John Wiley & Sons, Inc., 2020. — 464 p. — ISBN: 978-1-119-56026-5. Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing...
Basta Alfred, Basta Nadine, Anwar Waqar, Essar Mohammad I. — Wiley, 2025. — 480 p. — ISBN-13: 978-1394201600. A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of...
O’Reilly Media, 2018. — 386 p. — ISBN: 978-1-491-97990-7. Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, you’ll explore ways to apply machine...
Mercury Learning and Information, 2022. — 350 p. — ISBN-13: 978-1683926634. Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases . Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader realm...
Apress Media LLC, 2025. — 224 p. — ISBN-13: 979-8-8688-1303-0. Remote development has drastically changed the way teams build software. The freedom to work from wherever and possibly whenever has increased flexibility, but these benefits have not come without growing pains. The people managing this new type of team have worked tirelessly to adapt existing practices to this new,...
Packt Publishing Ltd., July 2020. — 572 p. — ISBN: 978-1-83921-641-1. Enhance Windows security and protect your systems and servers from various cyber attacks Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide to help you gain expertise when implementing...
John Wiley & Sons, Inc., 2024. — 368 р. — ISBN-13: 978-1394253135. Discover the power of open source observability for your enterprise environment In Mastering Observability and OpenTelemetry: Enhancing Application and Infrastructure Performance and Avoiding Outages, accomplished engineering leader and open source contributor Steve Flanders unlocks the secrets of enterprise...
Jones & Bartlett Learning, 2023. — 658 р. — ISBN 978-1284261158. Secure Software Systems presents an approach to secure software systems design and development that tightly integrates security and systems design and development (or software engineering) together. It addresses the software development process from the perspective of a security practitioner. The text focuses on...
Independently published, 2021. — 377 p. — ISBN B08TMTT677. All the Basic Knowledge a newcomer Must Have It is not easy in the ocean of information to find a guide that explains the basics of programming well, avoiding you to jump from one language to another without understanding what you are doing taking the first steps by following the right manual, will facilitate the...
Packt Publishing, 2018. — 346 p. Master Shellcode to leverage the buffer overflow concept Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with Shellcode, assembly, and Metasploit. This book will teach you...
O’Reilly Media, Inc., 2023. — 340 р. — ISBN-13: 978-1-098-12946-0. Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern...
CRC Press, 2025. — 200 p. — ISBN-13: 978-1-003-60467-9. This book helps to reduce the risk of data loss by monitoring and controlling the flow of sensitive data via network, email, or web. Guardians of Data also shows guidance about data protection that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable legal or regulatory...
John Wiley & Sons, Inc., 2015. — 309 p. — ISBN: 978-1-118-89667-9 (ebk). Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology...
BPB Publications, 2023. — 285 р. — ISBN 978-93-5551-362-5. Crack a ransomware by identifying and exploiting weaknesses in its design. Key Features: - Get an overview of the current security mechanisms available to prevent ransomware digital extortion. - Explore different techniques to analyze a ransomware attack. - Understand how cryptographic libraries are misused by malware...
5th Edition. — Apress Media, LLC., 2023. — 620 p. — ISBN-13: 978-1-4842-9036-1. Пошаговое руководство по компьютерной безопасности и конфиденциальности для неспециалистов Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers...
O’Reilly Media, Inc., 2021. — 370 p. — ISBN 978-1492094050. Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including...
Apress, 2020. — 161 p. — ISBN13: 978-1-4842-6401-0. Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely used for manual application security testing of web applications plus APIs and mobile apps. The book starts with the basics and shows you how to set up a testing environment. It covers basic building blocks and takes you on an...
Packt Publishing, 2017. — 190 p. — ISBN: 978-1788295970. Key Features Carry out penetration testing in highly-secured environments with Metasploit Learn to bypass different defenses to gain access into different systems. A step-by-step guide that will quickly enhance your penetration testing skills. Book Description This book will begin by introducing you to Metasploit and its...
Packt Publishing Limited, 2019. — 660 p. — ISBN: 978-1838822477, 183882247X. Master the Metasploit Framework and become an expert in penetration testing. Key Features Gain a thorough understanding of the Metasploit Framework Develop the skills to perform penetration testing in complex and highly secure environments Learn techniques to integrate Metasploit with the industry's...
Apress Media LLC., 2020. — 180 p. — ISBN13: (electronic): 978-1-4842-6402-7. Use this comprehensive guide to learn the practical aspects of Burp Suite―from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet powerful, tool used for application security testing....
Leanpub, 2020-05-13. — 65 р. Book walks through a number of real world examples for reverse engineering data structures and algorithms found in malware. Walk through a number of real world examples for reverse engineering data structures and algorithms found in malware in order to gradually introduce the reader to more advanced examples culminating in reverse engineering a C2...
2nd Edition. — Packt Publishing, 2020. — 216 p. — ISBN: 978-1-83898-266-9. A comprehensive guide that will help you get started with the latest Metasploit 5.0 framework for exploiting real-world vulnerabilities Metasploit 5.x for Beginners, Second edition will help readers absorb the essential concepts of using the Metasploit framework for comprehensive penetration testing....
O’Reilly Media, Inc., 2024. — 402 р. — ISBN-13: 978-1-098-16947-3. By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of...
Independently published, 2021. — 171 p. — ISBN B097Z5VFG6. The world’s most used penetration testing framework As metasploit.com says: Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness;...
Packt Publishing, 2020. — 532 p. — ISBN: 978-1-78995-352-7. Identify, exploit, and test web application security with ease Metasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you’ll explore another aspect of the framework – web...
No Starch Press, 2022. — 781 p. — ISBN-13: 978-1-59327-875-5 (ebook). The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in...
BookRix, 2018. — 40 p. — ASIN B00YRUNSZI. The eBook to the freeware password management "Password Case" from the "PRIMA"-series ((Private Information Management) describes often with an example all available functions. You can save "normal" password data and also access data for your mobile phone / cellular phone (PIN, PUK, PUK2). There is a reminder for passwords with an...
Amazon.com Services LLC, 2020. — 193 p. — ISBN: 979-8614981143. This book will help you in Learning the Basics of Penetration Testing. It will cover the main features of Penetration Testing and will help you better understand the flaws in a network system and how to resolve them. It has been designed in such a way that it does not require any prior experience of testing or...
Apress Media LLC., 2020. — 960 p. — ISBN13: (electronic): 978-1-4842-6106-4. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today’s antivirus scanning technology, it...
Комментарии