Bookshelf
-
5 cybersecurity personality traits for a successful career
In this excerpt of 'Confident Cyber Security,' author Jessica Barker outlines five cybersecurity personality traits employers look for in job candidates. Continue Reading
-
How to start a career in cybersecurity from the human side
Discover how the co-founder of an infosec consultancy and author of 'Confident Cyber Security' started her career and became a leader in the human nature side of security. Continue Reading
-
How to use Python for privilege escalation in Windows
Penetration testers can use Python to write scripts and services to discover security vulnerabilities. In this walkthrough, learn how to escalate privileges in Windows. Continue Reading
-
Why hackers should learn Python for pen testing
The authors of 'Black Hat Python' explain the importance of learning Python for pen testing, how it helps create scripts to hack networks and endpoints, and more. Continue Reading
-
New Scrum Master guide covers both theory and practice
In his new book, a senior software engineer shares his in-depth hands-on knowledge to both prep readers for cert exams and guide them on the job. Continue Reading
-
Adopt GitOps best practices and tools for your organization
In his book 'Repeatability, Reliability, Scalability through GitOps,' Bryan Feuling provides an in-depth analysis of GitOps to help companies find best practices and tools. Continue Reading
-
How to use Ghidra for malware analysis, reverse-engineering
The Ghidra malware analysis tool helps infosec beginners learn reverse-engineering quickly. Get help setting up a test environment and searching for malware indicators. Continue Reading
-
Get started with the Ghidra reverse-engineering framework
Malware analysts use Ghidra to examine code to better understand how it works. Learn what to expect from the reverse-engineering framework, how to start using it and more. Continue Reading
-
10 CIPP/US practice questions to test your privacy knowledge
Advance your privacy career by becoming a Certified Information Privacy Professional. Use these 10 practice questions from Wiley's IAPP CIPP/US study guide to prepare for the exam. Continue Reading
-
How to prepare for the CIPP/US exam
The co-authors of a CIPP/US study guide offer advice on the IAPP certification, including career benefits, how to prepare and how the U.S. exam differs from other regions' exams. Continue Reading
-
The role of smartNICs in modern enterprise networks
This chapter excerpt from 'Building a Future-Proof Cloud Infrastructure' looks at how smartNICs can support distributed services platforms for both cloud providers and enterprises. Continue Reading
-
How smartNIC architecture supports scalable infrastructure
In this Q&A, author Silvano Gai discusses how smartNICs can benefit enterprises by providing more granular telemetry and supporting distributed cloud infrastructure. Continue Reading
-
Get started programming the internet of things
To build IoT systems, IT pros must understand the complexities of programming IoT, including integration. In this excerpt, discover the first step to design full-stack IoT. Continue Reading
-
How to approach programming IoT for full stack development
Learn what challenges organizations must tackle when developing end-to-end IoT systems from 'Programming the Internet of Things' author Andy King. Continue Reading
-
Learn how to invite external users to Slack workspaces
Bringing external users to Slack offers organizations productivity benefits. Learn how to invite external users to Slack and manage shared channels and workflows. Continue Reading
-
How to choose exactly the right data story for your audience
A data practitioner has two jobs: tell the right data story and in the right way to win over project stakeholders, data expert Larry Burns says in his latest book. Continue Reading
-
Malware analysis for beginners: Getting started
With the cybersecurity industry struggling to fill open positions, now is the time to start in the field. Infosec expert Dylan Barker shares what you should know to be a malware analyst. Continue Reading
-
Top static malware analysis techniques for beginners
Malware will eventually get onto an endpoint, server or network. Using static analysis can help find known malware variants before they cause damage. Continue Reading
-
5 skills supply chain professionals need
As with any job, there are various skills supply chain professionals need to succeed in their chosen field. Here are the five each leader must possess. Continue Reading
-
CompTIA Cloud+ tips to troubleshoot cloud networks
The CompTIA Cloud+ exam covers a range of topics, including how to secure and troubleshoot cloud networks. Some of the first steps: Start simple, and isolate the problem. Continue Reading
-
