Bezpieczeństwo systemów
W kategorii Bezpieczeństwo systemów zebrano książki, które pomogą zabezpieczyć Wasze prywatne lub firmowe komputery przed programami szpiegującymi, atakami hakerów czy wirusami. Poznacie procedury i normy związane z profesjonalną ochroną informacji oraz procedury przeprowadzenia audytu bezpieczeństwa. Opanujecie zaawansowane techniki zapewniające bezpieczeństwo komputerów, niezależnie jaki system operacyjny został na nich zainstalowany. Jeżeli jesteście twórcami oprogramowania, to znajdziecie tutaj informacje jak skutecznie zabezpieczyć własne aplikacje przed crackerami i hackerami, oraz jak tworzyć bezpieczne w użytkowaniu programy czy aplikacje sieciowe.
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
Radovan Bast, Roberto Di Remigio
CMake is cross-platform, open-source software for managing the build process in a portable fashion. This book features a collection of recipes and building blocks with tips and techniques for working with CMake, CTest, CPack, and CDash.CMake Cookbook includes real-world examples in the form of recipes that cover different ways to structure, configure, build, and test small- to large-scale code projects. You will learn to use CMake's command-line tools and master modern CMake practices for configuring, building, and testing binaries and libraries. With this book, you will be able to work with external libraries and structure your own projects in a modular and reusable way. You will be well-equipped to generate native build scripts for Linux, MacOS, and Windows, simplify and refactor projects using CMake, and port projects to CMake.
Mercury Learning and Information, Aditya K. Sood
Artificial intelligence is transforming industries, but it also exposes organizations to new cyber threats. This course begins by introducing the foundational concepts of securing large language models (LLMs), generative AI applications, and the broader AI infrastructure. Participants will explore the evolving threat landscape, gaining insights into how attackers exploit vulnerabilities in AI systems and the risks posed by trust and compliance failures.The course provides real-world case studies to highlight attack vectors like adversarial inputs, data poisoning, and model theft. Participants will learn practical methods for identifying and mitigating vulnerabilities in AI systems. These insights prepare learners to proactively safeguard their AI infrastructures using advanced security assessment techniques.Finally, the course equips participants with actionable strategies to defend AI systems. You’ll learn to protect sensitive data, implement robust security measures, and address ethical challenges in AI. By the end, you’ll be ready to secure AI ecosystems and adapt to the fast-evolving AI security landscape.
Mark Birch
CompTIA Advanced Security Practitioner (CASP+) ensures that security practitioners stay on top of the ever-changing security landscape. The CompTIA CASP+ CAS-004 Certification Guide offers complete, up-to-date coverage of the CompTIA CAS-004 exam so you can take it with confidence, fully equipped to pass on the first attempt.Written in a clear, succinct way with self-assessment questions, exam tips, and mock exams with detailed explanations, this book covers security architecture, security operations, security engineering, cryptography, governance, risk, and compliance. You'll begin by developing the skills to architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise. Moving on, you'll discover how to monitor and detect security incidents, implement incident response, and use automation to proactively support ongoing security operations. The book also shows you how to apply security practices in the cloud, on-premises, to endpoints, and to mobile infrastructure. Finally, you'll understand the impact of governance, risk, and compliance requirements throughout the enterprise.By the end of this CASP study guide, you'll have covered everything you need to pass the CompTIA CASP+ CAS-004 certification exam and have a handy reference guide.
Jonathan Isley
The CompTIA CySA+ (CS0-003) Certification Guide is your complete resource for passing the latest CySA+ exam and developing real-world cybersecurity skills. Covering all four exam domains—security operations, vulnerability management, incident response, and reporting and communication—this guide provides clear explanations, hands-on examples, and practical guidance drawn from real-world scenarios.You’ll learn how to identify and analyze signs of malicious activity, apply threat hunting and intelligence concepts, and leverage tools to manage, assess, and respond to vulnerabilities and attacks. The book walks you through the incident response lifecycle and shows you how to report and communicate findings during both proactive and reactive cybersecurity efforts.To solidify your understanding, each chapter includes review questions and interactive exercises. You’ll also get access to over 250 flashcards and two full-length practice exams that mirror the real test—helping you gauge your readiness and boost your confidence.Whether you're starting your career in cybersecurity or advancing from an entry-level role, this guide equips you with the knowledge and skills you need to pass the CS0-003 exam and thrive as a cybersecurity analyst.
