article thumbnail

First step to becoming a hacker: Linux!

Network World

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from no starch press was written with people like you in mind. Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed.

Linux 161
article thumbnail

First step to becoming a cybersecurity pro: Linux

Network World

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from No Starch Press was written with people like you in mind. Why Linux is important to security. To read this article in full, please click here

Linux 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Book Review: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

Network World

The overall equation is pretty simple: If you want to understand network traffic, you really should install Wireshark. And, if you really want to use Wireshark effectively, you should consider this book. To read this article in full, please click here

article thumbnail

Book Review: Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

Network World

The overall equation is pretty simple: If you want to understand network traffic, you really should install Wireshark. And, if you really want to use Wireshark effectively, you should consider this book. To read this article in full or to leave a comment, please click here

article thumbnail

Microsegmentation – Secure Your Internal Network

CTOvision

The problem I have with these statements is that every network engineer I know segments their network more than just at the subnet level and their segmentation is not limited to just north-south traffic. Zero trust in my mind doesn’t really mean “trust no one” because then you would have no traffic on your network.

Network 150
article thumbnail

Technology Short Take 178

Scott Lowe

Networking Marc Brooker discusses TCP_NODELAY in modern systems. From my reading of the article, the greatest concern lies with untrusted networks where an attacker could manipulate things in their favor. Join that Wi-Fi network at the coffee shop at your own risk! Gregor Hohpe discusses the economics of writing technical books.

Linux 60
article thumbnail

Next-Generation Network Engineering Skills

Scott Lowe

There’s no question that the networking industry is undergoing significant changes. Sparked in part by software-defined networking (SDN), this sea change now includes an expanded focus on application programming interfaces (APIs), automation frameworks and toolkits, and improved manageability. So what’s in this book?