Inne

33
Ebook

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments

Chris Gill, Shannon Kuehn

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 helps you master various cloud and data center management concepts in detail, helping you grow your expertise in configuring and managing Windows Server in on-premises, hybrid, and cloud-based workloads. Throughout the book, you'll cover all the topics needed to pass the AZ-801 exam and use the skills you acquire to advance in your career.With this book, you’ll learn how to secure your on-premises Windows Server resources and Azure IaaS workloads. First, you’ll explore the potential vulnerabilities of your resources and learn how to fix or mitigate them. Next, you'll implement high availability Windows Server virtual machine workloads with Hyper-V Replica, Windows Server Failover Clustering, and Windows File Server.You’ll implement disaster recovery and server migration of Windows Server in on-premises and hybrid environments. You’ll also learn how to monitor and troubleshoot Windows Server environments.By the end of this book, you'll have gained the knowledge and skills required to ace the AZ-801 exam, and you'll have a handy, on-the-job desktop reference guide.

34
Ebook

Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox

Digit Oktavianto, Iqbal Muhardianto

Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way.Cuckoo Malware Analysis will cover basic theories in sandboxing, automating malware analysis, and how to prepare a safe environment lab for malware analysis. You will get acquainted with Cuckoo Sandbox architecture and learn how to install Cuckoo Sandbox, troubleshoot the problems after installation, submit malware samples, and also analyze PDF files, URLs, and binary files. This book also covers memory forensics – using the memory dump feature, additional memory forensics using Volatility, viewing result analyses using the Cuckoo analysis package, and analyzing APT attacks using Cuckoo Sandbox, Volatility, and Yara.Finally, you will also learn how to screen Cuckoo Sandbox against VM detection and how to automate the scanning of e-mail attachments with Cuckoo.

35
Ebook

Cyber Security Kill Chain - Tactics and Strategies. Breaking down the cyberattack process and responding to threats

Gourav Nagar, Shreyas Kumar, Rohit Ghai

Gain a strategic edge in cybersecurity by mastering the systematic approach to identifying and responding to cyber threats through a detailed exploration of the cyber kill chain framework. This guide walks you through each stage of the attack, from reconnaissance and weaponization to exploitation, command and control (C2), and actions on objectives. Written by cybersecurity leaders Gourav Nagar, Director of Information Security at BILL Holdings, with prior experience at Uber and Apple, and Shreyas Kumar, Professor of Practice at Texas A&M, and former expert at Adobe and Oracle, this book helps enhance your cybersecurity posture. You’ll gain insight into the role of threat intelligence in boosting the cyber kill chain, explore the practical applications of the framework in real-world scenarios, and see how AI and machine learning are revolutionizing threat detection. You’ll also learn future-proofing strategies and get ready to counter sophisticated threats like supply chain attacks and living-off-the-land attacks, and the implications of quantum computing on cybersecurity.By the end of this book, you’ll have gained the strategic understanding and skills needed to protect your organization's digital infrastructure in the ever-evolving landscape of cybersecurity.

36
Ebook

CYBERPRZEMOC szczególnym zagrożeniem społeczeństwa informacyjnego

Marian Kowalewski, Marek Jakubiak

Wśród zagrożeń w cyberprzestrzeni szczególnie groźne jest zagrożenie cyberprzemocy – zagrożenie, które nie zawsze się dostrzega i wielokrotnie wręcz lekceważy, a które coraz częściej dotyka nas wszystkich. Najogólniej ujmując, cyberprzemoc możemy sprowadzić do prześladowania, zastraszania, szantażowania, nękania, obrażania i wyśmiewania innych osób lub grup za pośrednictwem współczesnych technik i technologii ICT. Prezentowana publikacja jest zbiorem wyników badań pracowników naukowo-dydaktycznych Zakładu Nauk o Administracji i Bezpieczeństwa w Administracji z Wydziału Administracji i Nauk Społecznych Politechniki Warszawskiej, które są upowszechniane i wykładane w procesie dydaktycznym.

