Bezpieczeństwo sieci

81
Завантаження...
EЛЕКТРОННА КНИГА

Computer Networks in Packet Tracer for beginners

Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy...

The book: “COMPUTER NETWORKS IN PACKET TRACER FOR BEGINNERS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of configuring network devices. He will learn network services such as: TELNET, SSH, FTP, EMAIL, DHCP, DNS and routing protocols RIP, EIGRP, OSPF. Learn how to design and deploy virtual VLAN networks. The authors, describing the issues of administering computer networks, use many examples and exercises. The book is an updated compilation of our Packet Tracer publications for CISCO courses, has a described, changed interface of the currently latest Packet Tracer software and contains a set of new examples and exercises. The authors of this book are an intergenerational and interdisciplinary team. A talented student of the School of Communication in Gdańsk, Damian Strojek. His passion is computer networks, he has a set of CCNA R&S certificates and is in the middle of the CCNA Security educational path. Jerzy Kluczewski, long-time instructor of the CISCO CCNA Academy. His authorial achievements already include several books on the Packet Tracer simulator. He gained his experience while working in industry, currently he is a lecturer at the WSB University in Gdańsk. Robert Wszelaki is passionate about networking and programming. He completed a full CISCO CCNA course. He is a graduate of ZS1 in Piekary Śląskie, currently studying computer science at the Faculty of Automatic Control, Electronics and Computer Science of the Silesian University of Technology. Marek Smyczek is an experienced teacher of IT and electrical subjects, and at the same time an instructor of the CISCO CCNA program. He is the author and editor of several dozen publications in the fields of electronics and computer science. Translations: Joanna Margowniczy English teacher at Primary School No. 13 in Jaworzno and ZDZ in Sosnowiec, international IT ESSENTIALS instructor, OKE examiner.

82
Завантаження...
EЛЕКТРОННА КНИГА

Computer Networks in Packet Tracer for intermediate users

Damian Strojek, Jerzy Kluczewski

The book: “COMPUTER NETWORKS IN PACKET TRACER FOR INTERMEDIATE USERS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title. The authors have adopted the principle: minimum of theory, maximum of practical examples which will enable the reader to learn how to administer ICT networks in many complex device configurations without the need to purchase expensive CISCO equipment. The content of the book covers the basics of configuring protocols, services and network techniques such as: dynamic routing RIP, EGIRP, OSPF, eBGP, static routing, access control lists VoIP, STP, RS,VTP, FRAME RELAY, PPP, PAP and CHAP authentication RADIUS, NETFLOW, NAT, L2NAT, VPN tuneling. This part also includes configuring multilayer switches 3560-24PS and 3650-24PS. The authors of this book are an intergenerational and interdisciplinary team. Talented student of the Communications School Complex in Gdansk Damian Strojek. His passion is computer networks, and he holds certifications CCNA R&S and CCNA Security. Jerzy Kluczewski, a long-time CISCO CCNA Academy instructor. He already has several book publications to his credit about the Packet Tracer simulator. He gained his experience while working in industry and is currently a lecturer at the Gdansk School of Banking. Translation: a very talented student of applied linguistics at Silesian University in Katowice – Julia Skutela. She has been studying English and Russian to become a professional translator. Eager to expand her knowledge and building a workshop of the translator she has decided to raise up to the challenge of translating the following book into English.

83
Завантаження...
EЛЕКТРОННА КНИГА

Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation

Tobias Theel

While often considered a fast and compact programming language, Go usually creates large executables that are difficult to run on low-memory or low-powered devices such as microcontrollers or IoT. TinyGo is a new compiler that allows developers to compile their programs for such low-powered devices. As TinyGo supports all the standard features of the Go programming language, you won't have to tweak the code to fit on the microcontroller.This book is a hands-on guide packed full of interesting DIY projects that will show you how to build embedded applications. You will learn how to program sensors and work with microcontrollers such as Arduino UNO and Arduino Nano IoT 33. The chapters that follow will show you how to develop multiple real-world embedded projects using a variety of popular devices such as LEDs, 7-segment displays, and timers. Next, you will progress to build interactive prototypes such as a traffic lights system, touchless hand wash timer, and more. As you advance, you'll create an IoT prototype of a weather alert system and display those alerts on the TinyGo WASM dashboard. Finally, you will build a home automation project that displays stats on the TinyGo WASM dashboard.By the end of this microcontroller book, you will be equipped with the skills you need to build real-world embedded projects using the power of TinyGo.

