Bezpieczeństwo sieci
Bezpieczeństwo sieci komputerowych jest aktualnie ważnym, lecz coraz bardziej skomplikowanym zagadnieniem. Książki zebrane w tej kategorii przedstawiają praktycznie wszystkie jego aspekty. Nauczycie się implementacji bezpiecznych połączeń z wykorzystaniem szeregu różnych protokołów sieciowych, a także wykorzystywać protokół SSH do pracy na zdalnych systemach.
Opanujecie ponadto umiejętność konfiguracji tuneli VPN z wykorzystaniem protokołów SSL i IPSec. Dzięki wiedzy zawartej w tym dziale, nauczycie się skutecznie bronić przed włamaniami, atakami DDoS czy działaniom typu IP-spoofing.
OSINT w praktyce. Jak gromadzić i analizować dane dostępne w sieci
Dale Meredith
Pojęcie OSINT pochodzi od angielskiego wyrażenia open source intelligence i oznacza biały wywiad. Polega na pozyskiwaniu danych z publicznie dostępnych źródeł. Okazuje się, że niezwykle cenne informacje są dostępne na wyciągnięcie ręki, ale trzeba wiedzieć, w jaki sposób do nich dotrzeć. A potrafi to być niezwykle wciągające zajęcie, przy okazji którego można poznać podstawy cyberbezpieczeństwa, zrozumieć czyhające w internecie zagrożenia i nauczyć się zabezpieczać swoją cyfrową obecność. Z tą książką krok po kroku zagłębisz się w metody OSINT, a także powiązane z nim zagadnienia natury prawnej i etycznej. Poznasz sposoby gromadzenia i analizowania informacji z wykorzystaniem wyszukiwarek, portali społecznościowych i innych zasobów internetowych. Zrozumiesz wagę anonimowości i technik gwarantujących bezpieczne poruszanie się po sieci, ułatwiających zarządzanie cyfrowym śladem czy tworzenie fikcyjnych tożsamości internetowych. Zdobędziesz również doświadczenie w korzystaniu z popularnych narzędzi OSINT, takich jak Recon-ng, Maltego, Shodan czy Aircrack-ng. Dowiesz się też, jak ograniczać ryzyko, przewidywać cyberataki, zapobiegać im i na nie reagować - wszystko dzięki technikom opartym na OSINT. W książce: działanie OSINT i najlepsze praktyki automatyzacja zbierania i analizy danych dane z mediów społecznościowych a OSINT zarządzanie swoim cyfrowym śladem, ograniczanie ryzyka i ochrona prywatności skuteczny program analizy ryzyka na bazie OSINT zwiększanie bezpieczeństwa firmy technikami OSINT Dołącz potężne narzędzia OSINT do swojego arsenału!
Packet Tracer for young advanced admins
Jerzy Kluczewski
The book: “PACKET TRACER FOR YOUNG ADVANCED ADMINS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations were prepared in such a way as to develop the knowledge already presented in the previous books of Our Publishing House by Jerzy Kluczewski. The second goal, is to popularize the world-famous Packet Tracer program. This book is an excellent resource for students, undergraduates, and participants and graduates of CISCO CCNA networking courses. The themes of the book are very extensive and varied. Multiuser mode visualization, Bluetooth connections, cellular networks, WLAN controllers, industrial routers, IPV6 protocol, are just a few selected issues for which the author has prepared scenarios and ready-made simulation files that can be downloaded from the publisher's website. We encourage you to open the book and browse the table of contents for a broad overview of this book. The author of the publication is Jerzy Kluczewski, a long-time CISCO CCNA Academy instructor. He already has an extensive body of work in the form of published books on information technology. He gained his experience working in industry, and is currently a lecturer at the Gdansk School of Banking. Translation: Agata Skutela an experienced English teacher in Complex of Technical and General Schools in Tarnowskie Góry. Apart from English language she has also been teaching technical English. She is really into teaching and eager to expand her knowledge and workshop to be able to teach the best as she can.
Packet Tracer for young beginning admins
Damian Strojek, Jerzy Kluczewski, Robert Wszelaki, Marek...
The book: “PACKET TRACER FOR YOUNG BEGINNING ADMINS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of configuring network devices. He will learn network services such as: TELNET, SSH, FTP, EMAIL, DHCP, DNS and routing protocols RIP, EIGRP, OSPF. Learn how to design and deploy virtual VLAN networks. The authors, describing the issues of administering computer networks, use many examples and exercises. The book is an updated compilation of our Packet Tracer publications for CISCO courses, has a described, changed interface of the currently latest Packet Tracer software and contains a set of new examples and exercises. The authors of this book are an intergenerational and interdisciplinary team. A talented student of the School of Communication in Gdańsk, Damian Strojek. His passion is computer networks, he has a set of CCNA R&S certificates and is in the middle of the CCNA Security educational path. Jerzy Kluczewski, long-time instructor of the CISCO CCNA Academy. His authorial achievements already include several books on the Packet Tracer simulator. He gained his experience while working in industry, currently he is a lecturer at the WSB University in Gdańsk. Robert Wszelaki is passionate about networking and programming. He completed a full CISCO CCNA course. He is a graduate of ZS1 in Piekary Śląskie, currently studying computer science at the Faculty of Automatic Control, Electronics and Computer Science of the Silesian University of Technology. Marek Smyczek is an experienced teacher of IT and electrical subjects, and at the same time an instructor of the CISCO CCNA program. He is the author and editor of several dozen publications in the fields of electronics and computer science. Translations: Joanna Margowniczy English teacher at Primary School No. 13 in Jaworzno and ZDZ in Sosnowiec, international IT ESSENTIALS instructor, OKE examiner.
