Bezpieczeństwo systemów
W kategorii Bezpieczeństwo systemów zebrano książki, które pomogą zabezpieczyć Wasze prywatne lub firmowe komputery przed programami szpiegującymi, atakami hakerów czy wirusami. Poznacie procedury i normy związane z profesjonalną ochroną informacji oraz procedury przeprowadzenia audytu bezpieczeństwa. Opanujecie zaawansowane techniki zapewniające bezpieczeństwo komputerów, niezależnie jaki system operacyjny został na nich zainstalowany. Jeżeli jesteście twórcami oprogramowania, to znajdziecie tutaj informacje jak skutecznie zabezpieczyć własne aplikacje przed crackerami i hackerami, oraz jak tworzyć bezpieczne w użytkowaniu programy czy aplikacje sieciowe.
Matthew Nohr, Isaac Rabinovitch
AppFog is the leading platform-as-a-service provider of PHP, Ruby, Node.js, and Java solutions. It is used by developers worldwide to deploy tens of thousands of applications. AppFog delivers a reliable, scalable, and fast platform for deploying applications in the cloud.This book is a hands-on guide that will walk you through creating and deploying applications to the cloud using AppFog, which will allow you to get your application deployed without the hassle of setting up servers.This book demonstrates how to use the AppFog service to build an application and have it running in the Cloud. It will walk you through the initial AppFog setup process and explain how to create your first application in minutes.You will also discover how to use services such as databases to make your applications more powerful. You will also learn how to create applications from scratch.You will find out everything you need to know to get an application running in the cloud for the first time.
Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed...
This Learning Path helps you understand microservices architecture and leverage various services of Microsoft Azure Service Fabric to build, deploy, and maintain highly scalable enterprise-grade applications. You will learn to select an appropriate Azure backend structure for your solutions and work with its toolkit and managed apps to share your solutions with its service catalog. As you progress through the Learning Path, you will study Azure Cloud Services, Azure-managed Kubernetes, and Azure Container Services deployment techniques. To apply all that you’ve understood, you will build an end-to-end Azure system in scalable, decoupled tiers for an industrial bakery with three business domains. Toward the end of this Learning Path, you will build another scalable architecture using Azure Service Bus topics to send orders between decoupled business domains with scalable worker roles processing these orders.By the end of this Learning Path, you will be comfortable in using development, deployment, and maintenance processes to build robust cloud solutions on Azure.This Learning Path includes content from the following Packt products:• Learn Microsoft Azure by Mohamed Wali• Implementing Azure Solutions - Second Edition by Florian Klaffenbach, Oliver Michalski, Markus Klein • Microservices with Azure by Namit Tanasseri and Rahul Rai
Mitesh Soni
This book will teach you all about the Visual Studio Team Services and Microsoft Azure PaaS offerings that support Continuous Integration, Continuous Delivery, Continuous Deployment, and execution in the cloud with high availability, disaster recovery, and security.You will first be given a tour of all the concepts and tools that Microsoft Azure has to offer and how these can be used in situations to cultivate the DevOps culture. You’ll be taught how to use and manage Visual Studio Team Services (VSTS) and about the structure of the sample application used throughout the book. You will become familiar with the nitty gritty of Continuous Integration and Continuous Development with VSTS and Microsoft Azure Apps. You will not only learn how to create App service environments, but also how to compare Azure Web Apps and App Service Environments to deploy web applications in a more secure environment.Once you have completed Continuous Integration and created the Platform for application deployment, you will learn more about the final stepping stone in achieving end-to-end automation using approval-based Continuous Delivery and Deployment. You will then learn about Continuous Monitoring, using the monitoring and notification options provided by Microsoft Azure and Visual Studio Team Services.
Vandana Verma Sehgal
DevSecOps is built on the idea that everyone is responsible for security, with the goal of safely distributing security decisions at speed and scale to those who hold the highest level of context. This practice of integrating security into every stage of the development process helps improve both the security and overall quality of the software. This book will help you get to grips with DevSecOps and show you how to implement it, starting with a brief introduction to DevOps, DevSecOps, and their underlying principles.After understanding the principles, you'll dig deeper into different topics concerning application security and secure coding before learning about the secure development lifecycle and how to perform threat modeling properly. You’ll also explore a range of tools available for these tasks, as well as best practices for developing secure code and embedding security and policy into your application. Finally, you'll look at automation and infrastructure security with a focus on continuous security testing, infrastructure as code (IaC), protecting DevOps tools, and learning about the software supply chain.By the end of this book, you’ll know how to apply application security, safe coding, and DevSecOps practices in your development pipeline to create robust security protocols.
