Bezpieczeństwo systemów
Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott...
Do you want to effectively implement and maintain secure virtualized systems? This book will give you a comprehensive understanding of Microsoft virtual endpoints, from the fundamentals of Windows 365 and Azure Virtual Desktop to advanced security measures, enabling you to secure, manage, and optimize virtualized environments in line with contemporary cybersecurity challenges.You’ll start with an introduction to Microsoft technologies, gaining a foundational understanding of their capabilities. Next, you’ll delve into the importance of endpoint security, addressing the challenges faced by companies in safeguarding their digital perimeters. This book serves as a practical guide to securing virtual endpoints, covering topics such as network access, data leakage prevention, update management, threat detection, and access control configuration. As you progress, the book offers insights into the nuanced security measures required for Windows 365, Azure Virtual Desktop, and the broader Microsoft Azure infrastructure. The book concludes with real-world use cases, providing practical scenarios for deploying Windows 365 and Azure Virtual Desktop.By the end of this book, you’ll be equipped with practical skills for implementing and evaluating robust endpoint security strategies.
IT Governance Publishing, Lee Newcombe
Cloud computing plays a critical role in modern business, but with it comes a host of security challenges. This book explores the intricacies of securing cloud services, starting with foundational concepts of cloud computing and moving into specific service and deployment models. It provides insights into balancing security benefits with potential risks such as availability issues, shadow IT, and information leakage. The book goes on to focus on security threats, from hackers and insiders to government entities, while offering strategies to mitigate these risks. The practical approach continues with a deep dive into security architecture, providing a structured model to secure cloud environments across IaaS, PaaS, SaaS, and more. Further, it examines the regulatory landscape, including compliance requirements, privacy concerns, and data protection laws that impact cloud service security. Finally, the book concludes with projections about the future of cloud security and emerging challenges. Readers will gain not only the theoretical foundations but also real-world insights that they can apply to strengthen their cloud service security.
Jalal Bouhdada, Marco Ayala
As modern process facilities become increasingly sophisticated and vulnerable to cyber threats, securing critical infrastructure is more crucial than ever. This book offers an indispensable guide to industrial cybersecurity and Safety Instrumented Systems (SIS), vital for maintaining the safety and reliability of critical systems and protecting your operations, personnel, and assets.Starting with SIS design principles, the book delves into the architecture and protocols of safety networks. It provides hands-on experience identifying vulnerabilities and potential attack vectors, exploring how attackers might target SIS components. You’ll thoroughly analyze Key SIS technologies, threat modeling, and attack techniques targeting SIS controllers and engineer workstations. The book shows you how to secure Instrument Asset Management Systems (IAMS), implement physical security measures, and apply integrated risk management methodologies. It also covers compliance with emerging cybersecurity regulations and industry standards worldwide.By the end of the book, you’ll have gained practical insights into various risk assessment methodologies and a comprehensive understanding of how to effectively protect critical infrastructure.
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
Sairam Jetty, Sagar Rahalkar
Digitization drives technology today, which is why it’s so important for organizations to design security mechanisms for their network infrastructures. Analyzing vulnerabilities is one of the best ways to secure your network infrastructure.This Learning Path begins by introducing you to the various concepts of network security assessment, workflows, and architectures. You will learn to employ open source tools to perform both active and passive network scanning and use these results to analyze and design a threat model for network security. With a firm understanding of the basics, you will then explore how to use Nessus and Nmap to scan your network for vulnerabilities and open ports and gain back door entry into a network. As you progress through the chapters, you will gain insights into how to carry out various key scanning tasks, including firewall detection, OS detection, and access management to detect vulnerabilities in your network.By the end of this Learning Path, you will be familiar with the tools you need for network scanning and techniques for vulnerability scanning and network protection.This Learning Path includes content from the following Packt books:•Network Scanning Cookbook by Sairam Jetty•Network Vulnerability Assessment by Sagar Rahalkar
Akash Mahajan, MADHU AKULA
Security automation is one of the most interesting skills to have nowadays. Ansible allows you to write automation procedures once and use them across your entire infrastructure. This book will teach you the best way to use Ansible for seemingly complex tasks by using the various building blocks available and creating solutions that are easy to teach others, store for later, perform version control on, and repeat.We’ll start by covering various popular modules and writing simple playbooks to showcase those modules. You’ll see how this can be applied over a variety of platforms and operating systems, whether they are Windows/Linux bare metal servers or containers on a cloud platform. Once the bare bones automation is in place, you’ll learn how to leverage tools such as Ansible Tower or even Jenkins to create scheduled repeatable processes around security patching, security hardening, compliance reports, monitoring of systems, and so on. Moving on, you’ll delve into useful security automation techniques and approaches, and learn how to extend Ansible for enhanced security. While on the way, we will tackle topics like how to manage secrets, how to manage all the playbooks that we will create and how to enable collaboration using Ansible Galaxy. In the final stretch, we’ll tackle how to extend the modules of Ansible for our use, and do all the previous tasks in a programmatic manner to get even more powerful automation frameworks and rigs.
