Kryptografia

Książki z tego działu pozwolą wam odkryć tajemnice kryptografii i szyfrowania danych. Lektura publikacji z kategorii Kryptografia pozwoli wam wnikliwie przyjrzeć się zagadnieniom takim jak: symetryczny szyfr blokowy (DES) czy RSA - asymetryczny algorytm kryptograficzny oraz ocenić ich rolę w zabezpieczaniu sieci przed włamaniem.

Dzięki tym podręcznikom opanujecie wykorzystywanie w praktyce wiedzy z dziedziny szyfrowania i kryptografii, jak zastosowanie algorytmów PGP, protokołów SSL i SSH czy implementacja algorytmów kryptograficznych w PHP, nie zapominając o wykorzystaniu podpisu elektronicznego.

65
Ładowanie...
EBOOK

Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity

Jitendra Chittoda

Solidity is among the most popular and contract-oriented programming languages used for writing decentralized applications (DApps) on Ethereum blockchain. If you’re looking to perfect your skills in writing professional-grade smart contracts using Solidity, this book can help.You will get started with a detailed introduction to blockchain, smart contracts, and Ethereum, while also gaining useful insights into the Solidity programming language. A dedicated section will then take you through the different Ethereum Request for Comments (ERC) standards, including ERC-20, ERC-223, and ERC-721, and demonstrate how you can choose among these standards while writing smart contracts. As you approach later chapters, you will cover the different smart contracts available for use in libraries such as OpenZeppelin. You’ll also learn to use different open source tools to test, review and improve the quality of your code and make it production-ready. Toward the end of this book, you’ll get to grips with techniques such as adding security to smart contracts, and gain insights into various security considerations. By the end of this book, you will have the skills you need to write secure, production-ready smart contracts in Solidity from scratch for decentralized applications on Ethereum blockchain.

66
Ładowanie...
EBOOK

Mastering Endpoint Management using Microsoft Intune Suite. Learn Everything About Intune Suite

Saurabh Sarkar, Rahul Singh, Rudy Ooms, Anoop...

Mastering Endpoint Management using Microsoft Intune Suite is one of the first books focused solely on Microsoft’s premium Intune features, offering hands-on, in-depth coverage for IT admins, security professionals, and endpoint engineers. Co-authored by a Microsoft Intune Product Manager and a Principal Consultant who is also a Microsoft Certified Trainer (MCT), this book walks you through real-world implementation using backend architecture diagrams, registry insights, and troubleshooting techniques.You’ll start with cloud public key infrastructure (PKI), learning how to simplify certificate-based authentication. Then you’ll move on to endpoint privilege management (EPM) to enforce least-privilege access at scale. You will learn about Enterprise App Management, which helps you how to modernize app delivery, as well as Advanced Analytics, which reveals how to use Kusto Query Language (KQL) and Security Copilot for actionable insights. The book also covers Remote Help for secure support and Microsoft Tunnel for enabling BYOD access, and concludes with a curated list of essential Intune learning resources.By the end of this Intune book, you will have the practical expertise to implement, manage, and troubleshoot Intune Suite confidently in real-world enterprise environments.

67
Ładowanie...
EBOOK

Microsoft Intune Cookbook. Practical recipes for configuring, managing, securing and automating identities, apps, and endpoints - Second Edition

Andrew Taylor, Lior Bela, Lavanya Lakshman

Microsoft Intune Cookbook, Second Edition is a hands-on guide for IT administrators managing and supporting modern endpoints, built around the latest Intune capabilities and endpoint security enhancements. Written by Andrew Taylor, an experienced Intune practitioner and active community contributor, it focuses on everyday admin tasks and turns them into clear, repeatable recipes. You’ll start by preparing an Intune tenant and setting up key Entra ID foundations, then work through managing Windows, macOS, iOS, Android, and Linux using practical, proven workflows. Along the way, you’ll configure policies, enroll devices, deploy apps, and strengthen security with compliance, Defender integration, encryption, and conditional access. You’ll also go beyond the portal by using PowerShell and Microsoft Graph to automate routine work, reduce manual effort, and make changes at scale. Monitoring and reporting are covered so you can track device health, security posture, and deployment outcomes with confidence.Advanced scenarios include secure remote support, privilege elevation, cloud-based certificate management, real-time queries, and AI-assisted guidance to speed up troubleshooting and decision-making. By the end, you’ll have practical techniques you can apply immediately to run a modern, cloud-first Intune environment.

