vincent Sesto, discusses Docker's ingenuity and gives tips to IT admins on the leading container creation technology in this Q&A. Continue Reading
-
A glimpse into Python network automation and APIs
This chapter excerpt from 'Mastering Python Networking' dives into the importance of APIs and network state when working with Python network automation and intent-based networking. Continue Reading
-
Advice on intent-based networking and Python automation
In his book, 'Mastering Python Networking,' Eric Chou provides network practitioners with the concepts they need to understand APIs, intent-based networking and automation. Continue Reading
-
Learn how to mitigate container security issues
The more companies embrace application containerization, the more they need to know about container security issues and attack prevention methods. Continue Reading
-
Adopting containers and preventing container security risks
When it comes to container security risks, organizations often worry about container escapes, but as expert Liz Rice explains, they should focus on prevention and patching. Continue Reading
-
Applying web application reconnaissance to offensive hacking
Learn how to apply web application reconnaissance fundamentals to improve both offensive and defensive hacking skills in an excerpt of 'Web Application Security' by Andrew Hoffman. Continue Reading
-
Collaboration is key to a secure web application architecture
Author Andrew Hoffman explains the importance of a secure web application architecture and how to achieve it through collaboration between software and security engineers. Continue Reading
-
Tips to prepare for Google Cloud Architect certification
Author of 'Google Cloud Certified Professional Cloud Architect All-in-One Exam Guide' Iman Ghanizada explains how to approach the cloud architect certification and role in this Q&A. Continue Reading
-
Ready to be a GCP architect? Try this quiz and see
This 10-question quiz, drawn from a new GCP certified professional cloud architect prep guide, helps identify your strengths and weaknesses to improve your odds of passing the exam. Continue Reading
-
Sample CCISO exam questions on security project management
This excerpt of 'CCISO Certified Chief Information Security Officer All-In-One Exam Guide' explains security project management fundamentals and provides practice CCISO exam questions. Continue Reading
-
CCISO exam guide authors discuss the changing CISO role
Learn more about EC-Council's Certified CISO exam and how the certification helps CISOs at any organization manage successful infosec programs and a changing threat landscape. Continue Reading
-
Advice on how to prepare for the CompTIA Security+ exam
The CompTIA Security+ certification is a smart starting point for cybersecurity career hopefuls. Learn how to prepare for the exam, what to expect post-certification and more. Continue Reading
-
Sample CompTIA Security+ exam questions and answers
The CompTIA Security+ exam covers a wide swath of topics, from threats to compliance to architecture. Test what you know about malware with these sample test questions. Continue Reading
-
How cloud-native networking will transform infrastructure
Cloud-native networking aims to prioritize business needs and enable networks to become more efficient. Learn more about the potential benefits and challenges in this expert Q&A. Continue Reading
-
The role of network observability in distributed systems
Network observability sounds like a new term for an existing practice, but is that the case? This chapter excerpt lays out what observability is and everything you need to know. Continue Reading
-
How to set up Palo Alto security profiles
Learning how to build and implement security profiles and policies can help novice admins make sure they use Palo Alto Networks firewalls effectively to protect their network. Continue Reading
-
Author's advice on Palo Alto firewall, getting started
Interfaces, licenses, policies -- getting started with a Palo Alto Networks firewall can be confusing. Here, the author of 'Mastering Palo Alto Networks' offers his advice. Continue Reading
-
How to measure the success of agile transformation
In his new book 'Sooner, Safer, Happier,' Jonathan Smart dives into the ways in which organizations can achieve better outcomes through business agility. Continue Reading
-
'Practical Microservices' speaks the language of web developers
In his book, 'Practical Microservices,' Ethan Garofolo introduces web developers to the coding principles that form the foundation for microservices-based applications. Continue Reading
-
Test your knowledge of socket programming in Python
In this quiz, review the fundamentals of socket programming in Python, including port scanning, TCP and UDP, and how to enable different methods from the socket module. Continue Reading
-
Explore this ultimate socket programming guide for beginners
In this socket programming guide preview, learn how sockets work, the role of socket programming in enterprise networks and the ins and outs of socket programming in Python. Continue Reading
-
How to get started with socket programming for beginners
To understand socket programming for beginners, basic network and security concepts are critical -- and having Python skills won't hurt, either. Learn more in this expert Q&A. Continue Reading
-