37
Ebook

Cybersecurity Research, Education and Management: University Perspective

Andrzej Kraśniewski

In this paper, we focus on those aspects of cybersecurity that are most relevant to universities, intending to provide academic communities with some knowledge that might be useful in their research, education and administration activities related to cybersecurity.   The remaining part of the paper is organised as follows. In Section 2, we present basic characteristics of cybersecurity research, its scope and organisation, focusing on initiatives and activities relevant to universities. In Section 3, we show the landscape of cybersecurity education at universities, focusing on competencies acquired by beneficiaries of the educational provision. In Section 4, we discuss challenges faced by universities seen as institutions that have to assure a sufficient level of cybersecurity for their operation. Section 5 presents – as a case study – the developments in cybersecurity research, education and organization taking place at the Warsaw University of Technology. We conclude the paper with a few observations regarding the future developments in cybersecurity, relevant to universities.

38
Ebook

Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition

Tim Rains, Timothy Youngblood CISSP

Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services’ former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies.Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you’ll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You’ll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud.By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.

39
Ebook

Data Science for Malware Analysis. A comprehensive guide to using AI in detection, analysis, and compliance

Shane Molinari, Jim Packer

In today's world full of online threats, the complexity of harmful software presents a significant challenge for detection and analysis. This insightful guide will teach you how to apply the principles of data science to online security, acting as both an educational resource and a practical manual for everyday use.Data Science for Malware Analysis starts by explaining the nuances of malware, from its lifecycle to its technological aspects before introducing you to the capabilities of data science in malware detection by leveraging machine learning, statistical analytics, and social network analysis. As you progress through the chapters, you’ll explore the analytical methods of reverse engineering, machine language, dynamic scrutiny, and behavioral assessments of malicious software. You’ll also develop an understanding of the evolving cybersecurity compliance landscape with regulations such as GDPR and CCPA, and gain insights into the global efforts in curbing cyber threats.By the end of this book, you’ll have a firm grasp on the modern malware lifecycle and how you can employ data science within cybersecurity to ward off new and evolving threats.

40
Ebook

Data science od podstaw. Analiza danych w Pythonie

Joel Grus

Współczesne ogromne zbiory danych zawierają odpowiedzi na prawie każde pytanie. Równocześnie nauka o danych jest dziedziną, która cokolwiek onieśmiela. Znajduje się gdzieś pomiędzy subtelnymi umiejętnościami hakerskimi, twardą wiedzą z matematyki i statystyki a merytoryczną znajomością zagadnień z danej branży. Co więcej, dziedzina ta niezwykle dynamicznie się rozwija. Trud włożony w naukę o danych niewątpliwie się jednak opłaca: biegły analityk danych może liczyć na dobrze płatną, inspirującą i bardzo atrakcyjną pracę. Dzięki tej książce opanujesz najważniejsze zagadnienia związane z matematyką i statystyką, będziesz także rozwijać umiejętności hakerskie. W ten sposób zyskasz podstawy pozwalające na rozpoczęcie przygody z analizą danych. Gruntownie zapoznasz się z potrzebnymi narzędziami i algorytmami. Pozwoli Ci to lepiej zrozumieć ich działanie. Poszczególne przykłady, którymi zilustrowano omawiane zagadnienia, są przejrzyste, dobrze opisane i zrozumiałe. Podczas lektury książki poznasz biblioteki, które umożliwią zaimplementowanie omówionych technik podczas analizy dużych zbiorów danych. Szybko się przekonasz, że aby zostać analitykiem danych, wystarczy odrobina ciekawości, sporo chęci, mnóstwo ciężkiej pracy i... ta książka. Najważniejsze zagadnienia: Praktyczne wprowadzenie do Pythona Podstawy algebry liniowej, statystyki i rachunku prawdopodobieństwa w analizie danych Podstawy uczenia maszynowego Implementacje algorytmów modeli, w tym naiwny klasyfikator bayesowski, regresja liniowa, regresja logistyczna, drzewa decyzyjne, sieci neuronowe i grupowanie, MapReduce Systemy rekomendacji i mechanizmy przetwarzania języka naturalnego Korzystanie z mediów społecznościowych i baz danych. Python. Wyciśniesz z danych każdą kroplę wiedzy!