Hacking

W kategorii Hacking zebrano publikacje dotyczące nie tylko hackerów, crackerów i ich technik działania, ale także opisujące różne aspekty bezpieczeństwa komputerów i danych na nich przechowywanych. Poznacie technikę przeprowadzania audytów bezpieczeństwa oraz sposoby zabezpieczania się przed atakami hackerów, programami szpiegującymi czy zwykłą plagą wirusów.

Nauczycie się chronić nie tylko poszczególne komputery ale całe sieci komputerowe przez opracowanie i wdrożenie odpowiedniej polityki bezpieczeństwa, poprawne użycie firewalli czy odpowiednie skonfigurowanie serwerów pracujących pod Waszym nadzorem, a także opanujecie sposoby bezpiecznego surfowania po internecie.

113
Ładowanie...
EBOOK

C# and .NET Core Test-Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications

Ayobami Adewole

This book guides developers to create robust, production-ready C# 7 and .NET Core applications through the practice of test-driven development process. In C# and .NET Core Test-Driven Development, you will learn the different stages of the TDD life cycle, basics of TDD, best practices, and anti-patterns. It will teach you how to create an ASP.NET Core MVC sample application, write testable code with SOLID principles and set up a dependency injection for your sample application. Next, you will learn the xUnit testing framework and learn how to use its attributes and assertions. You’ll see how to create data-driven unit tests and mock dependencies in your code. You will understand the difference between running and debugging your tests on .NET Core on LINUX versus Windows and Visual Studio. As you move forward, you will be able to create a healthy continuous integration process for your sample application using GitHub, TeamCity, Cake, and Microsoft VSTS.By the end of this book, you will have learned how to write clean and robust code through the effective practice of TDD, set up CI build steps to test and build applications as well as how to package application for deployment on NuGet.

114
Ładowanie...
EBOOK

CCNA Cyber Ops SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate

Andrew Chu

Cybersecurity roles have grown exponentially in the IT industry and an increasing number of organizations have set up security operations centers (SOCs) to monitor and respond to security threats. The 210-255 SECOPS exam is the second of two exams required for the Cisco CCNA Cyber Ops certification. By providing you with fundamental knowledge of SOC events, this certification validates your skills in managing cybersecurity processes such as analyzing threats and malicious activities, conducting security investigations, and using incident playbooks.You'll start by understanding threat analysis and computer forensics, which will help you build the foundation for learning intrusion analysis and incident response principles. The book will then guide you through vocabulary and techniques for analyzing data from the network and previous events. In later chapters, you'll discover how to identify, analyze, correlate, and respond to incidents, including how to communicate technical and inaccessible (non-technical) examples. You'll be able to build on your knowledge as you learn through examples and practice questions, and finally test your knowledge with two mock exams that allow you to put what you’ve learned to the test.By the end of this book, you'll have the skills to confidently pass the SECOPS 210-255 exam and achieve CCNA Cyber Ops certification.

115
Ładowanie...
EBOOK

CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)

Glen D. Singh, Michael Vinod, Vijay Anandh

With CCNA Security certification, a network professional can demonstrate the skills required to develop security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security 210-260 Certification Guide will help you grasp the fundamentals of network security and prepare you for the Cisco CCNA Security Certification exam.You’ll begin by getting a grip on the fundamentals of network security and exploring the different tools available. Then, you’ll see how to securely manage your network devices by implementing the AAA framework and configuring different management plane protocols.Next, you’ll learn about security on the data link layer by implementing various security toolkits. You’ll be introduced to various firewall technologies and will understand how to configure a zone-based firewall on a Cisco IOS device. You’ll configure a site-to-site VPN on a Cisco device and get familiar with different types of VPNs and configurations. Finally, you’ll delve into the concepts of IPS and endpoint security to secure your organization’s network infrastructure.By the end of this book, you’ll be ready to take the CCNA Security Exam (210-260).

116
Ładowanie...
EBOOK

CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)

Glen D. Singh, Michael Vinod, Vijay Anandh

With CCNA Security certification, a network professional can demonstrate the skills required to develop security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security 210-260 Certification Guide will help you grasp the fundamentals of network security and prepare you for the Cisco CCNA Security Certification exam.You’ll begin by getting a grip on the fundamentals of network security and exploring the different tools available. Then, you’ll see how to securely manage your network devices by implementing the AAA framework and configuring different management plane protocols.Next, you’ll learn about security on the data link layer by implementing various security toolkits. You’ll be introduced to various firewall technologies and will understand how to configure a zone-based firewall on a Cisco IOS device. You’ll configure a site-to-site VPN on a Cisco device and get familiar with different types of VPNs and configurations. Finally, you’ll delve into the concepts of IPS and endpoint security to secure your organization’s network infrastructure.By the end of this book, you’ll be ready to take the CCNA Security Exam (210-260).

