Kryptografia
Książki z tego działu pozwolą wam odkryć tajemnice kryptografii i szyfrowania danych. Lektura publikacji z kategorii Kryptografia pozwoli wam wnikliwie przyjrzeć się zagadnieniom takim jak: symetryczny szyfr blokowy (DES) czy RSA - asymetryczny algorytm kryptograficzny oraz ocenić ich rolę w zabezpieczaniu sieci przed włamaniem.
Dzięki tym podręcznikom opanujecie wykorzystywanie w praktyce wiedzy z dziedziny szyfrowania i kryptografii, jak zastosowanie algorytmów PGP, protokołów SSL i SSH czy implementacja algorytmów kryptograficznych w PHP, nie zapominając o wykorzystaniu podpisu elektronicznego.
Lester Nichols, Corey Ball
The Cybersecurity Architect's Handbook, 2nd Edition builds on the foundational, career-development, and best-practices coverage that made the first edition an essential resource, while expanding its scope with a new section of applied, industry-specific architecture chapters.In this new edition, the book introduces dedicated deep dives into AI security architecture, financial services architecture patterns, healthcare security architecture, cloud-native security architecture, critical infrastructure protection, and Zero Trust Architecture implementation — each with scenario-based examples, lab exercises, and domain-specific design guidance. New to this edition is the strategic framework inspired by Sun Tzu's The Art of War, woven throughout every chapter to reinforce that cybersecurity architects are not merely technicians but strategists and tacticians operating on a digital battlefield. By the end of this book, you will have a complete roadmap from foundational knowledge to real-world application across today’s critical industries and technology environments. You will explore best practices and emerging threats, including quantum computing and AI-driven attacks, to design, build, and defend the modern enterprise.
Tim Rains, Jeff Jones
Designing a cybersecurity strategy that actually works is difficult when threats evolve faster than budgets, teams, and tools. This book helps security leaders cut through noise by focusing on how organizations are compromised, which strategies succeed, and how to measure outcomes.Written by Tim Rains, a former Global Chief Security Advisor at Microsoft and senior security leader at AWS and Fortune-scale enterprises, this edition expands on the previous editions with major updates and new chapters. You will learn how threat intelligence, attack-centric security, intrusion kill chains, and MITRE ATT&CK can help defenders design stronger strategies.New and expanded content covers ransomware, API security, “living off the land” attacks, resilience as a cybersecurity strategy, and the security of AI systems alongside practical guidance on using AI to improve security outcomes. This book takes a practical, evidence-based approach to cybersecurity strategy, helping you assess trade-offs, avoid costly missteps, and communicate clearly with executives and boards.By the end of this book, you’ll be able to evaluate cybersecurity strategies more effectively, improve enterprise defenses, and communicate security priorities clearly to executives and boards.
Shane Molinari, Jim Packer
In today's world full of online threats, the complexity of harmful software presents a significant challenge for detection and analysis. This insightful guide will teach you how to apply the principles of data science to online security, acting as both an educational resource and a practical manual for everyday use.Data Science for Malware Analysis starts by explaining the nuances of malware, from its lifecycle to its technological aspects before introducing you to the capabilities of data science in malware detection by leveraging machine learning, statistical analytics, and social network analysis. As you progress through the chapters, you’ll explore the analytical methods of reverse engineering, machine language, dynamic scrutiny, and behavioral assessments of malicious software. You’ll also develop an understanding of the evolving cybersecurity compliance landscape with regulations such as GDPR and CCPA, and gain insights into the global efforts in curbing cyber threats.By the end of this book, you’ll have a firm grasp on the modern malware lifecycle and how you can employ data science within cybersecurity to ward off new and evolving threats.