Ian Neil
CompTIA Security+ is a worldwide certification that establishes the fundamental knowledge required to perform core security functions and pursue an IT security career. CompTIA Security+ Certification Guide is a best-in-class exam study guide that covers all of CompTIA Security+ 501 exam objectives. It is authored by Ian Neil, who is a world-class trainer of CompTIA Security+ 501. Packed with self-assessment scenarios and realistic exam questions, this guide will help you master the core concepts to succeed in the exam the first time you take it. Using relevant examples, you will learn all the important security fundamentals from Certificates and Encryption to Identity and Access Management concepts. You will then dive into the important domains of the exam; namely, threats, attacks and vulnerabilities, technologies and tools, architecture and design, risk management, and cryptography and Public Key Infrastructure (PKI). This book comes with over 600 practice questions with detailed explanation that is at the exam level and also includes two mock exams to help you with your study plan. This guide will ensure that encryption and certificates are made easy for you.
Ian Neil
The CompTIA Security+ certification validates the fundamental knowledge required to perform core security functions and pursue a career in IT security. Authored by Ian Neil, a world-class CompTIA certification trainer, this book is a best-in-class study guide that fully covers the CompTIA Security+ 601 exam objectives.Complete with chapter review questions, realistic mock exams, and worked solutions, this guide will help you master the core concepts to pass the exam the first time you take it. With the help of relevant examples, you'll learn fundamental security concepts from certificates and encryption to identity and access management (IAM). As you progress, you'll delve into the important domains of the exam, including cloud security, threats, attacks and vulnerabilities, technologies and tools, architecture and design, risk management, cryptography, and public key infrastructure (PKI).You can access extra practice materials, including flashcards, performance-based questions, practical labs, mock exams, key terms glossary, and exam tips on the author's website at securityplus.training.By the end of this Security+ book, you'll have gained the knowledge and understanding to take the CompTIA exam with confidence.
Mark McGinley
Ace the globally recognized CompTIA Security+ SY0-701 certification exam by validating your expertise in essential cybersecurity concepts and practices through rigorously designed practice tests. Covering all the concepts tested in the CompTIA Security+ SY0-701 exam, this exam guide will help you evaluate your proficiency across five core security domains: general security concepts, threats and vulnerabilities with mitigations, security architecture, security operations, and program management.More than just another study guide, this book is a strategic preparation tool that focuses on assessing your retention of the material and evaluating your exam readiness rather than teaching theory. Packed with hundreds of expertly crafted questions, it mirrors the actual exam’s difficulty level and offers more than knowledge—you’ll develop the confidence and strategic thinking needed to excel on test day. To address the gaps in your knowledge, each question is paired with descriptive answers and in-depth explanations, transforming potential mistakes into powerful learning moments.By the end of this book, you’ll be primed to approach the CompTIA Security+ SY0-701 exam with the skills and expertise needed to succeed.
Ian Neil
Building on the success of its international bestselling predecessor, this third edition of the CompTIA Security+ SY0-701 Certification Guide serves as your one-stop resource for Security+ exam preparation. Written by cybersecurity expert Ian Neil, this comprehensive guide helps you unlock the intricacies of cybersecurity and understand the technology behind the CompTIA Security+ SY0-701 certification, ensuring you approach the exam with confidence and pass on your first attempt.By exploring security in detail, this book introduces essential principles, controls, and best practices. The chapters are meticulously designed to provide 100% coverage of the CompTIA Security+ SY0-701 exam objectives, ensuring you have the most up-to-date and relevant study material. By mastering cybersecurity fundamentals, you’ll acquire the knowledge and skills to identify and mitigate threats, manage vulnerabilities, and safeguard enterprise infrastructure. Additionally, the book grants lifetime access to web-based exam prep tools, including 3 full-length mock exams, flashcards, acronyms, along with a 12% Security+ exam discount voucher.Whether you aim to excel the CompTIA Security+ SY0-701 exam, advance your career in cybersecurity, or enhance your existing knowledge, this book will transform you into a cybersecurity expert.