Bogdan Kireeve, Chas Clawson
Modernize your security operations with Sumo Logic’s Continuous Intelligence Platform that delivers real-time detection, analysis, and response to threats, and find out how it enables security teams to unify monitoring, apply advanced analytics, and strengthen defenses across diverse environments.Step by step, this guide takes you through configuring Sumo Logic to ingest and visualize log data, running versatile queries, and using Security Apps to meet compliance and audit demands. You’ll learn how to take full advantage of Cloud SIEM by creating enriched records, building correlation rules, proactively threat hunting, and tuning signals to reduce false positives.Beyond traditional SIEM use cases, discover how Sumo Logic supports modern DevSecOps practices that embed security into the development lifecycle without compromising delivery speed and features such as entity inventory, third-party integrations, and best practices that enhance investigation and detection accuracy.Finally, you’ll prepare for the future of security intelligence, where automation, machine learning, and AI-driven insights reshape threat defense, ensuring you’re ready to transform your security operations with Sumo Logic Cloud SIEM.*Email sign-up and proof of purchase required
Benjamin Kovacevic, Nicholas Dicola
What your journey will look likeWith the help of this expert-led book, you’ll become well versed with SOAR, acquire new skills, and make your organization's security posture more robust.You’ll start with a refresher on the importance of understanding cyber security, diving into why traditional tools are no longer helpful and how SOAR can help.Next, you’ll learn how SOAR works and what its benefits are, including optimized threat intelligence, incident response, and utilizing threat hunting in investigations.You’ll also get to grips with advanced automated scenarios and explore useful tools such as Microsoft Sentinel, Splunk SOAR, and Google Chronicle SOAR.The final portion of this book will guide you through best practices and case studies that you can implement in real-world scenarios.By the end of this book, you will be able to successfully automate security tasks, overcome challenges, and stay ahead of threats.
Weimin Sun, Xun (Brian) Wu, Angela Kwok
The failure of initial coin offerings (ICOs) is no accident, as most ICOs do not link to a real asset and are not regulated. Realizing the shortcomings of ICOs, the blockchain community and potential investors embraced security token offerings (STOs) and stablecoins enthusiastically.In this book, we start with an overview of the blockchain technology along with its basic concepts. We introduce the concept behind STO, and cover the basic requirements for launching a STO and the relevant regulations governing its issuance. We discuss U.S. securities laws development in launching security digital tokens using blockchain technology and show some real use cases. We also explore the process of STO launches and legal considerations. We introduce popular security tokens in the current blockchain space and talk about how to develop a security token DApp, including smart contract development for ERC1404 tokens. Later, you'll learn to build frontend side functionalities to interact with smart contracts. Finally, we discuss stablecoin technical design functionalities for issuing and operating STO tokens by interacting with Ethereum smart contracts.By the end of this book, you will have learned more about STOs and gained a detailed knowledge of building relevant applications—all with the help of practical examples.
Security with Go. Explore the power of Golang to secure host, web, and cloud services
John Daniel Leon
Go is becoming more and more popular as a language for security experts. Its wide use in server and cloud environments, its speed and ease of use, and its evident capabilities for data analysis, have made it a prime choice for developers who need to think about security.Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information.Defensive topics include cryptography, forensics, packet capturing, and building secure web applications.Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques.
Serverless computing in Azure with .NET. Build, test, and automate deployment
Sasha Rosenbaum
Serverless architecture allows you to build and run applications and services without having to manage the infrastructure. Many companies have started adopting serverless architecture for their applications to save cost and improve scalability. This book will be your companion in designing Serverless architecture for your applications using the .NET runtime, with Microsoft Azure as the cloud service provider. You will begin by understanding the concepts of Serverless architecture, its advantages and disadvantages. You will then set up the Azure environment and build a basic application using a sample text sentiment evaluation function. From here, you will be shown how to run services in a Serverless environment. We will cover the integration with other Azure and 3rd party services such as Azure Service Bus, as well as configuring dependencies on NuGet libraries, among other topics. After this, you will learn about debugging and testing your Azure functions, and then automating deployment from source control. Securing your application and monitoring its health will follow from there, and then in the final part of the book, you will learn how to Design for High Availability, Disaster Recovery and Scale, as well as how to take advantage of the cloud pay-as-you-go model to design cost-effective services. We will finish off with explaining how azure functions scale up against AWS Lambda, Azure Web Jobs, and Azure Batch compare to other types of compute-on-demand services.Whether you’ve been working with Azure for a while, or you’re just getting started, by the end of the book you will have all the information you need to set up and deploy applications to the Azure Serverless Computing environment.