Explore virtualization study topics for CCNP, CCIE exams
Aspiring CCNPs and CCIEs will need to grasp one of networking's most important topics: virtualization. 'Day 7' from Patrick Gargano's '31 Days' explains the subject in detail. Continue Reading
-
Virtualization concepts to study for CCNP and CCIE exams
In this Q&A, author Patrick Gargano discusses the importance of virtualization in networking and offers studying advice for aspiring CCNPs and CCIEs in preparation for the exams. Continue Reading
-
Bill Inmon's data warehouse approach tackles text analysis
Learn the fine points of a concept at the heart of 'The Textual Warehouse' a new book that aims to help organizations profit through textual analysis. Continue Reading
-
How to prepare for the CompTIA CySA+ exam
The author of the CompTIA CySA+ certification guide offers advice on how to prepare for the exam, discusses the benefits of the cert and more. Continue Reading
-
Sample CompTIA CySA+ test questions with answers
Going for your CompTIA CySA+ certification? Test what you know before taking the exam with these sample test questions on vulnerability assessment output. Continue Reading
-
Keycloak tutorial: How to secure different application types
IT pros and developers can secure applications with the open source IAM tool Keycloak. When you don't need to worry about passwords, it reduces the potential attack surface. Continue Reading
-
Secure applications with Keycloak authentication tool
As we look toward the future of authentication, open source tools, such as Keycloak, provide companies a way to secure applications to its specific needs. Continue Reading
-
5G core network functionality driven by SDN, NFV
To reap the full benefits of 5G, operators are using SDN, NFV and network slicing to build out core network functionality. Continue Reading
-
An introductory overview of 5G network capabilities
In this Q&A, author William Stallings discusses 5G services, such as network slicing and QoS, and other topics covered in his book, '5G Wireless: A Comprehensive Introduction.' Continue Reading
-
Test your knowledge in this 5G QoS quiz
In this quiz, test your knowledge of network slicing, QoS, and other technologies and practices related to 5G networking. Continue Reading
-
The value of PDF data extraction: Sifting for hidden data
During the process of data cleaning, there's a way to extract valuable hidden data. Learn how in this excerpt from 'Cleaning Data for Effective Data Science.' Continue Reading
-
Start artificial intelligence for IoT in bite-size pieces
IoT practitioners must follow clear steps to implement an AI analytics process if they want to create an AI application with IoT that improves their deployment's performance. Continue Reading
-
Develop IoT artificial intelligence holistically to prosper
Author Michael Roshak explores the difficulties of AI design for IoT, the considerations organizations must know about the process and what is exciting about AI and IoT. Continue Reading
-
The benefits of an AI-first strategy
Enterprises should put AI first in their business strategies by constantly collecting and using new data to power AI models, argues startup investor Ash Fontana. Continue Reading
-
Understanding virtual meetings pros and cons
This chapter excerpt from 'Suddenly Virtual' explores the importance of using video for virtual meetings and the challenges of always being on camera. Continue Reading
-
Training is key for effective remote meetings
Authors Karin M. Reed and Joseph A. Allen discuss how to support effective remote meetings. The most important factor for virtual meeting success? Training. Continue Reading
-
Test yourself with this e-learning authentication quizlet
Integrity and authentication are two evergreen security topics. Try this quick quiz from Technic Publication's PebbleU, and see where to focus your continuing education. Continue Reading
-
Common Linux vulnerabilities admins need to detect and fix
Server admins need to prepare for a variety of common Linux vulnerabilities, from software and hardware vulnerabilities to employee-created ones and even digital espionage. Continue Reading
-
How to implement Linux security best practices
When setting up security for a company's infrastructure, admins need to focus on backups, patch management and regular vulnerability scans. Continue Reading
-
12 official practice questions for the CCNA 200-301 exam
These practice questions for CCNA 200-301 lay out what readers need to know about network security and IP routing in the LAN, from 'CCNA 200-301 Official Cert Guide, Volumes 1 and 2.' Continue Reading
-
To master software design patterns, perspective is everything
Elisabeth Robson and Eric Freeman, authors of 'Head First Design Patterns,' outline their quest to teach software design patterns and show developers the right way to learn them. Continue Reading