68
Ładowanie...
EBOOK

NIST CSF 2.0. Your essential introduction to managing cybersecurity risks

IT Governance Publishing, Andrew Pattison

This comprehensive guide introduces the origins, aims, and components of the NIST Cybersecurity Framework (CSF) 2.0. It explores the core structure including functions, categories, subcategories, and profiles, and provides detailed implementation tiers and examples.Readers are then guided through a deep dive into all six framework categories—from Govern to Recover—and learn how to develop and apply risk management strategies within an organization. The content covers NIST SP 800-53, informative references, and practical quick-start guides to help translate theory into action.The final sections offer a seven-step implementation roadmap, including gap analysis, target profiles, and continuous improvement. The book concludes by mapping the CSF to international standards like ISO 27001 and ISO 22301, offering a well-rounded and interoperable cybersecurity strategy.

69
Ładowanie...
EBOOK

Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise

Vivek Acharya, Anand Eswararao Yerrapati, Nimesh Prakash

Hyperledger Fabric empowers enterprises to scale out in an unprecedented way, allowing organizations to build and manage blockchain business networks. This quick start guide systematically takes you through distributed ledger technology, blockchain, and Hyperledger Fabric while also helping you understand the significance of Blockchain-as-a-Service (BaaS).The book starts by explaining the blockchain and Hyperledger Fabric architectures. You'll then get to grips with the comprehensive five-step design strategy - explore, engage, experiment, experience, and in?uence. Next, you'll cover permissioned distributed autonomous organizations (pDAOs), along with the equation to quantify a blockchain solution for a given use case. As you progress, you'll learn how to model your blockchain business network by defining its assets, participants, transactions, and permissions with the help of examples. In the concluding chapters, you'll build on your knowledge as you explore Oracle Blockchain Platform (OBP) in depth and learn how to translate network topology on OBP.By the end of this book, you will be well-versed with OBP and have developed the skills required for infrastructure setup, access control, adding chaincode to a business network, and exposing chaincode to a DApp using REST configuration.

70
Ładowanie...
EBOOK

PCI DSS Version 4.0.1. A guide to the payment card industry data security standard

IT Governance Publishing, Stephen Hancock

This book provides an essential resource for anyone involved in managing or ensuring PCI DSS compliance. It begins by introducing the Payment Card Industry Data Security Standard (PCI DSS), explaining its importance, and the regulatory framework that governs it. Readers will understand how to assess their organization’s compliance status and the vital steps to avoid data breaches. The book offers a comprehensive exploration of compliance programs and how organizations can design their own effective strategies.The text then dives into the specifics of PCI DSS, focusing on its core components and requirements. Key chapters describe how to comply with and maintain compliance, as well as how to use tools like the PCI self-assessment questionnaire (SAQ). Real-world case studies of cardholder data breaches highlight the consequences of non-compliance. Readers will also learn about the integration of PCI DSS with other standards like ISO/IEC 27001.Throughout, this guide emphasizes practical advice for implementing key security frameworks such as the Software Security Framework (SSF) and Point-to-Point Encryption (P2PE). By the end of the book, readers will have a clear roadmap to not only meet but sustain PCI DSS compliance and strengthen their organization's data security practices.

