Bezpieczeństwo systemów

W kategorii Bezpieczeństwo systemów zebrano książki, które pomogą zabezpieczyć Wasze prywatne lub firmowe komputery przed programami szpiegującymi, atakami hakerów czy wirusami. Poznacie procedury i normy związane z profesjonalną ochroną informacji oraz procedury przeprowadzenia audytu bezpieczeństwa. Opanujecie zaawansowane techniki zapewniające bezpieczeństwo komputerów, niezależnie jaki system operacyjny został na nich zainstalowany. Jeżeli jesteście twórcami oprogramowania, to znajdziecie tutaj informacje jak skutecznie zabezpieczyć własne aplikacje przed crackerami i hackerami, oraz jak tworzyć bezpieczne w użytkowaniu programy czy aplikacje sieciowe.

409
Ładowanie...
EBOOK

Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer

Max Kanat-Alexander

In Understanding Software, Max Kanat-Alexander, Technical Lead for Code Health at Google, shows you how to bring simplicity back to computer programming. Max explains to you why programmers suck, and how to suck less as a programmer. There’s just too much complex stuff in the world. Complex stuff can’t be used, and it breaks too easily. Complexity is stupid. Simplicity is smart.Understanding Software covers many areas of programming, from how to write simple code to profound insights into programming, and then how to suck less at what you do! You'll discover the problems with software complexity, the root of its causes, and how to use simplicity to create great software. You'll examine debugging like you've never done before, and how to get a handle on being happy while working in teams.Max brings a selection of carefully crafted essays, thoughts, and advice about working and succeeding in the software industry, from his legendary blog Code Simplicity. Max has crafted forty-three essays which have the power to help you avoid complexity and embrace simplicity, so you can be a happier and more successful developer.Max's technical knowledge, insight, and kindness, has earned him code guru status, and his ideas will inspire you and help refresh your approach to the challenges of being a developer.

410
Ładowanie...
EBOOK

Unified SecOps Playbook. End-to-end enterprise security with Microsoft Sentinel, Defender XDR, and Security Copilot

Jose Lazaro, Marcus Burnap, Rod Trent

In the evolving cybersecurity landscape, the integration of Microsoft Defender XDR and Security Copilot presents a game-changing approach to modern threat detection and response. With this book, you’ll understand how these tools, in conjunction with Microsoft’s extensive ecosystem, enable organizations to outpace emerging threats.Starting with core XDR concepts, security frameworks, and Microsoft’s competitive advantages in cybersecurity, you’ll master the foundational aspects of deploying Microsoft Sentinel, configuring security infrastructure, and optimizing security operations using AI-driven tools. Advanced topics, including Zero-Trust strategies, DevSecOps integration, and partner programs, prepare you for increasingly sophisticated scenarios in Microsoft cloud security. You’ll also explore practical deployment workflows, covering cost analysis, role-based access configurations, and fast-tracked Sentinel deployment using CI/CD pipelines.By the end of this book, you’ll have gained insights into security automation, threat detection, and AI integration with Security Copilot for optimized operations and have the confidence to implement and manage Microsoft Defender XDR and Sentinel in complex environments, driving scalable and secure solutions.*Email sign-up and proof of purchase required

411
Ładowanie...
EBOOK

Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4

Jessica Plowman

With the ability to put players directly in the game, virtual reality gives users the chance to experience digital worlds directly. Nevertheless, many designers are unsure where to start when working with this amazing technology.With this book, you will learn user experience design processes and create immersive gameplay experiences designed for entertainment and player comfort. Using the power of Unreal Engine 4’s Blueprint visual scripting language, you will build player interaction and locomotion systems from scratch and use these flexible systems to create a sample game, as well as develop functional 2D and 3D user interfaces for players to interact with. And also learn the best practices for creating game art for virtual reality. Finally, you will learn how to test your application with your target audience and finalize your game for distribution.By the end of this book, you will have the knowledge to be able to make the leap from traditional game development to creating immersive virtual reality experiences using Unreal Engine 4.

412
Ładowanie...
EBOOK

Unveiling NIST Cybersecurity Framework 2.0. Secure your organization with the practical applications of CSF

Jason Brown

Discover what makes the NIST Cybersecurity Framework (CSF) pivotal for both public and private institutions seeking robust cybersecurity solutions with this comprehensive guide to implementing the CSF, updated to cover the latest release, version 2.0.This book will get you acquainted with the framework’s history, fundamentals, and functions, including governance, protection, detection, response, and recovery. You’ll also explore risk management processes, policy development, and the implementation of standards and procedures. Through detailed case studies and success stories, you’ll find out about all of the practical applications of the framework in various organizations and be guided through key topics such as supply chain risk management, continuous monitoring, incident response, and recovery planning. You’ll see how the NIST framework enables you to identify and reduce cyber risk by locating it and developing project plans to either mitigate, accept, transfer, or reject the risk.By the end of this book, you’ll have developed the skills needed to strengthen your organization’s cybersecurity defenses by measuring its cybersecurity program, building a strategic roadmap, and aligning the business with best practices.

