In an era where technological behemoths wield unprecedented power over the digital landscape, this book is a call for autonomy, security, and innovation through the open-source revolution. It not only challenges the status quo but also unfolds a blueprint for corporate transformation through the lens of open-source philosophy.
In an era where technological behemoths wield unprecedented power over the digital landscape, this book is a call for autonomy, security, and innovation through the open-source revolution. It not only challenges the status quo but also unfolds a blueprint for corporate transformation through the lens of open-source philosophy.
Rahim Ali has built a career at the intersection of open-source technology, cybersecurity, and digital transformation, amassing over 17 years of experience in technology architecture, cybersecurity, and financial services. He has worked in Linux Kernel development community since 2009 and is the inventor of Elliptic Chaotic Cryptography, an advanced modification of Elliptic Curve Cryptography, which underscores his expertise in security and cryptographic research. Muhammad Danyal Khan, pen name Sage Khan, is a professional with a unique blend of experience in military cybersecurity, enterprise IT security, Governance, Risk Management, Compliance and AI-driven automation. His expertise spans speech processing, network security, ethical hacking, and the deployment of AI-driven enterprise solutions. With a gold medal in MS Cybersecurity from NUST, he has worked on various projects in cyber warfare, electronic intelligence, Artificial Intelligence, Secure Communications, Large Language Models (LLMs), and Open-Source Software Deployments.
Inhaltsangabe
1. Introduction-Unleashing the Open-Source Leviathan 2. The Corporate Pilgrimage to Open Source 3. Crafting the Open Infrastructure 4. The Stronghold Management: Optimizing Resources and Safeguarding Access 5. Sanctums of Data Sovereignty 6. The Communication Galaxy 7. Navigating the Remote Work Frontier 8. Bastions of Cyber Vigilance: Defending Your Network and Systems through Security and Monitoring with Open-Source Tools 9. Champions of Digital Defense Testing Your Network through Penetration Testing and Continuous Improvement 10. The Open-Source Alliance: Leveraging Open-Source Support and Building In-House Expertise Epilogue. The Open-Source Odyssey Endures
1. Introduction-Unleashing the Open-Source Leviathan 2. The Corporate Pilgrimage to Open Source 3. Crafting the Open Infrastructure 4. The Stronghold Management: Optimizing Resources and Safeguarding Access 5. Sanctums of Data Sovereignty 6. The Communication Galaxy 7. Navigating the Remote Work Frontier 8. Bastions of Cyber Vigilance: Defending Your Network and Systems through Security and Monitoring with Open-Source Tools 9. Champions of Digital Defense Testing Your Network through Penetration Testing and Continuous Improvement 10. The Open-Source Alliance: Leveraging Open-Source Support and Building In-House Expertise Epilogue. The Open-Source Odyssey Endures
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826