Cutting through the fear of how AI will affect jobs through automation
Dive into Steven Shwartz's recent book, 'Evil Robots, Killer Computers, and Other Myths,' with a chapter excerpt on employment and the future of work. Continue Reading
-
Malware researcher speculates on the future of ransomware
Abhijit Mohanta, author of 'Preventing Ransomware,' opines on the future of ransomware and discusses why this attack is favored among cybercriminals. Continue Reading
-
AWS SageMaker training, making machine learning accessible
Making machine learning more accessible and helping developers with AWS SageMaker training is at the core of Julien Simon's book, 'Learn Amazon SageMaker.' Continue Reading
-
Overcome common IoT edge computing architecture issues
IoT and edge computing connect the previously unconnected world, which comes with its share of difficulties that development teams and architects must not underestimate. Continue Reading
-
Get started with network penetration testing for beginners
Authentication, patching and configuration are among the most common vulnerabilities found through network penetration testing. Learn more in this free chapter excerpt. Continue Reading
-
Advice on how to learn network penetration testing skills
As beginners learn network penetration testing skills, they should remember these expert tips: Pay attention to what the client wants, and stick to offense, not defense. Continue Reading
-
Why developers should consider automated threat modeling
Traditional threat modeling is hard. Can automated threat modeling make development and security teams' lives easier? Continue Reading
-
Introducing development teams to threat modeling in SDLC
Enterprises can improve their security posture by educating development teams on threat modeling so they can work alongside security teams and everyone knows a common language. Continue Reading
-
Python code formatting: Tools you need and why it matters
Computers don't care about the style of your code, so why should you? See what Al Sweigart has to say about code formatting, and get a sneak peek at his new book. Continue Reading
-
Why your data story matters and how to tell it
Data storytelling isn't just for business analysts. Find out how to build a data management story and why you need to have one in the first place. Continue Reading
-
Investigate IoT and edge computing nuances for architects
Author of 'IoT and Edge Computing for Architects' Perry Lea shares his expert advice on how to design interconnected architecture that addresses the challenges of both technologies. Continue Reading
-
Cloud security policy configuration in AWS, Azure and GCP
Explore cloud security policy configurations in AWS, Azure and GCP using native security tools in this excerpt of 'Multi-Cloud Architecture and Governance' by Jeroen Mulder. Continue Reading
-
Secure multi-cloud with architecture and governance focus
Certified enterprise and security architect Jeroen Mulder explains why multi-cloud security architecture planning should be informed by the business and customer perspectives. Continue Reading
-
How to understand networking and the internet for beginners
For beginners, learning how networking and the internet truly work can feel overwhelming. One expert encourages patience, practice and assurance that networking isn't unknowable. Continue Reading
-
How to learn networking fundamentals, from a software pro
Networking basics include protocols, network layers and processes that must happen for computers to communicate across a network. Here's how to start learning these basics. Continue Reading
-
Make the right assertions in iOS unit tests for proper dev
Unit tests play an integral role in mobile app development. Here's an excerpt from 'iOS Unit Testing by Example' about why fast feedback and control can help testers. Continue Reading
-
What CIOs need to know about the future of hyperautomation
Appian founder and CEO Matt Calkins dives into the benefits of hyperautomation and how unifying technologies will ultimately help enterprises achieve success in today's digital age. Continue Reading
-
A look inside the all-in-one HCISPP exam guide
Check out this excerpt from the HCISPP All-in-One Exam Guide to learn more about privacy and security in healthcare, one of the seven domains tested by the official exam. Continue Reading
-
The psychology of UX design: How design affects CX
In her book, '100 Things Every Designer Needs to Know About People, 2nd Edition,' Susan Weinschenk explains how UX design relies on psychology to improve customer experiences. Continue Reading
-
Review 6 phases of incident response for GCIH exam prep
'GCIH GIAC Certified Incident Handler All-in-One Exam Guide' takes a deep dive into the six phases of incident response to help security pros with GCIH exam prep and certification. Continue Reading
-
Preparing for GIAC Certified Incident Handler certification
The author of 'GCIH GIAC Certified Incident Handler All-in-One Exam Guide' shares advice on how to prepare for the exam and why an incident response career can be so rewarding. Continue Reading
-
Insider risk indicators thwart potential threats
By paying attention to risk indicators, enterprises can tell the difference between insider threat and insider risk to prevent falling victim at the hands of one of their own. Continue Reading
-
Insider threat vs. insider risk: What's the difference?
