Systemsicherheit

97
E-book

Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications

Earl Waud

Docker is an open source software platform that helps you with creating, deploying, and running your applications using containers. This book is your ideal introduction to Docker and containerization.You will learn how to set up a Docker development environment on a Linux, Mac, or Windows workstation, and learn your way around all the commands to run and manage your Docker images and containers.You will explore the Dockerfile and learn how to build your own enterprise-grade Docker images. Then you will learn about Docker networks, Docker swarm, and Docker volumes, and how to use these features with Docker stacks in order to define, deploy, and maintain highly-scalable, fault-tolerant multi-container applications.Finally, you will learn how to leverage Docker with Jenkins to automate the building of Docker images and the deployment of Docker containers. By the end of this book, you will be well prepared when it comes to using Docker for your next project.

98
E-book

Domain-Driven Design in PHP. A Highly Practical Guide

Keyvan Akbary, Carlos Buenosvinos, Christian Soronellas

Domain-Driven Design (DDD) has arrived in the PHP community, but for all the talk, there is very little real code. Without being in a training session and with no PHP real examples, learning DDD can be challenging. This book changes all that. It details how to implement tactical DDD patterns and gives full examples of topics such as integrating Bounded Contexts with REST, and DDD messaging strategies. In this book, the authors show you, with tons of details and examples, how to properly design Entities, Value Objects, Services, Domain Events, Aggregates, Factories, Repositories, Services, and Application Services with PHP. They show how to apply Hexagonal Architecture within your application whether you use an open source framework or your own.

99
E-book

Efektywny Kotlin. Najlepsze praktyki

Marcin Moskała

Projektanci Kotlina postawili na pragmatyzm. Oznacza to, że do dziś wszystkie decyzje związane z rozwojem języka są podejmowane z uwzględnieniem potrzeb biznesowych: produktywności, skalowalności, prostej konserwacji, niezawodności i wydajności. Od początku szczególną uwagę zwraca się również na bezpieczeństwo, czytelność, wielokrotne używanie kodu, łatwość użycia narzędzi i możliwości współdziałania z innymi językami. Bardzo ważna okazała się też wydajność zarówno działania kodu, jak i pracy programisty. Konsekwentne przestrzeganie tych założeń dało znakomite efekty. Dziś Kotlin jest świetnym wyborem dla programisty - pod jednym warunkiem: że zna specyfikę języka i korzysta z niego we właściwy sposób. Ta książka jest przeznaczona dla doświadczonych programistów Kotlina, którzy chcą opanować ten język na wysokim poziomie. Wyjaśniono w niej sposoby korzystania ze szczególnych funkcji Kotlina, aby możliwe było uzyskanie bezpiecznego, czytelnego, skalowalnego i wydajnego kodu. Znalazły się w niej informacje o najlepszych praktykach pisania kodu w Kotlinie ze szczególnym uwzględnieniem praktyk wysokiego poziomu, zalecanych przez autorytety i twórców języka. Wyczerpująco omówiono też kwestie związane z właściwościami i typami specyficznymi dla platformy oraz tworzenie języków dziedzinowych, a także klasy i funkcje wewnątrzwierszowe. Jest to praktyczny przewodnik zawierający zbiór wytycznych, których uwzględnienie pozwoli pisać dobry i idiomatyczny kod w Kotlinie. W tej książce między innymi: reguły pisania kodu o wysokiej jakości programowanie dla różnych platform oraz aplikacje mobilne wzorce i konwencje programistyczne konwencje i kontrakty dla programistów wspólnie tworzących projekt zapewnianie wysokiej wydajności aplikacji i bibliotek Kotlin: wydajność, bezpieczeństwo, radość z programowania!