Mark Birch, Patrick Lane, Nikki Robinson
As cyber threats evolve at unprecedented speed and enterprises demand resilient, scalable security architectures, the CompTIA SecurityX CAS-005 Certification Guide stands as the definitive preparation resource for today's security leaders. This expert-led study guide enables senior security professionals to master the full breadth and depth of the new CAS-005 exam objectives.Written by veteran instructor Mark Birch, this guide draws from over 30 years of experience in teaching, consulting, and implementing cybersecurity controls to deliver clear, actionable content across the four core domains: governance, risk, and compliance; security architecture; security engineering; and security operations. It addresses the most pressing security challenges, from AI-driven threats and Zero Trust design to hybrid cloud environments, post-quantum cryptography, and automation. While exploring cutting-edge developments, it reinforces essential practices such as threat modeling, secure SDLC, advanced incident response, and risk management.Beyond comprehensive content coverage, this guide ensures you are fully prepared to pass the exam through exam tips, review questions, and detailed mock exams, helping you build the confidence and situational readiness needed to succeed in the CAS-005 exam and real-world cybersecurity leadership.
Computer Security and Encryption. Advanced Techniques for Securing Digital Information
Mercury Learning and Information, S. R. Chauhan,...
This book addresses the rapid growth of cybercrime by focusing on cryptography and system security. It emphasizes rigorous security models and practices in network and system design. The first part introduces system security concepts, object models, and inter-object communications, providing a foundation in cryptography for beginners and advanced readers alike.The course starts with basic security concepts, moving to public key cryptography, SSL, and transaction security on the web. It covers IP security, firewalls, public key certificates, and security at the IP layer. Readers will also learn about remote access with Internet Protocol security and virtual private networks. The final chapters address the security of emerging technologies like Big Data Analytics, cloud computing, IoT, Smart Grid, SCADA, control systems, and Wireless Sensor Networks.Understanding these concepts is crucial for protecting against cyber threats. This book transitions readers from basic knowledge to advanced security practices, blending theoretical insights with practical applications. It is an invaluable resource for mastering cryptography and system security in today's digital age.
Crafting Secure Software. An engineering leader's guide to security by design
Thomas Segura, Greg Bulmash
Drawing from GitGuardian's extensive experience in securing millions of lines of code for organizations worldwide, Crafting Secure Software takes you on an exhaustive journey through the complex world of software security and prepares you to face current and emerging security challenges confidently.Authored by security experts, this book provides unique insights into the software development lifecycle (SDLC) and delivers actionable advice to help you mitigate and prevent risks. From securing code-writing tools and secrets to ensuring the integrity of the source code and delivery pipelines, you’ll get a good grasp on the threat landscape, uncover best practices for protecting your software, and craft recommendations for future-proofing against upcoming security regulations and legislation.By the end of this book, you’ll have gained a clear vision of the improvements needed in your security posture, along with concrete steps to implement them, empowering you to make informed decisions and take decisive action in safeguarding your software assets.
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
Soledad Antelada Toledano
Discover the core of cybersecurity through gripping real-world accounts of the most common assaults on critical infrastructure – the body of vital systems, networks, and assets so essential that their continued operation is required to ensure the security of a nation, its economy, and the public’s health and safety – with this guide to understanding cybersecurity principles. From an introduction to critical infrastructure and cybersecurity concepts to the most common types of attacks, this book takes you through the life cycle of a vulnerability and how to assess and manage it. You’ll study real-world cybersecurity breaches, each incident providing insights into the principles and practical lessons for cyber defenders striving to prevent future breaches. From DDoS to APTs, the book examines how each threat activates, operates, and succeeds. Additionally, you’ll analyze the risks posed by computational paradigms, such as the advancement of AI and quantum computing, to legacy infrastructure. By the end of this book, you’ll be able to identify key cybersecurity principles that can help mitigate evolving attacks to critical infrastructure.