71
Ładowanie...
EBOOK

Podstawy kryptografii. Wydanie III

Marcin Karbowski

Przekonaj się, jak fascynująca jest kryptografia! Poznaj historię rozwoju kryptografii Opanuj jej matematyczne podstawy Rozpracuj najważniejsze algorytmy kryptograficzne Dowiedz się, jak zastosować je w praktyce Kryptografia to dziedzina nauki, której sedno stanowią sposoby bezpiecznego przekazywania informacji. Jest ona niemal tak stara, jak nasza cywilizacja, a dziś rozwija się w sposób niezwykle dynamiczny. Gdy tylko narodziły się pierwsze metody zapisu i komunikowania się, pojawiła się też konieczność zabezpieczenia informacji przed tymi, którzy mogliby wykorzystać je na niekorzyść osób dysponujących tymi informacjami. Od bezpieczeństwa ważnych informacji zależały często losy całych państw i narodów. O rozstrzygnięciach wielkich bitew nierzadko decydowały inteligencja i determinacja pojedynczych osób, które potrafiły odpowiednio skutecznie szyfrować (bądź też deszyfrować) nadawane (lub przechwytywane) komunikaty. O tej fascynującej dziedzinie wiedzy opowiada książka Podstawy kryptografii. Wydanie III. Wprowadza ona czytelnika w podstawowe zagadnienia kryptografii bez przygniatania nadmiarem teorii i skomplikowaną matematyką. Kusi za to barwnymi opisami i pasjonującymi przykładami "kryptograficznych wojen". Można dzięki niej poznać historię rozwoju technik szyfrowania informacji, matematyczne podstawy kryptografii, stojącą za nią teorię oraz praktyczne zastosowania tej nauki. Niezależnie od tego, czy chcesz poznać kryptografię na własny użytek, czy jest Ci to potrzebne w celach zawodowych, książka ta okaże się doskonałym przewodnikiem po świecie szyfrów, kluczy i algorytmów zabezpieczających dane. Znajdziesz w niej informacje na temat protokołów SSL i SSH, a także szczegółowy opis algorytmu SHA3. Przegląd klasycznych sposobów szyfrowania Matematyczne podstawy kryptografii Praktyczne zastosowanie mechanizmów matematycznych Teoria kryptoanalizy i informacji oraz jej praktyczne wykorzystanie Przegląd protokołów kryptograficznych Klucze publiczne i prywatne Zasady zabezpieczania danych, połączeń i systemów komputerowych Potwierdzanie tożsamości za pomocą podpisów elektronicznych Zabezpieczanie stron internetowych i szyfrowanie baz danych Naucz się chronić cenne dane!

72
Ładowanie...
EBOOK

Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies

Ganesh Prasad Kumble, Anantha Krishnan

AI and blockchain are two emerging technologies catalyzing the pace of enterprise innovation. With this book, you’ll understand both technologies and converge them to solve real-world challenges.This AI blockchain book is divided into three sections. The first section covers the fundamentals of blockchain, AI, and affiliated technologies, where you’ll learn to differentiate between the various implementations of blockchains and AI with the help of examples. The second section takes you through domain-specific applications of AI and blockchain. You’ll understand the basics of decentralized databases and file systems and connect the dots between AI and blockchain before exploring products and solutions that use them together. You’ll then discover applications of AI techniques in crypto trading. In the third section, you’ll be introduced to the DIApp design pattern and compare it with the DApp design pattern. The book also highlights unique aspects of SDLC (software development lifecycle) when building a DIApp, shows you how to implement a sample contact tracing application, and delves into the future of AI with blockchain.By the end of this book, you’ll have developed the skills you need to converge AI and blockchain technologies to build smart solutions using the DIApp design pattern.