Brian Zambrano
Serverless applications handle many problems that developers face when running systems and servers. The serverless pay-per-invocation model can also result in drastic cost savings, contributing to its popularity. While it's simple to create a basic serverless application, it's critical to structure your software correctly to ensure it continues to succeed as it grows. Serverless Design Patterns and Best Practices presents patterns that can be adapted to run in a serverless environment. You will learn how to develop applications that are scalable, fault tolerant, and well-tested. The book begins with an introduction to the different design pattern categories available for serverless applications. You will learn thetrade-offs between GraphQL and REST and how they fare regarding overall application design in a serverless ecosystem. The book will also show you how to migrate an existing API to a serverless backend using AWS API Gateway. You will learn how to build event-driven applications using queuing and streaming systems, such as AWS Simple Queuing Service (SQS) and AWS Kinesis. Patterns for data-intensive serverless application are also explained, including the lambda architecture and MapReduce. This book will equip you with the knowledge and skills you need to develop scalable and resilient serverless applications confidently.
Heartin Kanikathottu
Managing physical servers will be a thing of the past once you’re able to harness the power of serverless computing. If you’re already prepped with the basics of serverless computing, Serverless Programming Cookbook will help you take the next step ahead. This recipe-based guide provides solutions to problems you might face while building serverless applications. You'll begin by setting up Amazon Web Services (AWS), the primary cloud provider used for most recipes. The next set of recipes will cover various components to build a Serverless application including REST APIs, database, user management, authentication, web hosting, domain registration, DNS management, CDN, messaging, notifications and monitoring. The book also introduces you to the latest technology trends such as Data Streams, Machine Learning and NLP. You will also see patterns and practices for using various services in a real world application. Finally, to broaden your understanding of Serverless computing, you'll also cover getting started guides for other cloud providers such as Azure, Google Cloud Platform and IBM cloud. By the end of this book, you’ll have acquired the skills you need to build serverless applications efficiently using various cloud offerings.
Sieci Zero Trust. Budowanie bezpiecznych systemów w niezaufanym środowisku. Wydanie II
Razi Rais, Christina Morillo, Evan Gilman, Doug...
Zapewnienie bezpieczeństwa zasobów systemu sieciowego jest dla firm, organizacji i instytucji zadaniem absolutnie kluczowym. W praktyce tradycyjne, scentralizowane zapory sieciowe często okazują się niewystarczające, a ich konfiguracja bywa kłopotliwa. Problemy z dostępem VPN i złożoność implementacji protokołu TLS w wielu aplikacjach dodatkowo komplikują sytuację. W obliczu tych wyzwań i konieczności spełniania norm bezpieczeństwa model Zero Trust to doskonałe rozwiązanie, które skutecznie podniesie poziom ochrony zasobów sieciowych. Zero Trust to nie tylko strategia. To sposób myślenia. Ann Johnson, wiceprezes do spraw bezpieczeństwa w Microsofcie Dzięki tej książce nauczysz się stosować w praktyce zasady Zero Trust: nic nie jest oczywiste, a każde żądanie dostępu ma być sprawdzone i autoryzowane. Poznasz najważniejsze koncepcje tego modelu, takie jak silnik zaufania, silnik zasad czy agregat kontekstowy. Dowiesz się, jak budować zaufanie między różnymi elementami sieci, bazując na istniejących technikach. Spojrzysz na model Zero Trust z punktu widzenia hakera, a następnie zagłębisz się w szczegóły architektur, standardów i struktur Zero Trust opracowanych przez organizacje NIST, CISA czy DoD. W ten sposób zrozumiesz model zerowego zaufania z perspektywy wiodących instytucji w branży. Przeanalizujesz też wpływ sztucznej inteligencji, komputerów kwantowych i technologii ochrony prywatności na model Zero Trust. W książce: najważniejsze koncepcje modelu Zero Trust czym jest bezpieczeństwo systemu w modelu Zero Trust budowa sieci Zero Trust w środowisku produkcyjnym przykłady przejścia organizacji na model Zero Trust architektury, normy i struktury Zero Trust Ta książka to lektura obowiązkowa dla początkujących i profesjonalistów! Karan Dwivedi, kierownik do spraw inżynierii bezpieczeństwa w Google
