Kryptografia

Książki z tego działu pozwolą wam odkryć tajemnice kryptografii i szyfrowania danych. Lektura publikacji z kategorii Kryptografia pozwoli wam wnikliwie przyjrzeć się zagadnieniom takim jak: symetryczny szyfr blokowy (DES) czy RSA - asymetryczny algorytm kryptograficzny oraz ocenić ich rolę w zabezpieczaniu sieci przed włamaniem.

Dzięki tym podręcznikom opanujecie wykorzystywanie w praktyce wiedzy z dziedziny szyfrowania i kryptografii, jak zastosowanie algorytmów PGP, protokołów SSL i SSH czy implementacja algorytmów kryptograficznych w PHP, nie zapominając o wykorzystaniu podpisu elektronicznego.

81
Ładowanie...
EBOOK

The Azure Cloud Native Architecture Mapbook. Design and build Azure architectures for infrastructure, applications, data, AI, and security - Second Edition

Stéphane Eyskens, Scott Hanselman

Designing effective cloud-native architectures on Azure often feels overwhelming—especially when trying to translate complex requirements into reliable solutions. This book solves that problem by giving you a structured, visual guide to building modern systems that are scalable, secure, and production-ready.You'll discover how to plan, design, and communicate Azure-based architectures using practical reference diagrams mapped to real-world use cases. Organized by domains including infrastructure, applications, data, container orchestrators, AI, and security, each chapter walks you through the key services, patterns, and decisions that underpin successful solutions.Throughout the book, you'll find over 40 detailed architecture maps, created and curated by a seasoned Microsoft cloud solution architect. These maps illustrate how to align Azure services with business goals, manage hybrid and multi-cloud complexity, and incorporate best practices for governance, resilience, and cost optimization.This book gives you more than just diagrams; it offers the confidence to design cloud solutions that scale and perform. Whether you're modernizing a legacy stack or building greenfield applications, the Azure Cloud Native Architecture Mapbook is your trusted design companion from concept to delivery.

82
Ładowanie...
EBOOK

The California Privacy Rights Act (CPRA). An implementation and compliance guide

IT Governance Publishing, Preston Bukaty

This comprehensive guide to the California Privacy Rights Act (CPRA) explores its impact on businesses and consumers within California. The book begins with a clear explanation of CPRA’s territorial and material jurisdiction, providing readers with an understanding of where and how the law applies. It delves into key definitions critical for businesses and individuals alike, covering terms such as personal information, pseudonymization, and consumer rights. One of the focal points of the book is the examination of the rights granted to consumers, including the right to access, delete, and opt-out of data sales. Alongside this, it addresses the business obligations, such as the need for privacy notices and compliance with security requirements. The book also offers an analysis of penalties for non-compliance and breach notification procedures, making it an essential resource for understanding the legal landscape of consumer privacy in California. It concludes with an overview of related laws that further influence how businesses must manage customer data.

83
Ładowanie...
EBOOK

The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework

IT Governance Publishing, Alan Calder

This book offers a deep dive into cybersecurity, equipping professionals with tools and frameworks to protect organizations from diverse cyber threats. It covers critical areas such as information security, cyber resilience, and the regulatory and contractual requirements organizations must meet. The book delves into threat anatomy, analyzing technical, human, physical, and third-party vulnerabilities, and includes real-world case studies like the TalkTalk breach and WannaCry ransomware attack.It also emphasizes third-party risk management to ensure robust security practices across all areas. The book introduces the IT Governance Cyber Resilience Framework (CRF), a structured method for managing critical systems, guiding readers through the processes of identification, detection, response, recovery, and continual improvement. Practical strategies in areas like asset management, network security, and staff training are included.The final section offers actionable steps for implementing cybersecurity practices and introduces reference frameworks like NIST and ISO 27001 for compliance and ongoing improvement. With real-world examples and actionable frameworks, this guide is essential for professionals aiming to enhance their organization's cyber resilience.