-
Soft skills key to employability in age of automation
Soft skills will become even more important as automation increases. Learn what top workplace soft skills organizations will need and how to enable training. Continue Reading
-
How to ethically conduct pen testing for social engineering
Author Joe Gray explores his interest in pen testing for social engineering, what it means to be an ethical hacker and how to get started in the career. Continue Reading
-
How to handle social engineering penetration testing results
In the wake of conducting social engineering penetration testing, companies need to have a plan ready to prevent or minimize phishing, vishing and other attacks. Continue Reading
-
Inept cybersecurity education and training feed into skills gap
Learn why former infosec instructor and author of 'How Cybersecurity Really Works' advocates for changes to security education and training to alleviate the industry skills gap. Continue Reading
-
Network reconnaissance techniques for beginners
In this excerpt of 'How Cybersecurity Really Works,' author Sam Grubb breaks down common network reconnaissance techniques used by adversaries to attack wired networks. Continue Reading
-
An introduction to Go network programming
This chapter excerpt from 'Network Programming with Go' dives into logging and metrics, while also providing Go code examples and best practices. Continue Reading
-
Best practices and strategies for logging in Go
Author Adam Woodbeck discusses how network teams can use the Go programming language for logging and metrics. One tip: Log prudently, and use metrics generously. Continue Reading
-
Learn Docker best practices with this interactive book
The author of The Docker Workshop, Vincent Sesto, discusses Docker's ingenuity and gives tips to IT admins on the leading container creation technology in this Q&A. Continue Reading
-
A glimpse into Python network automation and APIs
This chapter excerpt from 'Mastering Python Networking' dives into the importance of APIs and network state when working with Python network automation and intent-based networking. Continue Reading
-
Advice on intent-based networking and Python automation
In his book, 'Mastering Python Networking,' Eric Chou provides network practitioners with the concepts they need to understand APIs, intent-based networking and automation. Continue Reading
-
Learn how to mitigate container security issues
The more companies embrace application containerization, the more they need to know about container security issues and attack prevention methods. Continue Reading
-
Adopting containers and preventing container security risks
When it comes to container security risks, organizations often worry about container escapes, but as expert Liz Rice explains, they should focus on prevention and patching. Continue Reading
-
Applying web application reconnaissance to offensive hacking
Learn how to apply web application reconnaissance fundamentals to improve both offensive and defensive hacking skills in an excerpt of 'Web Application Security' by Andrew Hoffman. Continue Reading
-
Collaboration is key to a secure web application architecture
Author Andrew Hoffman explains the importance of a secure web application architecture and how to achieve it through collaboration between software and security engineers. Continue Reading
-
Tips to prepare for Google Cloud Architect certification
Author of 'Google Cloud Certified Professional Cloud Architect All-in-One Exam Guide' Iman Ghanizada explains how to approach the cloud architect certification and role in this Q&A. Continue Reading
-
Ready to be a GCP architect? Try this quiz and see
This 10-question quiz, drawn from a new GCP certified professional cloud architect prep guide, helps identify your strengths and weaknesses to improve your odds of passing the exam. Continue Reading
-
Sample CCISO exam questions on security project management
This excerpt of 'CCISO Certified Chief Information Security Officer All-In-One Exam Guide' explains security project management fundamentals and provides practice CCISO exam questions. Continue Reading
-
CCISO exam guide authors discuss the changing CISO role
Learn more about EC-Council's Certified CISO exam and how the certification helps CISOs at any organization manage successful infosec programs and a changing threat landscape. Continue Reading
-
Advice on how to prepare for the CompTIA Security+ exam
The CompTIA Security+ certification is a smart starting point for cybersecurity career hopefuls. Learn how to prepare for the exam, what to expect post-certification and more. Continue Reading
-
Sample CompTIA Security+ exam questions and answers
The CompTIA Security+ exam covers a wide swath of topics, from threats to compliance to architecture. Test what you know about malware with these sample test questions. Continue Reading