413
Ładowanie...
EBOOK

Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization

Thomas Marsland, Jaclyn "Jax" Scott

This comprehensive guide provides clear explanations, best practices, and real-world examples to help readers navigate the NIST Risk Management Framework (RMF) and develop practical skills for implementing it effectively. By the end, readers will be equipped to manage and mitigate cybersecurity risks within their organization.

414
Ładowanie...
EBOOK

User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams

Peter W. Szabo

Do you want to create better products and innovative solutions? User experience maps will help you understand your users and improve communication with them. Maps can also champion user-centricity within the organization.This book is the first print resource covering two advanced mapping techniques—the behavioral change map and the 4D UX map. You’ll explore user story maps, task models, and journey maps, while also creating wireflows, mental model maps, ecosystem maps, and solution maps. You’ll learn how to use insights from real users to create and improve your maps and products.The book delves into each major user experience map type, ranging from simple techniques based on sticky notes to more complex map types, and guides you in solving real-world problems with maps. You’ll understand how to create maps using a variety of software products, including Adobe Illustrator, Balsamiq Mockups, Axure RP, and Microsoft Word. Besides, you can draw each map type with pen and paper too!The book also showcases communication techniques and workshop ideas. You’ll learn about the Kaizen-UX management framework, developed by the author, now used by many agencies and in-house UX teams in Europe and beyond.Buying this book will give you hundreds of hours worth of user experience knowledge, from one of the world’s leading UX consultants. It will change your users’ world for the better. If you are still not convinced, we have hidden some cat drawings in it, just in case.

415
Ładowanie...
EBOOK

Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności

Matthew Hickey, Jennifer Arcuri

Bezpieczeństwo systemów informatycznych niejednemu spędza sen z powiek, konsekwencje udanego włamania bowiem mogą oznaczać milionowe straty i zrujnowaną reputację. Przy czym odpowiednie zabezpieczenie systemu jest dla wielu podmiotów niezwykle trudne, gdyż w zespołach brakuje osób z odpowiednimi umiejętnościami. Nawet zatrudnienie zewnętrznego konsultanta nie daje gwarancji, że firmowy system informatyczny będzie bezpieczny i odpowiednio chroniony przed atakami. Okazuje się, że najpewniejszą metodą jest gruntowne przyswojenie wiedzy i umiejętności hakerskich. Ta książka stanowi kurs praktycznych technik hakowania, dzięki którym dokładnie poznasz zasady i narzędzia używane do przełamywania zabezpieczeń i uzyskiwania dostępu do chronionych danych. Dowiesz się, w jaki sposób należy się przygotować do przeprowadzenia ataku, a także jakie aspekty infrastruktury sieciowej stanowią o jej niedoskonałości i podatności. Poznasz metody zbierania informacji z otwartych źródeł, systemu DNS, usług pocztowych, serwerów WWW, sieci VPN, serwerów plików lub baz danych i aplikacji sieciowych. Nauczysz się korzystać z narzędzi i exploitów do hakowania systemów: Linux, Unix i Microsoft Windows. Do praktycznych ćwiczeń posłużą Ci laboratoria - specjalne środowiska przygotowane do bezpiecznego hakowania, dzięki czemu łatwiej zdobędziesz potrzebne umiejętności. W książce: teoretyczne, praktyczne, prawne i etyczne aspekty hakowania koncepcja purpurowych zespołów protokoły współczesnego internetu i ich problemy włamywanie się do maszyn pracujących pod kontrolą różnych systemów operacyjnych krytyczne podatności aplikacji sieciowych metody zawodowego hakera Przekonaj się, jak łatwo jest się włamać do Twojego systemu

416
Ładowanie...
EBOOK

Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version

Richard Diver, Manuel Singer, Jeff Stokes

Microsoft's launch of Windows 10 is a step toward satisfying enterprise administrators' needs for management and user experience customization. This book provides enterprise administrators with the knowledge needed to fully utilize the advanced feature set of Windows 10 Enterprise.This practical guide shows Windows 10 from an administrator's point of view. You'll focus on areas such as installation and configuration techniques based on your enterprise requirements, various deployment scenarios and management strategies, and setting up and managing admin and other user accounts. You'll see how to configure Remote Server Administration Tools to remotely manage Windows Server and Azure Active Directory. Lastly, you will learn modern mobile device management for effective BYOD and how to enable enhanced data protection, system hardening, and enterprise-level security with the new Windows 10 in order to prevent data breaches and to impede attacks.By the end of this book, you will know the key technologies and capabilities in Windows 10 and will confidently be able to manage and deploy these features in your organization.