100
E-book

Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Effective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques. It's a crucial skill for SOC analysts, enabling them to analyze different threats and identify security incident origins. This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills.The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. Next, you’ll learn how to detect and investigate attackers' techniques and malicious activities within Windows environments. As you make progress, you’ll find out how to analyze the firewalls, flows, and proxy logs, as well as detect and investigate cyber threats using various security solution alerts, including EDR, IPS, and IDS. You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis.By the end of this book, you’ll have learned how to analyze popular systems and security appliance logs that exist in any environment and explore various attackers' techniques to detect and investigate them with ease.

101
E-book

Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR

Guven Boyraz

In this data-driven age, safeguarding sensitive data and privacy has become paramount, demanding a deep understanding of the intricacies of cyberspace and its associated threats. With a focus on endpoint defense, Endpoint Detection and Response Essentials guides you in implementing EDR solutions to stay ahead of attackers and ensure the overall security posture of your IT infrastructure.Starting with an insightful introduction to EDR and its significance in the modern cyber threat landscape, this book offers a quick overview of popular EDR tools followed by their practical implementation. From real-world case studies, best practices, and deployment strategies to maximizing the effectiveness of EDR, including endpoint hardening techniques and advanced DNS visibility methods, this comprehensive resource equips you with the knowledge and hands-on skills to strengthen your organization’s defense against cyber attacks. Recognizing the role of the DNS protocol, you’ll fortify your organization's endpoint defense proactively.By the end of this book, you'll have honed the skills needed to construct a resilient cybersecurity defense for yourself and your organization.

102
E-book

Enhancing Your Cloud Security with a CNAPP Solution. Unlock the full potential of Microsoft Defender for Cloud to fortify your cloud security

Yuri Diogenes

Cloud security is a pivotal aspect of modern IT infrastructure, essential for safeguarding critical data and services. This comprehensive book explores Cloud Native Application Protection Platform (CNAPP), guiding you through adopting, deploying, and managing these solutions effectively. Written by Yuri Diogenes, Principal PM at Microsoft, who has been with Defender for Cloud (formerly Azure Security Center) since its inception, this book distills complex concepts into actionable knowledge making it an indispensable resource for Cloud Security professionals.The book begins with a solid foundation detailing the why and how of CNAPP, preparing you for deeper engagement with the subject. As you progress, it delves into practical applications, including using Microsoft Defender for Cloud to enhance your organization's security posture, handle multicloud environments, and integrate governance and continuous improvement practices into your operations.Further, you'll learn how to operationalize your CNAPP framework, emphasizing risk management & attack disruption, leveraging AI to enhance security measures, and integrating Defender for Cloud with Microsoft Security Exposure Management. By the end, you'll be ready to implement and optimize a CNAPP solution in your workplace, ensuring a robust defense against evolving threats.

103
E-book

Enterprise Agility. Being Agile in a Changing World

Sunil Mundra

The biggest challenge enterprises face today is dealing with fast-paced change in all spheres of business. Enterprise Agility shows how an enterprise can address this challenge head on and thrive in the dynamic environment. Avoiding the mechanistic construction of existing enterprises that focus on predictability and certainty, Enterprise Agility delivers practical advice for responding and adapting to the scale and accelerating pace of disruptive change in the business environment.Agility is a fundamental shift in thinking about how enterprises work to effectively deal with disruptive changes in the business environment. The core belief underlying agility is that enterprises are open and living systems. These living systems, also known as complex adaptive systems (CAS), are ideally suited to deal with change very effectively.Agility is to enterprises what health is to humans. There are some foundational principles that can be broadly applied, but the definition of healthy is very specific to each individual. Enterprise Agility takes a similar approach with regard to agility: it suggests foundational practices to improve the overall health of the body—culture, mindset, and leadership—and the health of its various organs: people, process, governance, structure, technology, and customers. The book also suggests a practical framework to create a plan to enhance agility.