Digital Ethics in the Age of AI. Navigating the ethical frontier today and beyond
IT Governance Publishing, Dr. Julie E. Mehan
Digital Ethics in the Age of AI explores the profound ethical challenges posed by the rise of artificial intelligence and its integration into our daily lives. The book covers AI’s disruptive effects across various sectors, including misinformation, privacy, and job displacement, offering clear explanations and real-world examples. The author delves into the role of AI in spreading misinformation and disinformation, including the creation of deepfakes, and highlights the increasing risk of online disinhibition driven by AI-powered interactions. The book also addresses the cognitive biases embedded within AI systems and the growing concerns over privacy, data security, and surveillance in an age of ubiquitous AI technologies. Finally, the book explores the potential for AI-driven job displacement, particularly in the cognitive class, and the societal implications of such disruptions. It also covers intellectual property challenges in the age of AI and the complexities surrounding generative AI’s impact on privacy and digital ownership. Offering solutions for mitigating these risks, Digital Ethics in the Age of AI provides a roadmap for navigating the ethical and regulatory landscape of AI today and in the future.
Disaster Recovery and Business Continuity. A quick guide for organisations and business managers
IT Governance Publishing, Thejendra B.S
This book delves into disaster recovery (DR) and business continuity (BC), offering practical strategies for organizations to prepare for and manage disruptions. It starts by defining core concepts of DR and BC, highlighting their role in crisis management. Early chapters explore business impact analysis, data protection, and risk assessment, while examining common IT and non-IT disasters like data loss, cyberattacks, and communication failures.Later sections focus on specific disaster scenarios, such as virus attacks, software failures, and data center risks, offering prevention methods and recovery plans. It also addresses human factors in DR, covering IT staff and contractor management, and the risks tied to outsourcing and project failures.In addition to IT risks, the book explores non-IT disasters, including health crises, financial challenges, and natural events, with strategies for mitigation. The final chapters provide guidance on creating and testing contingency plans, featuring checklists and mock run procedures. This book empowers readers to design, implement, and maintain effective DR and BC plans for their organization’s needs.
Mercury Learning and Information, Alexander I. Kheyfits
This book offers a comprehensive guide to discrete mathematics and its applications to cryptography. It is designed for students and professionals in fields such as discrete mathematics and finite mathematics, with all necessary prerequisites clearly explained and illustrated. The text introduces key concepts in number theory, coding theory, and information theory, which are essential for understanding cryptography.Understanding discrete mathematics is crucial for anyone working in cryptography and related fields. The book begins with a survey of elementary functions and moves on to propositional algebra, set theory, and algebraic structures like groups, rings, and fields. It covers binary relations, combinatorics, and elements of number theory, which are fundamental to cryptographic methods.Readers will explore topics such as Boolean functions, hashing functions, cryptographic maps, combinatorial circuits, and graph theory. The book also delves into advanced areas like finite automata, game theory, and Turing machines. Through numerous examples, problems, and solutions, readers will gain a solid foundation in discrete mathematics and its cryptographic applications.
Docker Deep Dive. Zero to Docker in a single book - Third Edition
Nigel Poulton
Embark on a transformative journey into the world of Docker and containers with this expertly crafted course. Starting with a high-level overview, you'll gain a solid understanding of containers and the significance of Docker in modern software development. Delve into Docker's core components, exploring essential standards, projects, and the intricacies of the Docker Engine, ensuring a robust foundation.As you progress, practical hands-on modules will guide you through working with images and containers, containerizing applications, and managing multi-container setups using Docker Compose. You'll learn to deploy applications efficiently with Docker Swarm and Docker Stacks, enhancing your ability to manage and scale containerized applications. The course also introduces Docker's integration with WebAssembly, offering a glimpse into cutting-edge container technologies.Concluding with advanced topics, you'll master Docker networking, including overlay networks and persistent data management with volumes. Emphasis on Docker security ensures you can safeguard your applications and data effectively. By the end of this course, you'll possess the skills and knowledge to leverage Docker's full capabilities, from development to deployment, ensuring you remain at the forefront of container technology.
Manoj P R
Ethereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities.The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You’ll learn about the security vulnerabilities, along with other protocols of Ethereum.Once you have understood the basics, you’ll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you’ll work with various Ethereum packages such as Truffle, Web3, and Ganache.By the end of this book, you’ll have comprehensively grasped the Ethereum principles and ecosystem.