117
Ładowanie...
EBOOK

CCNP 300-410 ENARSI. Zaawansowane administrowanie sieciami przedsiębiorstwa i bezpieczeństwo sieci

Adam Józefiok

Dziwne, u mnie też nie działa... Rola administratora sieci komputerowej zaczyna się od jej skonfigurowania, jednak na tym absolutnie się nie kończy. Dalej musi on zadbać o to, by sieć działała poprawnie - jeśli cokolwiek pójdzie nie tak, administrator szybko dowie się o tym od użytkowników i zostanie poproszony, by równie szybko przywrócił ją do stanu poprzedniego. Drobnostka, jeśli problem okazuje się błahy i prosty do rozwiązania. Prawdziwe wyzwanie zaczyna się wtedy, kiedy naprawa usterki wymaga dogłębnej znajomości sieci, jej silnych i mocnych stron, a także metod radzenia sobie z awariami. Na szczęście powstała ta książka. Najnowsza pozycja autorstwa Adama Józefioka pozwoli Ci nie tylko poznać swoją sieć komputerową w najdrobniejszych szczegółach. Dowiesz się również, jak sobie radzić, gdy detal, z którego istnienia co prawda zdajesz sobie sprawę, ale którego nie bierzesz pod uwagę jako źródła ewentualnych problemów, nagle zaczyna sprawiać kłopoty. Przyswajając wiedzę teoretyczną zawartą w książce i trenując na jej podstawie umiejętności praktyczne, przygotujesz się równocześnie do zdania egzaminu CCNP ENCOR, a tym samym do zdobycia kolejnego certyfikatu przydatnego w Twojej rozwijającej się karierze administratora sieci komputerowych.

118
Ładowanie...
EBOOK

CCNP 300-410 ENARSI. Zaawansowane administrowanie sieciami przedsiębiorstwa i bezpieczeństwo sieci

Adam Józefiok

Dziwne, u mnie też nie działa... Rola administratora sieci komputerowej zaczyna się od jej skonfigurowania, jednak na tym absolutnie się nie kończy. Dalej musi on zadbać o to, by sieć działała poprawnie - jeśli cokolwiek pójdzie nie tak, administrator szybko dowie się o tym od użytkowników i zostanie poproszony, by równie szybko przywrócił ją do stanu poprzedniego. Drobnostka, jeśli problem okazuje się błahy i prosty do rozwiązania. Prawdziwe wyzwanie zaczyna się wtedy, kiedy naprawa usterki wymaga dogłębnej znajomości sieci, jej silnych i mocnych stron, a także metod radzenia sobie z awariami. Na szczęście powstała ta książka. Najnowsza pozycja autorstwa Adama Józefioka pozwoli Ci nie tylko poznać swoją sieć komputerową w najdrobniejszych szczegółach. Dowiesz się również, jak sobie radzić, gdy detal, z którego istnienia co prawda zdajesz sobie sprawę, ale którego nie bierzesz pod uwagę jako źródła ewentualnych problemów, nagle zaczyna sprawiać kłopoty. Przyswajając wiedzę teoretyczną zawartą w książce i trenując na jej podstawie umiejętności praktyczne, przygotujesz się równocześnie do zdania egzaminu CCNP ENCOR, a tym samym do zdobycia kolejnego certyfikatu przydatnego w Twojej rozwijającej się karierze administratora sieci komputerowych.

119
Ładowanie...
EBOOK

CCSP (ISC)2 Certified Cloud Security Professional Exam Guide. Build your knowledge to pass the CCSP exam with expert guidance

Omar A. Turner, Navya Lakshmana

Preparing for the Certified Cloud Security Professional (CCSP) exam can be challenging, as it covers a wide array of topics essential for advancing a cybersecurity professional’s career by validating their technical skills. To prepare for the CCSP exam, you need a resource that not only covers all the exam objectives but also helps you prepare for the format and structure of the exam.Written by two seasoned cybersecurity professionals with a collective experience of hundreds of hours training CCSP bootcamps, this CCSP study guide reflects the journey you’d undertake in such training sessions.The chapters are packed with up-to-date information necessary to pass the (ISC)2 CCSP exam. Additionally, to boost your confidence, the book provides self-assessment questions, exam tips, and mock exams with detailed answer explanations. You’ll be able to deepen your understanding using illustrative explanations that briefly review key points.As you progress, you’ll delve into advanced technical aspects of cloud domain security, such as application security, design, managing and securing data, and infrastructure in the cloud using best practices and legal policies and procedures.By the end of this guide, you’ll be ready to breeze through the exam and tackle real-world cloud security challenges with ease.