104
E-book

Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform

Ganesan Senthilvel, Ovais Mehboob Ahmed Khan, Habib Qureshi

If you want to design and develop enterprise applications using .NET Core as the development framework and learn about industry-wide best practices and guidelines, then this book is for you. The book starts with a brief introduction to enterprise architecture, which will help you to understand what enterprise architecture is and what the key components are. It will then teach you about the types of patterns and the principles of software development, and explain the various aspects of distributed computing to keep your applications effective and scalable. These chapters act as a catalyst to start the practical implementation, and design and develop applications using different architectural approaches, such as layered architecture, service oriented architecture, microservices and cloud-specific solutions. Gradually, you will learn about the different approaches and models of the Security framework and explore various authentication models and authorization techniques, such as social media-based authentication and safe storage using app secrets. By the end of the book, you will get to know the concepts and usage of the emerging fields, such as DevOps, BigData, architectural practices, and Artificial Intelligence.

105
E-book

Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles

Zeal Vora

Modern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data.The book starts with the basics of Cloud security and offers an understanding of various policies, governance, and compliance challenges in Cloud. This helps you build a strong foundation before you dive deep into understanding what it takes to design a secured network infrastructure and a well-architected application using various security services in the Cloud environment.Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations.

106
E-book

Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser

Alessandro Segala

If you’re a software developer, this book will give you an introduction to cryptography, helping you understand how to make the most of it for your applications. The book contains extensive code samples in JavaScript, both for Node.js and for frontend apps running in a web browser, although the core concepts can be used by developers working with any programming language and framework.With a purely hands-on approach that is focused on sharing actionable knowledge, you’ll learn about the common categories of cryptographic operations that you can leverage in all apps you’re developing, including hashing, encryption with symmetric, asymmetric and hybrid ciphers, and digital signatures. You’ll learn when to use these operations and how to choose and implement the most popular algorithms to perform them, including SHA-2, Argon2, AES, ChaCha20-Poly1305, RSA, and Elliptic Curve Cryptography. Later, you’ll learn how to deal with password and key management. All code in this book is written in JavaScript and designed to run in Node.js or as part of frontend apps for web browsers.By the end of this book, you'll be able to build solutions that leverage cryptography to protect user privacy, offer better security against an expanding and more complex threat landscape, help meet data protection requirements, and unlock new opportunities.

107
E-book

Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps

Manoj P R

Ethereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities.The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You’ll learn about the security vulnerabilities, along with other protocols of Ethereum.Once you have understood the basics, you’ll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you’ll work with various Ethereum packages such as Truffle, Web3, and Ganache.By the end of this book, you’ll have comprehensively grasped the Ethereum principles and ecosystem.

108
E-book

Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Rishalin Pillay, Mohammed Abutheraa

The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you’ve learnt and get experience with the tools.By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.

109
E-book

Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd

Rajesh Gunasundaram, Mathieu Nayrolles, Alexandru Vasile Pop, Sridhar Rao Chivukula

Got some experience of Angular under your belt? Want to learn everything about using advanced features for developing websites? This book is everything you need for the deep understanding of Angular that will set you apart from the developer crowd.Angular has introduced a new way to build applications. Creating complex and rich web applications, with a lighter resource footprint, has never been easier or faster. Angular is now at release 4, with significant changes through previous versions. This book has been written and tested for Angular release 4.Angular is a mature technology, and you'll likely have applications built with earlier versions. This book starts by showing you best practices and approaches to migrating your existing Angular applications so that you can be immediately up-to-date. You will take an in-depth look at components and see how to control the user journey in your applications by implementing routing and navigation. You will learn how to work with asynchronous programming by using Observables.To easily build applications that look great, you will learn all about template syntax and how to beautify applications with Material Design. Mastering forms and data binding will further speed up your application development time. Learning about managing services and animations will help you to progressively enhance your applications. Next you’ll use native directives to integrate Bootstrap with Angular. You will see the best ways to test your application with the leading options such as Jasmine and Protractor. At the end of the book, you’ll learn how to apply design patterns in Angular, and see the benefits they will bring to your development.

