February 2018
Intermediate to advanced
396 pages
9h 38m
English
To get the most from this book, readers should have some technical information security experience and be familiar with common administrative tools in Windows and Linux. Readers should read this book actively; in other words, after being exposed to new information or tools, it is highly recommended to practice and search for more scenarios and capabilities.
Read the book with a goal in mind and try to use it or a part of it as an action plan toward making your infrastructure more secure.
The following are the requirements:
Read now
Unlock full access