120
Ładowanie...
EBOOK

CentOS Quick Start Guide. Get up and running with CentOS server administration

Shiwang Kalkhanda

Linux kernel development has been the worlds largest collaborative project to date. With this practical guide, you will learn Linux through one of its most popular and stable distributions.This book will introduce you to essential Linux skills using CentOS 7. It describes how a Linux system is organized, and will introduce you to key command-line concepts you can practice on your own. It will guide you in performing basic system administration tasks and day-to-day operations in a Linux environment.You will learn core system administration skills for managing a system running CentOS 7 or a similar operating system, such as RHEL 7, Scientific Linux, and Oracle Linux. You will be able to perform installation, establish network connectivity and user and process management, modify file permissions, manage text files using the command line, and implement basic security administration after covering this book. By the end of this book, you will have a solid understanding of working with Linux using the command line.

121
Ładowanie...
EBOOK

Certified Ethical Hacker (CEH) v12 312-50 Exam Guide. Keep up to date with ethical hacking trends and hone your skills with hands-on activities

Dale Meredith, Christopher Rees

With cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book.This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book.By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v12 certified ethical hacker.

122
Ładowanie...
EBOOK

Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence

Hemang Doshi

With cyber threats on the rise, IT professionals are now choosing cybersecurity as the next step to boost their career, and holding the relevant certification can prove to be a game-changer in this competitive market. CISM is one of the top-paying and most sought-after certifications by employers.This CISM Certification Guide comprises comprehensive self-study exam content for those who want to achieve CISM certification on the first attempt. This book is a great resource for information security leaders with a pragmatic approach to challenges related to real-world case scenarios. You'll learn about the practical aspects of information security governance and information security risk management. As you advance through the chapters, you'll get to grips with information security program development and management. The book will also help you to gain a clear understanding of the procedural aspects of information security incident management.By the end of this CISM exam book, you'll have covered everything needed to pass the CISM certification exam and have a handy, on-the-job desktop reference guide.

123
Ładowanie...
EBOOK

Certified Information Security Manager Exam Prep Guide. Gain the confidence to pass the CISM exam using test-oriented study material - Second Edition

Hemang Doshi

CISM is a globally recognized and much sought-after certification in the field of IT security. This second edition of the Certified Information Security Manager Exam Prep Guide is up to date with complete coverage of the exam content through comprehensive and exam-oriented explanations of core concepts. Written in a clear, succinct manner, this book covers all four domains of the CISM Review Manual.With this book, you’ll unlock access to a powerful exam-prep platform which includes interactive practice questions, exam tips, and flashcards. The platform perfectly complements the book and even lets you bring your questions directly to the author.This mixed learning approach of exploring key concepts through the book and applying them to answer practice questions online is designed to help build your confidence in acing the CISM certification.By the end of this book, you'll have everything you need to succeed in your information security career and pass the CISM certification exam with this handy, on-the-job desktop reference guide.

124
Ładowanie...
EBOOK

ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills

Clint Bodungen, Aaron Crow

Are you ready to unleash the potential of AI-driven cybersecurity? This cookbook takes you on a journey toward enhancing your cybersecurity skills, whether you’re a novice or a seasoned professional. By leveraging cutting-edge generative AI and large language models such as ChatGPT, you'll gain a competitive advantage in the ever-evolving cybersecurity landscape.ChatGPT for Cybersecurity Cookbook shows you how to automate and optimize various cybersecurity tasks, including penetration testing, vulnerability assessments, risk assessment, and threat detection. Each recipe demonstrates step by step how to utilize ChatGPT and the OpenAI API to generate complex commands, write code, and even create complete tools. You’ll discover how AI-powered cybersecurity can revolutionize your approach to security, providing you with new strategies and techniques for tackling challenges. As you progress, you’ll dive into detailed recipes covering attack vector automation, vulnerability scanning, GPT-assisted code analysis, and more. By learning to harness the power of generative AI, you'll not only expand your skillset but also increase your efficiency.By the end of this cybersecurity book, you’ll have the confidence and knowledge you need to stay ahead of the curve, mastering the latest generative AI tools and techniques in cybersecurity.