-
How cloud-native networking will transform infrastructure
Cloud-native networking aims to prioritize business needs and enable networks to become more efficient. Learn more about the potential benefits and challenges in this expert Q&A. Continue Reading
-
The role of network observability in distributed systems
Network observability sounds like a new term for an existing practice, but is that the case? This chapter excerpt lays out what observability is and everything you need to know. Continue Reading
-
How to set up Palo Alto security profiles
Learning how to build and implement security profiles and policies can help novice admins make sure they use Palo Alto Networks firewalls effectively to protect their network. Continue Reading
-
Author's advice on Palo Alto firewall, getting started
Interfaces, licenses, policies -- getting started with a Palo Alto Networks firewall can be confusing. Here, the author of 'Mastering Palo Alto Networks' offers his advice. Continue Reading
-
How to measure the success of agile transformation
In his new book 'Sooner, Safer, Happier,' Jonathan Smart dives into the ways in which organizations can achieve better outcomes through business agility. Continue Reading
-
'Practical Microservices' speaks the language of web developers
In his book, 'Practical Microservices,' Ethan Garofolo introduces web developers to the coding principles that form the foundation for microservices-based applications. Continue Reading
-
Test your knowledge of socket programming in Python
In this quiz, review the fundamentals of socket programming in Python, including port scanning, TCP and UDP, and how to enable different methods from the socket module. Continue Reading
-
How to get started with socket programming for beginners
To understand socket programming for beginners, basic network and security concepts are critical -- and having Python skills won't hurt, either. Learn more in this expert Q&A. Continue Reading
-
Explore this ultimate socket programming guide for beginners
In this socket programming guide preview, learn how sockets work, the role of socket programming in enterprise networks and the ins and outs of socket programming in Python. Continue Reading
-
Cutting through the fear of how AI will affect jobs through automation
Dive into Steven Shwartz's recent book, 'Evil Robots, Killer Computers, and Other Myths,' with a chapter excerpt on employment and the future of work. Continue Reading
-
Malware researcher speculates on the future of ransomware
Abhijit Mohanta, author of 'Preventing Ransomware,' opines on the future of ransomware and discusses why this attack is favored among cybercriminals. Continue Reading
-
AWS SageMaker training, making machine learning accessible
Making machine learning more accessible and helping developers with AWS SageMaker training is at the core of Julien Simon's book, 'Learn Amazon SageMaker.' Continue Reading
-
Overcome common IoT edge computing architecture issues
IoT and edge computing connect the previously unconnected world, which comes with its share of difficulties that development teams and architects must not underestimate. Continue Reading
-
Get started with network penetration testing for beginners
Authentication, patching and configuration are among the most common vulnerabilities found through network penetration testing. Learn more in this free chapter excerpt. Continue Reading
-
Advice on how to learn network penetration testing skills
As beginners learn network penetration testing skills, they should remember these expert tips: Pay attention to what the client wants, and stick to offense, not defense. Continue Reading
-
Why developers should consider automated threat modeling
Traditional threat modeling is hard. Can automated threat modeling make development and security teams' lives easier? Continue Reading
-
Introducing development teams to threat modeling in SDLC
Enterprises can improve their security posture by educating development teams on threat modeling so they can work alongside security teams and everyone knows a common language. Continue Reading
-
Python code formatting: Tools you need and why it matters
Computers don't care about the style of your code, so why should you? See what Al Sweigart has to say about code formatting, and get a sneak peek at his new book. Continue Reading
-
Why your data story matters and how to tell it
Data storytelling isn't just for business analysts. Find out how to build a data management story and why you need to have one in the first place. Continue Reading
-
Investigate IoT and edge computing nuances for architects
Author of 'IoT and Edge Computing for Architects' Perry Lea shares his expert advice on how to design interconnected architecture that addresses the challenges of both technologies. Continue Reading