Packet Tracer for young intermediate admins
Damian Strojek, Jerzy Kluczewski
The book: “PACKET TRACER FOR YOUNG INTERMEDIATE ADMINS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title. The authors have adopted the principle: minimum of theory, maximum of practical examples which will enable the reader to learn how to administer ICT networks in many complex device configurations without the need to purchase expensive CISCO equipment. The content of the book covers the basics of configuring protocols, services and network techniques such as: dynamic routing RIP, EGIRP, OSPF, eBGP, static routing, access control lists VoIP, STP, RS,VTP, FRAME RELAY, PPP, PAP and CHAP authentication RADIUS, NETFLOW, NAT, L2NAT, VPN tuneling. This part also includes configuring multilayer switches 3560-24PS and 3650-24PS. The authors of this book are an intergenerational and interdisciplinary team. Talented student of the Communications School Complex in Gdansk Damian Strojek. His passion is computer networks, and he holds certifications CCNA R&S and CCNA Security. Jerzy Kluczewski, a long-time CISCO CCNA Academy instructor. He already has several book publications to his credit about the Packet Tracer simulator. He gained his experience while working in industry and is currently a lecturer at the Gdansk School of Banking. Translation: a very talented student of applied linguistics at Silesian University in Katowice – Julia Skutela. She has been studying English and Russian to become a professional translator. Eager to expand her knowledge and building a workshop of the translator she has decided to raise up to the challenge of translating the following book into English.
Matt Harrison, Theodore Petrou
The pandas library is massive, and it's common for frequent users to be unaware of many of its more impressive features. The official pandas documentation, while thorough, does not contain many useful examples of how to piece together multiple commands as one would do during an actual analysis. This book guides you, as if you were looking over the shoulder of an expert, through situations that you are highly likely to encounter.This new updated and revised edition provides you with unique, idiomatic, and fun recipes for both fundamental and advanced data manipulation tasks with pandas. Some recipes focus on achieving a deeper understanding of basic principles, or comparing and contrasting two similar operations. Other recipes will dive deep into a particular dataset, uncovering new and unexpected insights along the way. Many advanced recipes combine several different features across the pandas library to generate results.
Penetration Testing: A Survival Guide. A Survival Guide
Wolf Halton, Bo Weaver, Juned Ahmed Ansari,...
The need for penetration testers has grown well over what the IT industry ever anticipated. Running just a vulnerability scanner is no longer an effective method to determine whether a business is truly secure. This learning path will help you develop the most effective penetration testing skills to protect your Windows, web applications, and Android devices. The first module focuses on the Windows platform, which is one of the most common OSes, and managing its security spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Employs the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. In this module first,you’ll be introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities so you can exploit a system remotely. You’ll not only learn to penetrate in the machine, but will also learn to work with Windows privilege escalations.The second module will help you get to grips with the tools used in Kali Linux 2.0 that relate to web application hacking. You will get to know about scripting and input validation flaws, AJAX, and security issues related to AJAX. You will also use an automated technique called fuzzing so you can identify flaws in a web application. Finally, you’ll understand the web application vulnerabilities and the ways they can be exploited.In the last module, you’ll get started with Android security. Android, being the platform with the largest consumer base, is the obvious primary target for attackers. You’ll begin this journey with the absolute basics and will then slowly gear up to the concepts of Android rooting, application security assessments, malware, infecting APK files, and fuzzing. You’ll gain the skills necessary to perform Android application vulnerability assessments and to create an Android pentesting lab.This Learning Path is a blend of content from the following Packt products:• Kali Linux 2: Windows Penetration Testing by Wolf Halton and Bo Weaver• Web Penetration Testing with Kali Linux, Second Edition by Juned Ahmed Ansari• Hacking Android by Srinivasa Rao Kotipalli and Mohammed A. Imran
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
Jason Beltrame
Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing.This book will begin by taking you through the basics and show you how to set up and maintain the C&C Server. You will also understand how to scan for vulnerabilities and Metasploit, learn how to setup connectivity to a C&C server and maintain that connectivity for your intelligence gathering as well as offsite processing. Using TCPDump filters, you will gain understanding of the sniffing and spoofing traffic. This book will also teach you the importance of clearing up the tracks you leave behind after the penetration test and will show you how to build a report from all the data obtained from the penetration test.In totality, this book will equip you with instructions through rigorous tasks, practical callouts, and assignments to reinforce your understanding of penetration testing.