3 Chapter 5 Figure 5.1 A typical symmetric encryption and decryption processFigure 5.2 The recipient’s public key is used to encrypt and later decrypt a file with the ...Figure 5.3 The sender’s public key is used to encrypt and later decrypt a file with the use...Figure 5.4 The step-by-step representation of a blockchain transaction
4 Chapter 6 Figure 6.1 The successful SSL Report on the TLS configuration for the bootstrap-it.com
webs...Figure 6.2 The conversation between a client browser and a TLS-powered web serverFigure 6.3 Installation instructions on the Certbot websiteFigure 6.4 A typical VPN running through a secure tunnel connection
5 Chapter 7 Figure 7.1 The NVD DashboardFigure 7.2 A layered diagram of NVD-related tools
6 Chapter 8 Figure 8.1 Some output from the dmesg
command on a Linux Ubuntu 18.04 system. Exciting read...
7 Chapter 9 Figure 9.1 Public-facing web servers are allowed fairly open access from public networks, w...Figure 9.2 A common dual-firewall DMZ setupFigure 9.3 A bastion host is a server placed within a DMZ through which remote admins can a...Figure 9.4 The VirtualBox network adapter configuration dialog box
Guide
1 Cover
Pages
1 i
2 ii
3 iii
4 v
5 xiii
6 xiv
7 xv
8 1
9 2
10 3
11 4
12 5
13 6
14 7
15 8
16 9
17 10
18 11
19 12
20 13
21 15
22 16
23 17
24 18
25 19
26 20
27 21
28 22
29 23
30 24
31 25
32 26
33 27
34 28
35 29
36 30
37 31
38 33
39 34
40 35
41 36
42 37
43 38
44 39
45 40
46 41
47 42
48 43
49 44
50 45
51 46
52 47
53 48
54 49
55 50
56 51
57 52
58 53
59 54
60 55
61 56
62 57
63 59
64 60
65 61
66 62
67 63
68 64
69 65
70 66
71 67
72