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
Tom Piens aka 'reaper', Rutger Truyers
Understand how Palo Alto Networks’ firewall as a service (FWaaS) platform Prisma Access offers secure access to internal and external resources to mobile users and branch offices. Written by Palo Alto Networks expert Tom Piens, a renowned mentor instrumental in fostering a dynamic learning environment within the Palo Alto Networks LIVE community, this guide is your roadmap to harnessing the full potential of this platform and its features.The first set of chapters will introduce you to the concept of cloud-delivered security and the key components of Prisma Access. As you progress, you’ll gain insights into how Prisma Access fits into the larger security landscape and its benefits for organizations seeking a secure and scalable solution for their remote networks and mobile workforce.From setting up secure connections, implementing advanced firewall policies, harnessing threat prevention capabilities, and securing cloud applications and data, each chapter equips you with essential knowledge and practical skills.By the end of this book, you will be armed with the necessary guidance and insights to implement and manage a secure cloud network using Prisma Access successfully.
James D. Miller , Paul R. Johnson,...
Splunk makes it easy for you to take control of your data and drive your business with the cutting edge of operational intelligence and business analytics. Through this Learning Path, you'll implement new services and utilize them to quickly and efficiently process machine-generated big data.You'll begin with an introduction to the new features, improvements, and offerings of Splunk 7. You'll learn to efficiently use wildcards and modify your search to make it faster. You'll learn how to enhance your applications by using XML dashboards and configuring and extending Splunk. You'll also find step-by-step demonstrations that'll walk you through building an operational intelligence application. As you progress, you'll explore data models and pivots to extend your intelligence capabilities.By the end of this Learning Path, you'll have the skills and confidence to implement various Splunk services in your projects.This Learning Path includes content from the following Packt products:Implementing Splunk 7 - Third Edition by James MillerSplunk Operational Intelligence Cookbook - Third Edition by Paul R Johnson, Josh Diakun, et al
Durgesh Kalya, Marco (Marc) Ayala
Incident Management for Industrial Control Systems is a practical guide that highlights the vital role of effective incident response in protecting complex industrial environments.The author distills nearly two decades of experience in this book to explain the foundational role of critical infrastructure (CI), exploring the world of operational technology (OT), emphasizing Industrial Automation and Control Systems (IACS) and their evolving threat landscape. The book simplifies the complexities of incident command systems (ICSs) for CI, addressing emergency operations, specialized frameworks, and compliance standards. With actionable insights, it also guides you through drills, scenario planning, and improving response strategies across varied operational environments.You’ll gain practical experience in ICS-focused training and exercises, grounded in widely adopted industry frameworks. The chapters further discuss FEMA’s ICS, OT fundamentals, and the nuances of incident management standards.By the end of this book, you'll have a solid grasp of CI operations, core cybersecurity principles, and the dynamics of incident response across industrial control systems and broader OT environments.*Email sign-up and proof of purchase required
Dr. Erdal Ozkaya
Cybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes.In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK® and the SANS IR model to assess security risks.The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting.Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an “Ask the Experts” chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere.By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.
Oleg Skulkin
Ransomware attacks have become the strongest and most persistent threat for many companies around the globe. Building an effective incident response plan to prevent a ransomware attack is crucial and may help you avoid heavy losses. Incident Response Techniques for Ransomware Attacks is designed to help you do just that.This book starts by discussing the history of ransomware, showing you how the threat landscape has changed over the years, while also covering the process of incident response in detail. You’ll then learn how to collect and produce ransomware-related cyber threat intelligence and look at threat actor tactics, techniques, and procedures. Next, the book focuses on various forensic artifacts in order to reconstruct each stage of a human-operated ransomware attack life cycle. In the concluding chapters, you’ll get to grips with various kill chains and discover a new one: the Unified Ransomware Kill Chain.By the end of this ransomware book, you’ll be equipped with the skills you need to build an incident response strategy for all ransomware attacks.