-
Cloud security policy configuration in AWS, Azure and GCP
Explore cloud security policy configurations in AWS, Azure and GCP using native security tools in this excerpt of 'Multi-Cloud Architecture and Governance' by Jeroen Mulder. Continue Reading
-
Secure multi-cloud with architecture and governance focus
Certified enterprise and security architect Jeroen Mulder explains why multi-cloud security architecture planning should be informed by the business and customer perspectives. Continue Reading
-
How to understand networking and the internet for beginners
For beginners, learning how networking and the internet truly work can feel overwhelming. One expert encourages patience, practice and assurance that networking isn't unknowable. Continue Reading
-
How to learn networking fundamentals, from a software pro
Networking basics include protocols, network layers and processes that must happen for computers to communicate across a network. Here's how to start learning these basics. Continue Reading
-
Make the right assertions in iOS unit tests for proper dev
Unit tests play an integral role in mobile app development. Here's an excerpt from 'iOS Unit Testing by Example' about why fast feedback and control can help testers. Continue Reading
-
What CIOs need to know about the future of hyperautomation
Appian founder and CEO Matt Calkins dives into the benefits of hyperautomation and how unifying technologies will ultimately help enterprises achieve success in today's digital age. Continue Reading
-
The psychology of UX design: How design affects CX
In her book, '100 Things Every Designer Needs to Know About People, 2nd Edition,' Susan Weinschenk explains how UX design relies on psychology to improve customer experiences. Continue Reading
-
Review 6 phases of incident response for GCIH exam prep
'GCIH GIAC Certified Incident Handler All-in-One Exam Guide' takes a deep dive into the six phases of incident response to help security pros with GCIH exam prep and certification. Continue Reading
-
Preparing for GIAC Certified Incident Handler certification
The author of 'GCIH GIAC Certified Incident Handler All-in-One Exam Guide' shares advice on how to prepare for the exam and why an incident response career can be so rewarding. Continue Reading
-
Insider threat vs. insider risk: What's the difference?
Identifying, managing and mitigating insider threats is far different than protecting against insider risks. Read up on the difference and types of internal risks here. Continue Reading
-
Insider risk indicators thwart potential threats
By paying attention to risk indicators, enterprises can tell the difference between insider threat and insider risk to prevent falling victim at the hands of one of their own. Continue Reading
-
Get started on your HCISPP training with this practice quiz
Are you thinking of taking the HCISPP exam? If so, here's 10 practice questions from Sean P. Murphy's 'HCISPP All-in-One Exam Guide' to help get you started. Continue Reading
-
New data warehouse schema design benefits business users
The Unified Star Schema is a revolution in data warehouse schema design. Learn the benefits of this new architecture and read an excerpt from a new book about it. Continue Reading
-
Evaluating endpoints for an Asterisk-based phone system
Enterprises building an Asterisk-based phone system have three endpoint options. Learn about the advantages and disadvantages of these endpoints in this book excerpt. Continue Reading
-
Top network attacks of 2020 that will influence the decade
You've heard of phishing, ransomware and viruses. Now, keep them in mind because one cybersecurity expert says these threats and more may cause IT headaches for the next decade. Continue Reading
-
Advice for an effective network security strategy
Security audits, evaluations of tools and looking realistically at trending technologies are some ways an organization can ensure its network security is the best it can be. Continue Reading
-
Test your network threats and attacks expertise in this quiz
Network security is an ever-changing subject, but many of its common threats have plagued IT pros for years -- and will likely continue to do so. See what you know in this quiz. Continue Reading
-
How to prepare for the OCI Architect Associate certification
Author of 'Oracle Cloud Infrastructure Architect Associate All-in-One Exam Guide' Roopesh Ramklass shares his expert advice on OCI concepts and certification in this Q&A. Continue Reading
-
How to implement asynchronous replication in Apache Pulsar
David Kjerrumgaard explains how asynchronous replication works in Apache Pulsar for those still learning to use this platform as part of their data backup strategy. Continue Reading