Identifying, managing and mitigating insider threats is far different than protecting against insider risks. Read up on the difference and types of internal risks here. Continue Reading
-
Get started on your HCISPP training with this practice quiz
Are you thinking of taking the HCISPP exam? If so, here's 10 practice questions from Sean P. Murphy's 'HCISPP All-in-One Exam Guide' to help get you started. Continue Reading
-
New data warehouse schema design benefits business users
The Unified Star Schema is a revolution in data warehouse schema design. Learn the benefits of this new architecture and read an excerpt from a new book about it. Continue Reading
-
Evaluating endpoints for an Asterisk-based phone system
Enterprises building an Asterisk-based phone system have three endpoint options. Learn about the advantages and disadvantages of these endpoints in this book excerpt. Continue Reading
-
Top network attacks of 2020 that will influence the decade
You've heard of phishing, ransomware and viruses. Now, keep them in mind because one cybersecurity expert says these threats and more may cause IT headaches for the next decade. Continue Reading
-
Advice for an effective network security strategy
Security audits, evaluations of tools and looking realistically at trending technologies are some ways an organization can ensure its network security is the best it can be. Continue Reading
-
Test your network threats and attacks expertise in this quiz
Network security is an ever-changing subject, but many of its common threats have plagued IT pros for years -- and will likely continue to do so. See what you know in this quiz. Continue Reading
-
How to prepare for the OCI Architect Associate certification
Author of 'Oracle Cloud Infrastructure Architect Associate All-in-One Exam Guide' Roopesh Ramklass shares his expert advice on OCI concepts and certification in this Q&A. Continue Reading
-
How to implement asynchronous replication in Apache Pulsar
David Kjerrumgaard explains how asynchronous replication works in Apache Pulsar for those still learning to use this platform as part of their data backup strategy. Continue Reading
-
Apache Pulsar vs. Kafka and other data processing technologies
David Kjerrumgaard looks at how the distributed messaging platform Apache Pulsar handles storage compared to Apache Kafka and other data processing technologies. Continue Reading
-
How improving your math skills can help in programming
Paul Orland explores how enhancing one's programming skills can be done through studying up on mathematics and better understanding how the two remain linked. Continue Reading
-
Why customer-centric design is crucial for CX
In her book, '100 Things Every Designer Needs to Know About People,' Susan Weinschenk talks about why it is important for companies to know their audience to better design for them. Continue Reading
-
Practice Certified Ethical Hacker exam questions
Preparing for your Certified Ethical Hacker certification? Assess your knowledge of topics on the CEH exam with these practice test questions. Continue Reading
-
Ethical hacker career path advice: Getting started
Matt Walker, author of a Certified Ethical Hacker exam guide and practice exam book, offers advice to career hopefuls on the profession, CEH certification and more. Continue Reading
-
Quiz on MongoDB 4 new features and database updates
Check out this excerpt from the new book Learn MongoDB 4.x from Packt Publishing, then quiz yourself on new updates and features to the database. Continue Reading
-
Learn how to start using Docker on Windows Server 2019
Getting started with Windows containers requires an understanding of basic concepts and how to work with Docker Engine. Orin Thomas' book covers the topics admins need to know. Continue Reading
-
How to pass the AWS Certified Security - Specialty exam
Author of 'AWS Certified Security - Specialty Exam Guide' Stuart Scott shares insights on how to prepare for the exam and reap the professional benefits of certification. Continue Reading
-
Practice AWS Certified Security - Specialty exam questions
Explore the security and compliance capabilities of the AWS Config service to prepare for the wide-ranging AWS Certified Security - Specialty certification exam. Continue Reading
-
How does bureaucracy affect business? It's complicated
In his new book, 'The (Delicate) Art of Bureaucracy,' Mark Schwartz, enterprise strategist at AWS and former government bureaucrat, reveals how IT leaders can use bureaucracy to their advantage. Continue Reading
-
A look inside the official Cisco DEVASC 200-901 guidebook
In this book excerpt, readers can explore the Cisco DEVASC 200-901 official guide and get a flavor of one of Cisco's newest exams and its blend of networking and software topics. Continue Reading
-
Is Cisco DevNet worth it? Experts say yes, it's the future
Any IT professional who's heard the hype for Cisco's newest certification track may wonder, 'Is Cisco DevNet worth it?' Some experts say it's the future. Find out more in this Q&A. Continue Reading
-
7 practice questions for Cisco 200-901 DevNet Associate exam
Ready for Cisco's introductory DevNet exam, DEVASC 200-901? Start your Cisco DevNet Associate training with this practice quiz directly from the official exam guidebook. Continue Reading
-
Why understanding data structures is so important to coders
Jay Wengrow talks about how his new book on data structures and algorithms and considerations for making your choices as efficient as possible. Continue Reading
-
How to use Slack and Fluentd to demonstrate social output
Phil Wilkins provides step-by-step instructions on how DevOps teams can enable Slack to capture log events from the open source data collection tool Fluentd. Continue Reading
-
A basic design pattern for image recognition
Learn how a design pattern based on convolutional neural networks can be adapted to create a visual graphics generator model for image recognition. Continue Reading
-
Brain teasers and other fun tips for learning Python