73
Ładowanie...
EBOOK

Practical Debugging for Embedded ARM Systems. Core techniques for tracing, profiling, and fixing system-level faults

Nino Vidovic

Are you truly unlocking the full potential of your embedded debugging tools? This hands-on guide cuts through the confusion of common workflows and shows you how to trace, profile, and debug ARM-based systems like a professional firmware engineer.Written by an industry expert, this book guides you through practical debugging scenarios using real hardware setups. You’ll explore both essential and advanced techniques, from setting breakpoints and analyzing memory to using hardware tracing, power profiling, and RTOS awareness. Through real-world crash analysis, you'll learn how to detect stack overflows, communication errors, memory leaks, and more.You will explore practical examples based on ARM Cortex-M target devices, which help you build structured and efficient debugging workflows. The learned skills can then be easily applied to other chip architectures as well. You’ll walk away with a clear understanding of the tools available, how to apply them in complex firmware projects, and the confidence to tackle even the most elusive bugs in production systems.Whether you’re refining your setup or debugging embedded systems at scale, this book will sharpen your skills and elevate your embedded development workflow.*Email sign-up and proof of purchase required

74
Ładowanie...
EBOOK

Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain

Arunkumar Krishnakumar

Are quantum computing and Blockchain on a collision course or will they be the most important trends of this decade to disrupt industries and life as we know it?Fintech veteran and venture capitalist Arunkumar Krishnakumar cuts through the hype to bring us a first-hand look into how quantum computing and Blockchain together are redefining industries, including fintech, healthcare, and research. Through a series of interviews with domain experts, he also explores these technologies’ potential to transform national and global governance and policies – from how elections are conducted and how smart cities can be designed and optimized for the environment, to what cyberwarfare enabled by quantum cryptography might look like. In doing so, he also highlights challenges that these technologies have to overcome to go mainstream.Quantum Computing and Blockchain in Business explores the potential changes that quantum computing and Blockchain might bring about in the real world. After expanding on the key concepts and techniques, such as applied cryptography, qubits, and digital annealing, that underpin quantum computing and Blockchain, the book dives into how major industries will be impacted by these technologies. Lastly, we consider how the two technologies may come together in a complimentary way.

75
Ładowanie...
EBOOK

Rust for Blockchain Application Development. Learn to build decentralized applications on popular blockchain technologies using Rust

Akhil Sharma

Before Rust, blockchain developers didn’t have a systems programming language that was type-safe, fast, and, at the same time, had stable and easy memory management. Rust proved to be a boon for developers and works as the perfect solution for not only blockchain and protocol development but also dApp development.Rust for Blockchain Application Development focuses on demonstrating solutions that can help blockchain developers productize decentralized applications using Rust, which is a complex language with a steep learning curve.This book starts with basic Rust language concepts and then builds on these concepts to enable you to develop your own blockchain from scratch. As you progress, you’ll learn how to build dApps on popular chains like Solana and NEAR. You’ll also be guided through creating Ethereum dApps using Foundry (Rust). Finally, you’ll develop a custom blockchain using Substrate by Parity (Polkadot). The book provides a complete 360-degree view of Rust in the blockchain ecosystem.By the end of this Rust book, you’ll have a thorough understanding of how to apply your Rust knowledge to building dApps and blockchains from scratch.

76
Ładowanie...
EBOOK

Securing Cloud Services. A Comprehensive Approach to Safeguarding Cloud Infrastructure, Services, and Data

IT Governance Publishing, Lee Newcombe

Cloud computing plays a critical role in modern business, but with it comes a host of security challenges. This book explores the intricacies of securing cloud services, starting with foundational concepts of cloud computing and moving into specific service and deployment models. It provides insights into balancing security benefits with potential risks such as availability issues, shadow IT, and information leakage. The book goes on to focus on security threats, from hackers and insiders to government entities, while offering strategies to mitigate these risks. The practical approach continues with a deep dive into security architecture, providing a structured model to secure cloud environments across IaaS, PaaS, SaaS, and more. Further, it examines the regulatory landscape, including compliance requirements, privacy concerns, and data protection laws that impact cloud service security. Finally, the book concludes with projections about the future of cloud security and emerging challenges. Readers will gain not only the theoretical foundations but also real-world insights that they can apply to strengthen their cloud service security.

