John Wiley & Sons, , 2024. — 672 p. — ISBN 978-1394176809. Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application,...
Omega Brdarevic at Smashwords, 2016. — 517 p. — ASIN B01MTKQGQ9. This book opens the door to the wonderful world of security mechanisms, showing you how protection is created, and then bypassed. This book opens the door to the wonderful world of security mechanisms, showing you how protection is created, and then bypassed. It is addressed to anyone who likes captivating...
Orange Education Pvt., 2024 — 203 p. — ISBN-13: 978-81-97081-86-6. Master one of the most essential tools a professional pen tester needs to know. Book Description This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with...
Apress, 2024. — 790 p. The modern digital landscape presents many threats and opportunities, necessitating a robust understanding of cybersecurity. This book offers readers a broad-spectrum view of cybersecurity, providing insights from fundamental concepts to advanced technologies. Beginning with the foundational understanding of the ever-evolving threat landscape, the book...
No Starch Press, 2022. — 430 p. — ISBN-13: 978-1-7185-0099-0. Social engineering is the art of capitalizing on human psychology rather than technical vulnerabilities to compromise systems. It’s an effective method of attack because even the most advanced security detection teams can do little to defend against an employee clicking a malicious link or opening a file in an email...
John Wiley & Sons, Inc., 2021. — 576 p. — ISBN: 978-1-119-67234-0 (ebk). Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor...
Amazon Digital Services LLC, 2015. —17 p. — ASIN: B0192TB5Y4 Best Book for becoming a Hacker! (Even You Can Hack!) Inside... Reasons why you should learn how to hack Facebook Phishing Session Hacking Keylogging Stealer’s Sidejacking Mobile Phone Hacking Botnets DNS Spoofing USB Hacking Software for Facebook Hacking
HiTeX Press, 2024. — 306 p. — ASIN: B0DHWS2C8B. "Network Security Guidebook: Protocols and Techniques" is an essential resource for anyone looking to gain a comprehensive understanding of network security principles and practices. This book delves into the core elements that protect digital infrastructure from the myriad of threats present in today's interconnected world. By...
2018. — 289 p. Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the...
Apress Media LLC, 2025. — 648 p. — ISBN-13: 979-8-8688-1032-9. Gain a comprehensive understanding of digital reliability to ensure consistent, dependable user experiences that foster trust in technology. Part of author Saurav Bhattacharya’s trilogy that covers the essential pillars of digital ecosystems―security, reliability, and usability―this book tackles the challenges of...
Springer, 2020. — 152 p. — ISBN: 978-981-15-6575-5 (eBook). This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in...
John Wiley & Sons, Inc., 2024. — 221 р. — ISBN-13: 978-1394275885. A comprehensive and practical framework for ethical practices in contemporary cybersecurity. While some professions – including medicine, law, and engineering – have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard....
No Starch Press, Inc., 2020. — 216 p. — ISBN13: 978-1-5932-7995-0. Website security made easy. This book covers the most common ways websites get hacked and how web developers can defend themselves. The world has changed. Today, every time you make a site live, you’re opening it up to attack. A first-time developer can easily be discouraged by the difficulties involved with...
No Starch Press, Inc., 2020. — 216 p. — ISBN-13: 978-1-5932-7995-0. Website security made easy. This book covers the most common ways websites get hacked and how web developers can defend themselves. The world has changed. Today, every time you make a site live, you’re opening it up to attack. A first-time developer can easily be discouraged by the difficulties involved with...
3rd Edition. — Jones & Bartlett Learning, 2022. — 500 p. — ISBN-13: 978-1284255850. Стратегии безопасности в платформах и приложениях Linux Security Strategies in Linux Platforms and Applications, Third Edition covers major aspects of security on a Linux system. The first part of this book describes the risks, threats, and vulnerabilities associated with Linux as an operating...
McGraw-Hill Education, 2020. — 320 p. — ISBN: 978-1-26-045832-9. Manage your own robust, inexpensive cybersecurity testing environment This hands-on guide shows clearly how to administer an effective cybersecurity testing lab using affordable technologies and cloud resources. Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based...
Pearson, 2018. — 512 p. — ISBN: 978-0134817125, 0134817125. 11th Edition. Prepare for the modern workplace with networking and security essentials With a clear writing style and a focus on contemporary technologies, Business Data Networks and Security guides readers through the details of networking, while effectively training them for the demands of the modern workplace....
Packt Publishing, 2021. — 336 p. — ISBN 978-1-80107-744-6. Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an...
GitforGits, 2024. — 178 p. — ISBN-13: 978-8197416538. To help cybersecurity, networking, and information technology professionals learn Snort 3 fast, we've created the Snort 3 QuickStart Pro. This book offers practical insights into deploying and managing Snort in a variety of network environments, enabling you to effectively use Snort's powerful intrusion detection and...
Haya Shajaiah, Ahmed Abdelhadi, Charles Clancy. — McGraw-Hill Education, 2021. — 208 p. — ISBN 978-1260460353. A hands-on guide and mathematical approach to tackling security challenges and overall performance issues in 5G-based IoT communications The Internet of Things (IoT) provides connectivity and data exchange anytime and anywhere among a wide variety of physical objects...
Packt Publishing, 2018. — 488 p. — ISBN: 978-1-78899-523-8. Your one-stop guide to learning and implementing Red Team tactics effectively Red Teaming is used to enhance security by performing simulated attacks on an organization in order to detect network and system vulnerabilities. Hands-On Red Team Tactics starts with an overview of pentesting and Red Teaming, before giving...
3rd Edition. — Jones & Bartlett Learning, 2021. — 374 p. — ISBN 978-1284175622. Revised and updated to keep pace with this ever changing field, Security Strategies in Windows Platforms and Applications, Third Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system, placing a particular emphasis on Windows 10, and Windows...
Leanpub, 2023. — 71 p. This book is a follow-up on Liran Tal's Essential Node.js Security for Express web applications and teaches you hands-on practical use of HTTP security headers as browser security controls to help secure web applications. 18 Lessons, 8 Quizzes, 30 Code Snippets, and 19 Illustrations to help you learn. If you have a development environment set with...
O’Reilly Media, Inc., 2020. — 240 p. — ISBN: 978-1-492-05655-3. Threat modeling is one of the most essential–and most misunderstood–parts of the development lifecycle. Whether you’re a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply core threat modeling concepts to your practice to protect your...
Palgrave Macmillan, 2024. — 363 p. — ISBN-13: 978-3-031-66196-9. Changes in the global environment, the complexity of decision-making, and the new role of social media have challenged the operating models and practices of traditional crisis preparedness and security of supply. In a knowledge society context, securing the continuous flow of information and communication on...
Комментарии