110
E-book

Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform

Atul Mistry

Expert AWS Development begins with theinstallation of the AWS SDK and you will goon to get hands-on experience of creatingan application using the AWS ManagementConsole and the AWS Command LineInterface (CLI). Then, you will integrateapplications with AWS services such asDynamoDB, Amazon Kinesis, AWS Lambda,Amazon SQS, and Amazon SWF.Following this, you will get well versed withCI/CD workflow and work with four majorphases in the release process – Source,Build, Test, and Production. Then, you willlearn to apply AWS Developer tools to yourContinuous Integration (CI) and ContinuousDeployment (CD) workflow. Later, youwill learn about user authentication usingAmazon Cognito, and also how you canevaluate the best architecture as per yourinfrastructure costs. You will learn aboutAmazon EC2 service and will deploy anapp using it. You will also deploy a practicalreal-world example of a CI/CD applicationwith the Serverless Application Framework,which is known as AWS Lambda.Finally, you will learn how to build, develop,and deploy the Application using AWSDeveloper tools such as AWS CodeCommit,AWS CodeBuild, AWS CodeDeploy, andAWS CodePipeline, as per your projectrequirements.

111
E-book

Exploring Experience Design. Fusing business, tech, and design to shape customer engagement

Ezra Schwartz

We live in an experience economy in which interaction with products is valued more than owning them. Products are expected to engage and delight in order to form the emotional bonds that forge long-term customer loyalty:Products need to anticipate our needs and perform tasks for us: refrigerators order food, homes monitor energy, and cars drive autonomously; they track our vitals, sleep, location, finances, interactions, and content use; recognize our biometric signatures, chat with us, understand and motivate us. Beautiful and easy to use, products have to be fully customizable to match our personal preferences.Accomplishing these feats is easier said than done, but a solution has emerged in the form of Experience design (XD), the unifying approach to fusing business, technology and design around a user-centered philosophy.This book explores key dimensions of XD: Close collaboration among interdisciplinary teams, rapid iteration and ongoing user validation. We cover the processes, methodologies, tools, techniques and best-practices practitioners use throughout the entire product development life-cycle, as ideas are transformed to into positive experiences which lead to perpetual customer engagement and brand loyalty.

112
E-book
113
E-book

Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments

Alex Callejas

Fedora Linux is a free and open-source platform designed for hardware, clouds, and containers that enables software developers and community members to create custom solutions for their customers. This book is a comprehensive guide focusing on workstation configuration for the modern system administrator.The book begins by introducing you to the philosophy underlying the open-source movement, along with the unique attributes of the Fedora Project that set it apart from other Linux distributions. The chapters outline best practices and strategies for essential system administration tasks, including operating system installation, first-boot configuration, storage, and network setup. As you make progress, you’ll get to grips with the selection and usage of top applications and tools in the tech environment. The concluding chapters help you get a clear understanding of the basics of version control systems, enhanced Linux security, automation, virtualization, and containers, which are integral to modern system administration.By the end of this book, you’ll have gained the knowledge needed to optimize day-to-day tasks related to Linux-based system administration.

114
E-book

Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III

Carey Parker

Internet jest obecny w większości obszarów naszego życia. To już nie tylko korzystanie ze stron internetowych, ale także bankowość, zakupy w sieci czy podtrzymywanie relacji z rodziną i ze znajomymi. Oznacza to, że niemal cały czas Twoje bezpieczeństwo, pieniądze i prywatność są narażone na ataki. Aby skutecznie chronić siebie i swoich bliskich, musisz zdobyć pewne minimum wiedzy. Nie sposób obronić się przed naprawdę zdeterminowanym hakerem, ale ochrona przed pospolitymi włamaniami czy masową inwigilacją jest jak najbardziej możliwa, i to z wykorzystaniem prostych narzędzi. Trzeba tylko wiedzieć, jak się do tego zabrać! To przystępny i kompleksowy przewodnik po zagadnieniach bezpieczeństwa, skierowany do osób, które nie znają się na komputerach i informatyce. Kwestie cyberbezpieczeństwa przedstawiono tu krok po kroku, z minimalnym użyciem specjalistycznego języka. Opisano dziesiątki całkiem prostych sposobów pozwalających każdemu zabezpieczyć swoje urządzenia i dane. Książka została napisana tak, aby maksymalnie uprościć zarządzanie Twoim bezpieczeństwem w sieci. W każdym rozdziale znalazła się kompletna lista kontrolna ze szczegółowymi instrukcjami i rysunkami. Najważniejsze zagadnienia: zarządzanie hasłami dostępu blokowanie inwigilacji i śledzenia w internecie bezpieczne korzystanie z bankowości, ze sklepów i z serwisów społecznościowych bezpieczeństwo smartfona, tabletu i domowej sieci ochrona dzieci korzystających z internetu Nie musisz być informatykiem, by pamiętać o bezpieczeństwie!