77
Ładowanie...
EBOOK

Security Intelligence with Sumo Logic. Your guide to an effective security detection and response program with the Sumo Logic platform

Bogdan Kireeve, Chas Clawson

Modernize your security operations with Sumo Logic’s Continuous Intelligence Platform that delivers real-time detection, analysis, and response to threats, and find out how it enables security teams to unify monitoring, apply advanced analytics, and strengthen defenses across diverse environments.Step by step, this guide takes you through configuring Sumo Logic to ingest and visualize log data, running versatile queries, and using Security Apps to meet compliance and audit demands. You’ll learn how to take full advantage of Cloud SIEM by creating enriched records, building correlation rules, proactively threat hunting, and tuning signals to reduce false positives.Beyond traditional SIEM use cases, discover how Sumo Logic supports modern DevSecOps practices that embed security into the development lifecycle without compromising delivery speed and features such as entity inventory, third-party integrations, and best practices that enhance investigation and detection accuracy.Finally, you’ll prepare for the future of security intelligence, where automation, machine learning, and AI-driven insights reshape threat defense, ensuring you’re ready to transform your security operations with Sumo Logic Cloud SIEM.*Email sign-up and proof of purchase required

78
Ładowanie...
EBOOK

Security with Go. Explore the power of Golang to secure host, web, and cloud services

John Daniel Leon

Go is becoming more and more popular as a language for security experts. Its wide use in server and cloud environments, its speed and ease of use, and its evident capabilities for data analysis, have made it a prime choice for developers who need to think about security.Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information.Defensive topics include cryptography, forensics, packet capturing, and building secure web applications.Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques.

79
Ładowanie...
EBOOK

SOC Analyst Career Guide. Become highly skilled in security tools, tactics, and techniques to jumpstart your SOC analyst career

Kyler Kent

As cyberattacks continue to disrupt modern enterprises, organizations urgently need vigilant security operations center (SOC) analysts who can detect and stop threats fast. With modern SIEMs and ingestion strategies, much of the necessary data is already within easy reach. This book provides you with the daily tactics, techniques, and procedures of a SOC analyst and shows how to exceed expectations in a modern SOC.The book builds a solid foundation in security operations, preparing you for the SOC analyst role and other positions within the SOC. With this base in place, you’ll advance into key SOC roles and blue team principles, such as detection and engineering. You’ll be able to clearly articulate your future as a SOC analyst in an interview as well as talk about your career path to impress prospective employers. You’ll get to grips with advanced threat actors, including advanced persistent threats (APTs) that wield considerable resources in campaigning against an organization. The chapters cover important concepts, such as governance, risk, and compliance (GRC), blue and red team tools, network security, web app security, and job search skills.By the end of this book, you’ll be able to demonstrate competency and acquire a SOC analyst position with an additional career outlook moving forward.

80
Ładowanie...
EBOOK

Solidity Programming Essentials. A beginner's guide to build smart contracts for Ethereum and blockchain

Ritesh Modi

Solidity is a contract-oriented language whose syntax is highly influenced by JavaScript, and is designed to compile code for the Ethereum Virtual Machine. Solidity Programming Essentials will be your guide to understanding Solidity programming to build smart contracts for Ethereum and blockchain from ground-up.We begin with a brief run-through of blockchain, Ethereum, and their most important concepts or components. You will learn how to install all the necessary tools to write, test, and debug Solidity contracts on Ethereum. Then, you will explore the layout of a Solidity source file and work with the different data types. The next set of recipes will help you work with operators, control structures, and data structures while building your smart contracts. We take you through function calls, return types, function modifers, and recipes in object-oriented programming with Solidity. Learn all you can on event logging and exception handling, as well as testing and debugging smart contracts.By the end of this book, you will be able to write, deploy, and test smart contracts in Ethereum. This book will bring forth the essence of writing contracts using Solidity and also help you develop Solidity skills in no time.