84
Ładowanie...
EBOOK

The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network

Vijay Krishnan

Web3, the new blockchain-based web, is often hailed as the future of the internet. Driven by technologies such as cryptocurrencies, NFTs, DAOs, decentralized finance, and more, Web3’s aim is to give individuals more control over the web communities they belong to. Whether you’re a beginner or an experienced developer, this book will help you master the intricacies of Web3 and its revolutionary technologies.Beginning with a concise introduction to blockchain and the Ethereum ecosystem, this book quickly immerses you in real-world blockchain applications. You’ll work on carefully crafted hands-on exercises that are designed for beginners as well as users with prior exposure. The chapters show you how to build and deploy smart contracts, while mastering security controls and discovering best practices for writing secure code. As you progress, you’ll explore tokenization and gain proficiency in minting both fungible and non-fungible tokens (NFTs) with the help of step-by-step instructions. The concluding chapters cover advanced topics, including oracles, Layer 2 (L2) networks, rollups, zero knowledge proofs, and decentralized autonomous organizations (DAOs).By the end of this Web3 book, you’ll be well-versed in the Web3 ecosystem and have the skills to build powerful and secure decentralized applications.

85
Ładowanie...
EBOOK

The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems

Rod Stephens

C# is a multi-paradigm programming language. The Modern C# Challenge covers with aspects of the .NET Framework such as the Task Parallel Library (TPL) and CryptoAPI. It also encourages you to explore important programming trade-offs such as time versus space or simplicity. There may be many ways to solve a problem and there is often no single right way, but some solutions are definitely better than others. This book has combined these solutions to help you solve real-world problems with C#.In addition to describing programming trade-offs, The Modern C# Challenge will help you build a useful toolkit of techniques such as value caching, statistical analysis, and geometric algorithms.By the end of this book, you will have walked through challenges in C# and explored the .NET Framework in order to develop program logic for real-world applications.

86
Ładowanie...
EBOOK

The Ransomware Threat Landscape. Prepare for, recognise and survive ransomware attacks

IT Governance Publishing, Alan Calder

The Ransomware Threat Landscape offers an in-depth examination of ransomware, explaining how it works, its modes of access, and the consequences of attacks. The book begins by detailing the mechanisms of ransomware, how cybercriminals exploit vulnerabilities, and the damage it causes to organizations. It further explores the types of ransomware, their infection methods, and how attackers use ransomware for financial gain.The guide provides practical, actionable advice on basic and advanced cybersecurity measures to protect against ransomware. Topics like cybersecurity hygiene, staff awareness, and the importance of creating an anti-ransomware program are covered. The book emphasizes the role of a well-structured risk management framework and its application in preventing attacks and mitigating fallout from infections.For organizations of all sizes, the book offers tailored controls to strengthen defenses. It also explains the steps needed for a comprehensive recovery plan. Advanced prevention strategies for larger enterprises are discussed, making this guide suitable for IT professionals, security experts, and organizational leaders aiming to protect their systems from ransomware threats.

87
Ładowanie...
EBOOK

The Security Consultant's Handbook. Essential Strategies for Building and Managing a Security Consulting Business

IT Governance Publishing, Richard Bingley

Becoming a successful security consultant requires a unique set of skills that span both the business and security worlds. This handbook serves as a practical guide to help professionals navigate the complex landscape of security consulting. It covers everything from the entrepreneurial aspects of starting a business to the essential security disciplines like private investigations, information security, and protective security. You’ll also explore the growing importance of resilience in both personal and organizational contexts.The book also delves into the crucial elements of security legislation and regulation, offering a thorough understanding of the legal frameworks that affect security professionals. From UK human rights laws to international laws related to corporate management and conflict, readers will gain the knowledge necessary to operate securely and legally in a variety of environments. Whether you are just starting out or looking to refine your security consulting expertise, this handbook provides the insights needed to thrive in the ever-evolving security industry. It’s a must-read for anyone seeking to build a reputation as a trusted expert in the security consulting field.

88
Ładowanie...
EBOOK

Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture

Brett Crawley, Adam Shostack

Are you looking to navigate security risks, but want to make your learning experience fun? Here's a comprehensive guide that introduces the concept of play to protect, helping you discover the threats that could affect your software design via gameplay.Each chapter in this book covers a suit in the Elevation of Privilege (EoP) card deck (a threat category), providing example threats, references, and suggested mitigations for each card. You’ll explore the methodology for threat modeling—Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S.T.R.I.D.E.) with Privacy deck and the T.R.I.M. extension pack. T.R.I.M. is a framework for privacy that stands for Transfer, Retention/Removal, Inference, and Minimization. Throughout the book, you’ll learn the meanings of these terms and how they should be applied. From spotting vulnerabilities to implementing practical solutions, the chapters provide actionable strategies for fortifying the security of software systems.By the end of this book, you will be able to recognize threats, understand privacy regulations, access references for further exploration, and get familiarized with techniques to protect against these threats and minimize risks.