Learn about some interesting ways Python coders can grow their skills in the language and the importance of connecting and learning from others in the community. Continue Reading
-
How listening to the voice of the customer benefits businesses
Karen Mangia's book, 'Listen Up! How to Tune In to Customers and Turn Down the Noise' talks about the importance of listening to the voice of the customer in the business world. Continue Reading
-
Get greater protection with IoT security advances in authentication
In this book excerpt, discover why and how authentication offers one of the most crucial security measures any engineer must plan in an IoT deployment. Continue Reading
-
The role of SD-WAN templates before and during deployment
SD-WAN deployments require knowledge of network design and trust in software to take over some network maintenance duties. This is where SD-WAN templates come into play. Continue Reading
-
Learn to onboard, provision devices in Cisco's SD-WAN book
Here's a look inside Cisco's SD-WAN book, which details design and deployment for network teams looking to deploy SD-WAN and insights for SD-WAN certification hopefuls. Continue Reading
-
6 practice questions for SD-WAN certification training
Before you start SD-WAN certification training, try this quiz from Cisco's official SD-WAN guidebook, which covers onboarding and provisioning devices, as well as SD-WAN templates. Continue Reading
-
Zero-trust network policies should reflect varied threats
Role-based access systems create enormous pools of responsibility for administrators. Explore how to eliminate these insecure pools of trust with zero-trust network policies. Continue Reading
-
Zero-trust methodology's popularity a double-edged sword
The authors of 'Zero Trust Networks' discuss how the zero-trust methodology's popularity produces both vendor hype and renewed attention to critical areas of security weakness. Continue Reading
-
How to implement Scrum the right way
Not sure where to start with Scrum? Check out a book that covers Scrum implementation from pre-development work through retrospectives, and details the frameworks to scale Scrum. Continue Reading
-
The Ghidra Book interview with co-author Kara Nance
Ghidra has had a huge impact on the reverse-engineering community. Kara Nance, co-author of The Ghidra Book, discusses this impact as the open source tool has evolved. Continue Reading
-
Book details API design best practices
APIs are designed for people you've never met to solve problems you didn't know existed. With that in mind, how do you design and build them well? Continue Reading
-
Synthetic data in healthcare advances patient analytics
Learn how synthetic data in healthcare can be beneficial across the board. Plus, get a sneak peek at a new book on synthetic data generation from O'Reilly Media. Continue Reading
-
Explore self-sovereign identity use cases and benefits
The future of digital identity may look a lot like how we identify ourselves in real life. Learn more about self-sovereign identity use cases and features in this excerpt. Continue Reading
-
How self-sovereign identity principles suit the modern world
There are several core self-sovereign identity principles to consider before the concept can benefit the enterprise. Learn about the implications of SSI advancements in this Q&A. Continue Reading
-
Integrating AI and blockchain technologies in the enterprise
In his new book, Ganesh Prasad Kumble explores the impact of AI on blockchain applications and the value the combination of the two technologies can bring to the enterprise. Continue Reading
-
An inside look at the CCSP cloud security cert
Get insights into the Certified Cloud Security Professional cert, cloud infrastructure and platform benefits and risks, and more from the author of a CCSP exam guide. Continue Reading
-
Telecommunications book highlights spectrum, fiber cabling
5G touts faster download speeds and new application types, but other major 5G changes will be in spectrum and fixed wireless. Learn more in this telecommunications book excerpt. Continue Reading
-
Multimedia data and 5G drive network transformation
Emerging networking trends and touted innovations always showcase faster speeds and new use cases. Yet, new challenges keep pace, too, such as security and privacy issues. Continue Reading
-
Explore the foundations of artificial neural network modeling
Dive into Giuseppe Bonaccorso's recent book 'Mastering Machine Learning Algorithms' with a chapter excerpt on modeling neural networks. Continue Reading
-
Securing Active Directory also involves good backup practices
The 'Active Directory Administration Cookbook' covers what admins can do in advance to bring the identity and access management platform back online after an attack. Continue Reading
-
CISSP practice exam questions and answers
Test your knowledge and preparedness for the CISSP exam with 16 questions taken directly from the latest 'CISSP All-in-One Exam Guide' from McGraw Hill. Continue Reading
-
'Secure by Design' principles include failures, exceptions
Using design principles with built-in security, along with properly defining exceptions, can help developers not only build safe code, but do so while meeting deadlines. Continue Reading
-
Exception handling best practices call for secure code design
Making software secure by design requires tremendous consideration about how failures are handled. Learn more from these exception handling examples. Continue Reading
-
Hands-on guide to S3 bucket penetration testing
Attention AWS pen testers: The trick to understanding the indicators of AWS S3 bucket vulnerabilities is setting up an insecure bucket. Learn how in this actionable guide. Continue Reading
-
How to handle Amazon S3 bucket pen testing complexity
Security researcher Benjamin Caudill shares details from his book, 'Hands-On AWS Penetration Testing with Kali Linux,' and advice on Amazon S3 bucket pen testing for ethical hackers. Continue Reading