Massimo Bertaccini
Cryptography Algorithms is designed to help you get up and running with modern cryptography algorithms. You'll not only explore old and modern security practices but also discover practical examples of implementing them effectively.The book starts with an overview of cryptography, exploring key concepts including popular classical symmetric and asymmetric algorithms, protocol standards, and more. You'll also cover everything from building crypto codes to breaking them. In addition to this, the book will help you to understand the difference between various types of digital signatures. As you advance, you will become well-versed with the new-age cryptography algorithms and protocols such as public and private key cryptography, zero-knowledge protocols, elliptic curves, quantum cryptography, and homomorphic encryption. Finally, you'll be able to apply the knowledge you've gained with the help of practical examples and use cases.By the end of this cryptography book, you will be well-versed with modern cryptography and be able to effectively apply it to security applications.
Massimo Bertaccini
As cyber threats evolve, so must our cryptographic defenses. This updated edition of Cryptographic Algorithms delves into the latest advancements in encryption, cybersecurity, and data protection, ensuring you stay ahead in this rapidly changing field. Whether you're an aspiring or seasoned cybersecurity professional, this book equips you with the expertise to confidently tackle modern security challenges.Written by Dr. Massimo Bertaccini—a cryptography researcher, inventor, and cybersecurity expert—this book goes beyond theory, offering real-world applications backed by his inventions and patents. His expertise in zero-knowledge proofs, homomorphic encryption, and blockchain security makes this an essential resource for mastering cryptographic security.With updated algorithms, in-depth explanations, and a comprehensive overview of next-gen cryptographic advancements, this second edition provides the tools to protect sensitive data, implement secure cryptographic systems, and defend against emerging cybersecurity threats.By the end of this book, you’ll have hands-on expertise in modern cryptographic techniques—empowering you to build robust security solutions and stay at the forefront of cybersecurity innovation.*Email sign-up and proof of purchase required
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
Digit Oktavianto, Iqbal Muhardianto
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way.Cuckoo Malware Analysis will cover basic theories in sandboxing, automating malware analysis, and how to prepare a safe environment lab for malware analysis. You will get acquainted with Cuckoo Sandbox architecture and learn how to install Cuckoo Sandbox, troubleshoot the problems after installation, submit malware samples, and also analyze PDF files, URLs, and binary files. This book also covers memory forensics – using the memory dump feature, additional memory forensics using Volatility, viewing result analyses using the Cuckoo analysis package, and analyzing APT attacks using Cuckoo Sandbox, Volatility, and Yara.Finally, you will also learn how to screen Cuckoo Sandbox against VM detection and how to automate the scanning of e-mail attachments with Cuckoo.
Cyber Essentials. A guide to the Cyber Essentials and Cyber Essentials Plus certifications
IT Governance Publishing, Alan Calder
This book is a practical guide to achieving Cyber Essentials certification, a key step in protecting your organization from cyber threats. It starts with an overview of the Cyber Essentials scheme and explains why certification is crucial. The book covers common cyber attacks like ransomware, social engineering, and denial of service, helping you understand potential threats.It then explores essential technical controls needed for certification, such as firewalls, secure configurations, user access control, and malware protection. It also highlights best practices like managing security updates to keep systems secure. Each chapter offers actionable advice on implementing these controls, emphasizing their role in strengthening your cybersecurity framework.The book concludes with a detailed look at the Cyber Essentials certification process. It guides you through preparing for certification, completing the checklist, and undergoing the assessment. Additional resources and tips for Cyber Essentials Plus certification are included for those seeking further guidance.This comprehensive guide provides the knowledge and tools to secure your organization, achieve certification, and maintain strong cybersecurity resilience.