Bezpieczeństwo systemów
Jak rabuję banki (i inne podobne miejsca)
FC a.k.a. Freakyclown
System zabezpieczeń powinien działać dobrze na wielu poziomach. Poza odpowiednio przygotowaną siecią konieczne jest zapewnienie bezpieczeństwa fizycznego. Podobnie jak bezpieczeństwo cyfrowe, tak i to fizyczne powinno być starannie testowane. A najlepszym testem jest... włamanie, w efekcie którego powstanie rzetelny raport pozwalający na wzmocnienie systemu zabezpieczeń. Jednak nawet najlepszy raport nie daje wiedzy, jaką można uzyskać, towarzysząc hakerowi podczas planowania i przeprowadzania włamania. Dzięki tej świetnie napisanej, miejscami przezabawnej książce dowiesz się, na czym naprawdę polega testowanie granic bezpieczeństwa fizycznego. To fascynująca relacja o sposobach wynajdywania niedoskonałości zabezpieczeń, stosowania socjotechnik i wykorzystywania słabych stron ludzkiej natury. Wyjaśniono tu, jak działają systemy bezpieczeństwa banków i innych tego typu obiektów, zarówno na poziomie cyfrowym, jak i fizycznym, a także jak się wyszukuje podatności takich systemów. Pokazano też sporo narzędzi i technik, które ułatwiają uzyskanie dostępu do najlepiej zabezpieczonych obiektów na świecie. Dzięki tej książce przekonasz się, że przełamanie systemu bezpieczeństwa wymaga ogromnej cierpliwości, kreatywności i podejmowania szybkich decyzji, ale też że czasami można się do niego włamać z przerażającą łatwością. Przekonaj się, jak profesjonalista włamuje się do cyfrowej fortecy!
Jason Lee
Java is a powerful language that has applications in a wide variety of fields. From playing games on your computer to performing banking transactions, Java is at the heart of everything.The book starts by unveiling the new features of Java 9 and quickly walks you through the building blocks that form the basis of writing applications. There are 10 comprehensive projects in the book that will showcase the various features of Java 9. You will learn to build an email filter that separates spam messages from all your inboxes, a social media aggregator app that will help you efficiently track various feeds, and a microservice for a client/server note application, to name a few. The book covers various libraries and frameworks in these projects, and also introduces a few more frameworks that complement and extend the Java SDK.Through the course of building applications, this book will not only help you get to grips with the various features of Java 9, but will also teach you how to design and prototype professional-grade applications with performance and security considerations.
Java Programming for Beginners. Learn the fundamentals of programming with Java
SkillSprints Inc., Mark Lassoff
Java is an object-oriented programming language, and is one of the most widely accepted languages because of its design and programming features, particularly in its promise that you can write a program once and run it anywhere. Java Programming for Beginners is an excellent introduction to the world of Java programming, taking you through the basics of Java syntax and the complexities of object-oriented programming. You'll gain a full understanding of Java SE programming and will be able to write Java programs with graphical user interfaces that run on PC, Mac, or Linux machines. This book is full of informative and entertaining content, challenging exercises, and dozens of code examples you can run and learn from.By reading this book, you’ll move from understanding the data types in Java, through loops and conditionals, and on to functions, classes, and file handling. The book finishes with a look at GUI development and training on how to work with XML. The book takes an efficient route through the Java landscape, covering all of the core topics that a Java developer needs. Whether you’re an absolute beginner to programming, or a seasoned programmer approaching an object-oriented language for the first time, Java Programming for Beginners delivers the focused training you need to become a Java developer.
JavaScript Security. Learn JavaScript security to make your web applications more secure
Eugene Liang
This book is for JavaScript developers having basic web development knowledge and also for those who want to explore the security issues that arise from the use of JavaScript. Prior knowledge of how JavaScript is used, such as for DOM manipulation or to perform Ajax operations, is assumed.
Patrick Li
Jira Software is an agile project management tool that supports any agile methodology, be it scrum, Kanban, or your own unique flavour. From agile boards to reports, you can plan, track, and manage all your agile software development projects from a single tool. Jira Software brings the power of agile methodology to Atlassian Jira.This second edition of JIRA Agile Essentials, will help you dive straight into the action, exploring critical agile terminologies and concepts in the context of Jira Software. You will learn how to plan, track, and release great software. This book will teach you how to install and run Jira Software and set it up to run with Scrum and Kanban. It will also teach you to use Jira Software your way and run projects beyond the out-of-box Scrum and Kanban way, including a hybrid approach of both the methodologies and other options that come with Jira Software. Later, you will learn how to integrate it with the tools you are already using and enhance Jira with add-ons such as Confluence. You will learn to stay connected with your team from anywhere to ensure great development. Jira Software has numerous deployment options in the cloud, on your own infrastructure, or at a massive scale. You will be introduced to Bitbucket, Atlassian’s distributed version control system, which integrates seamlessly with Jira, allowing your team to work within the two applications as one harmonious environment.With this practical guide, you will develop a great working knowledge of Jira Software and your project management will become much more efficient.
Tom Canavan
This book will give you a strong, hands-on approach to security. It starts out with the most basic of considerations such as choosing the right hosting sites then moves quickly into securing the Joomla! site and servers. This is a security handbook for Joomla! sites. It is an easy-to-use guide that will take you step by step into the world of secured websites. This book is a must-read for anyone seriously using Joomla! for any kind of business, ranging from small retailers to larger businesses. With this book they will be able to secure their sites, understand the attackers, and more, without the drudging task of looking up in forums, only to be flamed, or not even find the answers. Prior knowledge of Joomla! is expected but no prior knowledge of securing websites is needed for this book. The reader will gain a moderate to strong level of knowledge on strengthening their sites against hackers.
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
Himanshu Sharma
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book’s crisp and task-oriented recipes.
Himanshu Sharma
Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report.By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book’s crisp and task-oriented recipes.