84
Завантаження...
EЛЕКТРОННА КНИГА

Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox

Digit Oktavianto, Iqbal Muhardianto

Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way.Cuckoo Malware Analysis will cover basic theories in sandboxing, automating malware analysis, and how to prepare a safe environment lab for malware analysis. You will get acquainted with Cuckoo Sandbox architecture and learn how to install Cuckoo Sandbox, troubleshoot the problems after installation, submit malware samples, and also analyze PDF files, URLs, and binary files. This book also covers memory forensics – using the memory dump feature, additional memory forensics using Volatility, viewing result analyses using the Cuckoo analysis package, and analyzing APT attacks using Cuckoo Sandbox, Volatility, and Yara.Finally, you will also learn how to screen Cuckoo Sandbox against VM detection and how to automate the scanning of e-mail attachments with Cuckoo.

85
Завантаження...
EЛЕКТРОННА КНИГА

Cyber Essentials. A guide to the Cyber Essentials and Cyber Essentials Plus certifications

IT Governance Publishing, Alan Calder

This book is a practical guide to achieving Cyber Essentials certification, a key step in protecting your organization from cyber threats. It starts with an overview of the Cyber Essentials scheme and explains why certification is crucial. The book covers common cyber attacks like ransomware, social engineering, and denial of service, helping you understand potential threats.It then explores essential technical controls needed for certification, such as firewalls, secure configurations, user access control, and malware protection. It also highlights best practices like managing security updates to keep systems secure. Each chapter offers actionable advice on implementing these controls, emphasizing their role in strengthening your cybersecurity framework.The book concludes with a detailed look at the Cyber Essentials certification process. It guides you through preparing for certification, completing the checklist, and undergoing the assessment. Additional resources and tips for Cyber Essentials Plus certification are included for those seeking further guidance.This comprehensive guide provides the knowledge and tools to secure your organization, achieve certification, and maintain strong cybersecurity resilience.

86
Завантаження...
EЛЕКТРОННА КНИГА

Cyber Resilience. A Comprehensive Guide to Understanding and Implementing Cybersecurity Principles

IT Governance Publishing, Alan Calder

In today’s rapidly evolving digital landscape, cybersecurity is essential for protecting organizations from cyber threats. This book provides a thorough guide to building cyber resilience, starting with an in-depth understanding of the ever-changing cyber threat landscape. It covers foundational principles such as risk management, security controls, and defense-in-depth strategies, giving readers the knowledge needed to secure digital systems effectively.The book then delves into actionable cybersecurity controls, offering insights on asset management, identity and access control, encryption, and incident response management. Each section includes practical tips for implementation, ensuring that readers can apply these strategies in real-world scenarios. The goal is to help organizations not only understand cybersecurity but also to establish robust security policies and protocols to prevent and mitigate potential risks.Finally, the book emphasizes the importance of continual improvement and monitoring to maintain a resilient cybersecurity framework. It highlights the need for regular audits, vulnerability scanning, and staff training to adapt to new threats. By the end, readers will be equipped to build and sustain a resilient cybersecurity strategy that ensures long-term protection and business continuity.

87
Завантаження...
EЛЕКТРОННА КНИГА

Cyber Security Kill Chain - Tactics and Strategies. Breaking down the cyberattack process and responding to threats

Gourav Nagar, Shreyas Kumar, Rohit Ghai

Gain a strategic edge in cybersecurity by mastering the systematic approach to identifying and responding to cyber threats through a detailed exploration of the cyber kill chain framework. This guide walks you through each stage of the attack, from reconnaissance and weaponization to exploitation, command and control (C2), and actions on objectives. Written by cybersecurity leaders Gourav Nagar, Director of Information Security at BILL Holdings, with prior experience at Uber and Apple, and Shreyas Kumar, Professor of Practice at Texas A&M, and former expert at Adobe and Oracle, this book helps enhance your cybersecurity posture. You’ll gain insight into the role of threat intelligence in boosting the cyber kill chain, explore the practical applications of the framework in real-world scenarios, and see how AI and machine learning are revolutionizing threat detection. You’ll also learn future-proofing strategies and get ready to counter sophisticated threats like supply chain attacks and living-off-the-land attacks, and the implications of quantum computing on cybersecurity.By the end of this book, you’ll have gained the strategic understanding and skills needed to protect your organization's digital infrastructure in the ever-evolving landscape of cybersecurity.*Email sign-up and proof of purchase required.

88
Завантаження...
EЛЕКТРОННА КНИГА

Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare

Dr. Chase Cunningham

The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare – Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media.Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light.The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario.Cyber Warfare – Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data.