115
E-book

GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition

Stefano Iacovella

GeoServer is an opensource server writtenin Java that allows users to share, process,and edit geospatial data. This book willguide you through the new featuresand improvements of GeoServer and willhelp you get started with it. GeoServerBeginner's Guide gives you the impetus tobuild custom maps using your data withoutthe need for costly commercial softwarelicenses and restrictions. Even if you donot have prior GIS knowledge, you will beable to make interactive maps after readingthis book.You will install GeoServer, access your datafrom a database, and apply style points,lines, polygons, and labels to impress sitevisitors with real-time maps. Then youfollow a step-by-step guide that installsGeoServer in minutes. You will explorethe web-based administrative interfaceto connect to backend data stores suchas PostGIS, and Oracle. Going ahead, youcan display your data on web-basedinteractive maps, use style lines, points,polygons, and embed images to visualizethis data for your web visitors. You willwalk away from this book with a workingapplication ready for production.After reading GeoServer Beginner's Guide,you will be able to build beautiful custommaps on your website using your geospatialdata.

116
E-book

Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems

A. P. David

Ghidra, an open source software reverse engineering (SRE) framework created by the NSA research directorate, enables users to analyze compiled code on any platform, whether Linux, Windows, or macOS. This book is a starting point for developers interested in leveraging Ghidra to create patches and extend tool capabilities to meet their cybersecurity needs.You'll begin by installing Ghidra and exploring its features, and gradually learn how to automate reverse engineering tasks using Ghidra plug-ins. You’ll then see how to set up an environment to perform malware analysis using Ghidra and how to use it in the headless mode. As you progress, you’ll use Ghidra scripting to automate the task of identifying vulnerabilities in executable binaries. The book also covers advanced topics such as developing Ghidra plug-ins, developing your own GUI, incorporating new process architectures if needed, and contributing to the Ghidra project.By the end of this Ghidra book, you’ll have developed the skills you need to harness the power of Ghidra for analyzing and avoiding potential vulnerabilities in code and networks.

117
E-book

Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition

Ferdinando Santacroce

Since its inception, Git has attracted skilled developers due to its robust, powerful, and reliable features. Its incredibly fast branching ability transformed a piece of code from a niche tool for Linux Kernel developers into a mainstream distributed versioning system. Like most powerful tools, Git can be hard to approach since it has a lot of commands, subcommands, and options that easily confuse newcomers.The 2nd edition of this very successful book will help you overcome this fear and become adept in all the basic tasks in Git. Building upon the success of the first book, we start with a brief step-by-step installation guide; after this, you'll delve into the essentials of Git. For those of you who have bought the first edition, this time we go into internals in far greater depth, talking less about theory and using much more practical examples.The book serves as a primer for topics to follow, such as branching and merging, creating and managing a GitHub personal repository, and fork and pull requests. You’ll then learn the art of cherry-picking, taking only the commits you want, followed by Git blame. Finally, we'll see how to interoperate with a Subversion server, covering the concepts and commands needed to convert an SVN repository into a Git repository.To conclude, this is a collection of resources, links, and appendices to satisfy even the most curious.