Skanowanie sieci z Kali Linux. Receptury
Justin Hutchens
Bezpieczeństwo sieci w Twoich rękach! W dzisiejszych czasach większość systemów informatycznych na świecie podłączona jest do Internetu. To rozwiązanie ma jedną wadę — dowolna osoba może spróbować przełamać zabezpieczenia sieci i uzyskać nieuprawniony dostęp do danych przetwarzanych w Twoich systemach. Jak temu zaradzić? Odpowiedź znajdziesz w tej książce. Kali Linux to specjalna dystrybucja systemu Linux, która ułatwia skanowanie sieci pod kątem bezpieczeństwa. Zawarty w niej zestaw narzędzi pozwala na analizę najczęstszych problemów, a co za tym idzie, dzięki niej możesz błyskawicznie uszczelnić Twój system, tak aby przełamanie zabezpieczeń nie było prostym zadaniem. Wszystko, co musisz zrobić, zostało tu przedstawione w formie receptur. Sięgnij po tę książkę i przekonaj się, jak wykrywać dostępne hosty w sieci, skanować sieć za pomocą narzędzi ARPing, Nmap lub NetDiscover oraz odkrywać otwarte porty. Dowiedz się, w jaki sposób możesz zdalnie zidentyfikować uruchomiony system operacyjny, przeprowadzać ataki DoS (ang. Denial of Service) oraz testować aplikacje sieciowe. To doskonała lektura, która w rękach wprawnego administratora pozwoli na zdecydowane zwiększenie bezpieczeństwa sieci. Warto w nią zainwestować! Sięgnij po tę książkę i: poznaj dostępne narzędzia w dystrybucji Kali Linux zlokalizuj dostępne hosty w Twojej sieci zidentyfikuj otwarte porty poznaj atak typu DoS zwiększ bezpieczeństwo Twojej sieci Ponad 90 praktycznych receptur prezentujących sposób wykorzystania własnych skryptów i narzędzi dostępnych w systemie Kali Linux do efektywnego skanowania systemów działających w sieci
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
Jordan Hudgens
This is an all-purpose toolkit for your programming career. It has been built by Jordan Hudgens over a lifetime of coding and teaching coding. It helps you identify the key questions and stumbling blocks that programmers encounter, and gives you the answers to them! It is a comprehensive guide containing more than 50 insights that you can use to improve your work, and to give advice in your career.The book is split up into three topic areas: Coder Skills, Freelancer Skills, and Career Skills, each containing a wealth of practical advice. Coder Skills contains advice for people starting out, or those who are already working in a programming role but want to improve their skills. It includes such subjects as: how to study and understand complex topics, and getting past skill plateaus when learning new languages. Freelancer Skills contains advice for developers working as freelancers or with freelancers. It includes such subjects as: knowing when to fire a client, and tips for taking over legacy applications. Career Skills contains advice for building a successful career as a developer. It includes such subjects as: how to improve your programming techniques, and interview guides and developer salary negotiation strategies.
Anatoly Tykushin, Svetlana Ostrovskaya
W czasach wyrafinowanych cyberataków nie możesz się ograniczać do standardowych procedur. Poza codzienną rutyną musisz ciągle udoskonalać strategię reagowania na incydenty, identyfikować wykorzystane luki i słabe punkty, a równocześnie usuwać agresora z zaatakowanej sieci. Jakiekolwiek zaniechania lub błędy mogą się okazać bardzo kosztowne. Dzięki tej książce nauczysz się skutecznie wykrywać cyberataki wymierzone w infrastrukturę opartą na systemie Windows i dowiesz się, jak na nie reagować. Zaczniesz od zapoznania się ze współczesnymi technikami cyberataków, z metodami działania napastników i ich motywacjami. Poznasz szczegóły każdej fazy procesu reagowania - od wykrycia, przez analizę, aż po odzyskiwanie danych - a także niezbędne narzędzia, techniki i strategie. W miarę postępów zgłębisz tajniki odnajdywania cyfrowych śladów na endpointach. Na koniec przeanalizujesz sprawdzone podejścia do wykrywania zagrożeń i poznasz strategie aktywnej detekcji incydentów, jeszcze zanim agresor osiągnie swój cel. Najciekawsze zagadnienia: strategie i procedury śledcze w cyberbezpieczeństwie analiza endpointów pracujących w systemach Windows analiza infrastruktury i skuteczne strategie zapobiegania incydentom naprawa szkód wyrządzonych podczas ataków procesy identyfikacji zagrożeń procedury sporządzania raportów o incydentach Budowanie reputacji zajmuje dwadzieścia lat, a kilka minut cyberincydentu ją niszczy. Stephane Nappo, francuski ekspert do spraw bezpieczeństwa informacji