Roberto Martinez
With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization.Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, you'll cover the different aspects of developing an incident response program. You'll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. You'll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules.By the end of this book, you'll have learned everything you need to respond to cybersecurity incidents using threat intelligence.
Pascal Ackerman
With Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
Pascal Ackerman
With industries expanding, cyber attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.
Darren Death
Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security.Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs.By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner.
Gerard Johansen
Informatyka śledcza zapewnia narzędzia nie tylko prowadzącym dochodzenia kryminalne, ale również specjalistom do spraw cyberbezpieczeństwa. Na tym polu trwa ciągły wyścig zbrojeń między nimi a przestępcami, gdyż konsekwencje udanego ataku mogą się okazać niezwykle poważne. Umiejętność poprawnego reagowania na incydenty bezpieczeństwa jest tu kluczową sprawą. Ta książka jest przewodnikiem dla profesjonalistów do spraw cyberbezpieczeństwa. Przedstawia podstawowe zasady reagowania na incydenty bezpieczeństwa i szczegółowo, na przykładach, omawia proces tworzenia zdolności szybkiej i skutecznej reakcji na takie zdarzenia. Zaprezentowano tu techniki informatyki śledczej, od pozyskiwania dowodów i badania pamięci ulotnej po badanie dysku twardego i dowodów pochodzących z sieci. Szczególną uwagę poświęcono zagrożeniom atakami ransomware. Nie zabrakło omówienia roli analizy zagrożeń w procesie reagowania na incydenty, a także zasad sporządzania raportów dokumentujących reakcję na incydent i wyniki analizy. Pokazano również, w jaki sposób prowadzi się polowania na zagrożenia. Z tą książką: zbudujesz zdolność reagowania na incydenty w swojej organizacji nauczysz się poprawnego zbierania i analizowania dowodów zintegrujesz techniki i procedury śledcze z ogólnym procesem reagowania na incydenty przyswoisz różne metody polowania na zagrożenia opanujesz sposoby tworzenia raportów z incydentów wdrożysz odpowiednie praktyki reagowania na ataki ransomware Przygotuj się, znajdź i zlikwiduj zagrożenie!
Informatyka w kryminalistyce. Praktyczny przewodnik. Wydanie II
Darren R. Hayes
Nasilanie się zjawiska cyberprzestępczości sprawia, że prowadzenie dochodzeń kryminalnych wymaga specjalnych umiejętności i wiedzy technicznej. Bez odpowiedniego materiału dowodowego niemożliwe jest oskarżenie i osądzenie winnych. Sytuację utrudnia rozwój technologii: serwisy społecznościowe, urządzenia mobilne czy internet rzeczy są wykorzystywane do popełniania przestępstw na wiele dotychczas nieznanych sposobów. W tych warunkach informatycy śledczy są bardzo potrzebni, a specjaliści dysponujący aktualną wiedzą - wręcz bezcenni. Oto znakomity i w pełni zaktualizowany przewodnik po informatyce śledczej, uwzględniający najnowsze techniki, narzędzia i rozwiązania. W książce omówiono praktyczne aspekty zarówno umiejętności technicznych, jak i spraw ważnych z punktu widzenia prowadzenia dochodzeń w internecie i laboratorium. Opisano istotne zagadnienia dotyczące dokumentacji, dopuszczalności dowodów i innych aspektów prawnych. Szczegółowo zaprezentowano technologie ubieralne, analizy śledcze urządzeń IoT, kwestie komunikacji 5G, analizy śledczej pojazdów i analiz aplikacji mobilnych. Opracowanie uwzględnia też postępy w dziedzinie reagowania na incydenty oraz nowe techniki badania urządzeń mobilnych. Treści zostały uzupełnione praktycznymi zadaniami, realistycznymi przykładami oraz fascynującymi studiami przypadków. Dzięki książce dowiesz się, jak: wygląda praca informatyka śledczego wykorzystywać nowinki technologiczne w procesie zbierania dowodów rozpoznać naruszenia bezpieczeństwa i prawidłowo reagować na incydenty badać oszustwa finansowe analizować technologie ubieralne i urządzenia IoT zapewnić, aby zdobyte dowody zostały uznane w sądzie Wykryj. Znajdź dowody. Zabezpiecz je i zbadaj!
Joseph MacMillan
Information security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats.The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security.By the end of this infosec book, you'll have learned how to make your organization less vulnerable to threats and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization toward a higher level of information security.