118
E-book

Go Systems Programming. Master Linux and Unix system level programming with Go

Mihalis Tsoukalos

Go is the new systems programming language for Linux and Unix systems. It is also the language in which some of the most prominent cloud-level systems have been written, such as Docker. Where C programmers used to rule, Go programmers are in demand to write highly optimized systems programming code.Created by some of the original designers of C and Unix, Go expands the systems programmers toolkit and adds a mature, clear programming language. Traditional system applications become easier to write since pointers are not relevant and garbage collection has taken away the most problematic area for low-level systems code: memory management.This book opens up the world of high-performance Unix system applications to the beginning Go programmer. It does not get stuck on single systems or even system types, but tries to expand the original teachings from Unix system level programming to all types of servers, the cloud, and the web.

119
E-book

Google Cloud Platform for Architects. Design and manage powerful cloud solutions

Vitthal Srinivasan, Janani Ravi, Judy Raj

Using a public cloud platform was considered risky a decade ago, and unconventional even just a few years ago. Today, however, use of the public cloud is completely mainstream - the norm, rather than the exception. Several leading technology firms, including Google, have built sophisticated cloud platforms, and are locked in a fierce competition for market share.The main goal of this book is to enable you to get the best out of the GCP, and to use it with confidence and competence. You will learn why cloud architectures take the forms that they do, and this will help you become a skilled high-level cloud architect. You will also learn how individual cloud services are configured and used, so that you are never intimidated at having to build it yourself. You will also learn the right way and the right situation in which to use the important GCP services.By the end of this book, you will be able to make the most out of Google Cloud Platform design.

120
E-book

Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń

Brandon Perry

C# to nowoczesny język programowania, który został od podstaw zaprojektowany jako obiektowy. Ta dojrzała technologia jest często wybierana przez twórców oprogramowania, również tego służącego do pokonywania zabezpieczeń systemów. Dzięki temu, że platforma .NET jest oprogramowaniem open source, w C# można pisać kod, który bez problemu będzie działał w każdym systemie operacyjnym. Co prawda język ten jest prosty i łatwy do nauczenia się, jednak dopiero gruntowna znajomość C# umożliwia efektywne tworzenie narzędzi związanych z bezpieczeństwem, służących choćby do wyszukiwania luk w infrastrukturze czy prowadzenia testów penetracyjnych. Ta książka jest przeznaczona dla specjalistów ds. bezpieczeństwa, którzy chcą korzystać z języka C# do takich zadań jak fuzzowanie, skanowanie w poszukiwaniu luk zabezpieczeń i analiza złośliwego oprogramowania. Opisano tu zarówno podstawy języka C#, jak i jego dość zaawansowane funkcje. Przedstawiono szereg bibliotek dostępnych dla tego języka. Pokazano, jak pisać kod wyszukujący luki w zabezpieczeniach i jak tworzyć eksploity. Przedstawiono sposoby korzystania z takich narzędzi jak Nessus, sqlmap i Cuckoo Sandbox. Dzięki technikom zaprezentowanym w książce administrator bezpieczeństwa bez problemu zautomatyzuje nawet najbardziej żmudne codzienne zadania! W tej książce między innymi: Podstawowe i zaawansowane funkcjonalności języka C# Generowanie kodu ładunków, również wieloplatformowych Skanery, w tym OpenVAS, Nessus i Nexpose Automatyczna identyfikacja luk umożliwiających wstrzyknięcie kodu SQL Tworzenie w C# narzędzi do inżynierii wstecznej C#. Sprawdź swój system zabezpieczeń! Brandon Perry jest programistą i gorącym zwolennikiem idei open source. Odkąd pojawiło się środowisko Mono, pisze aplikacje w języku C#. Tworzy też moduły dla frameworka Metasploit, analizuje pliki binarne i zarządza ciekawymi projektami (https://volatileminds.net/). Fascynuje się badaniami nad bezpieczeństwem systemów informatycznych. Chętnie dzieli się swoją wiedzą, pisze książki i pomaga innym w tworzeniu solidniejszego oprogramowania.