125
Ładowanie...
EBOOK

ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills

Clint Bodungen, Aaron Crow

Are you ready to unleash the potential of AI-driven cybersecurity? This cookbook takes you on a journey toward enhancing your cybersecurity skills, whether you’re a novice or a seasoned professional. By leveraging cutting-edge generative AI and large language models such as ChatGPT, you'll gain a competitive advantage in the ever-evolving cybersecurity landscape.ChatGPT for Cybersecurity Cookbook shows you how to automate and optimize various cybersecurity tasks, including penetration testing, vulnerability assessments, risk assessment, and threat detection. Each recipe demonstrates step by step how to utilize ChatGPT and the OpenAI API to generate complex commands, write code, and even create complete tools. You’ll discover how AI-powered cybersecurity can revolutionize your approach to security, providing you with new strategies and techniques for tackling challenges. As you progress, you’ll dive into detailed recipes covering attack vector automation, vulnerability scanning, GPT-assisted code analysis, and more. By learning to harness the power of generative AI, you'll not only expand your skillset but also increase your efficiency.By the end of this cybersecurity book, you’ll have the confidence and knowledge you need to stay ahead of the curve, mastering the latest generative AI tools and techniques in cybersecurity.

126
Ładowanie...
EBOOK

ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills

Clint Bodungen, Aaron Crow

Are you ready to unleash the potential of AI-driven cybersecurity? This cookbook takes you on a journey toward enhancing your cybersecurity skills, whether you’re a novice or a seasoned professional. By leveraging cutting-edge generative AI and large language models such as ChatGPT, you'll gain a competitive advantage in the ever-evolving cybersecurity landscape.ChatGPT for Cybersecurity Cookbook shows you how to automate and optimize various cybersecurity tasks, including penetration testing, vulnerability assessments, risk assessment, and threat detection. Each recipe demonstrates step by step how to utilize ChatGPT and the OpenAI API to generate complex commands, write code, and even create complete tools. You’ll discover how AI-powered cybersecurity can revolutionize your approach to security, providing you with new strategies and techniques for tackling challenges. As you progress, you’ll dive into detailed recipes covering attack vector automation, vulnerability scanning, GPT-assisted code analysis, and more. By learning to harness the power of generative AI, you'll not only expand your skillset but also increase your efficiency.By the end of this cybersecurity book, you’ll have the confidence and knowledge you need to stay ahead of the curve, mastering the latest generative AI tools and techniques in cybersecurity.

127
Ładowanie...
EBOOK

ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills

Clint Bodungen, Aaron Crow

Are you ready to unleash the potential of AI-driven cybersecurity? This cookbook takes you on a journey toward enhancing your cybersecurity skills, whether you’re a novice or a seasoned professional. By leveraging cutting-edge generative AI and large language models such as ChatGPT, you'll gain a competitive advantage in the ever-evolving cybersecurity landscape.ChatGPT for Cybersecurity Cookbook shows you how to automate and optimize various cybersecurity tasks, including penetration testing, vulnerability assessments, risk assessment, and threat detection. Each recipe demonstrates step by step how to utilize ChatGPT and the OpenAI API to generate complex commands, write code, and even create complete tools. You’ll discover how AI-powered cybersecurity can revolutionize your approach to security, providing you with new strategies and techniques for tackling challenges. As you progress, you’ll dive into detailed recipes covering attack vector automation, vulnerability scanning, GPT-assisted code analysis, and more. By learning to harness the power of generative AI, you'll not only expand your skillset but also increase your efficiency.By the end of this cybersecurity book, you’ll have the confidence and knowledge you need to stay ahead of the curve, mastering the latest generative AI tools and techniques in cybersecurity.

128
Ładowanie...
EBOOK

Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration

Vladimir Yakovlev

Check Point firewalls are the premiere firewalls, access control, and threat prevention appliances for physical and virtual infrastructures. With Check Point’s superior security, administrators can help maintain confidentiality, integrity, and the availability of their resources protected by firewalls and threat prevention devices. This hands-on guide covers everything you need to be fluent in using Check Point firewalls for your operations.This book familiarizes you with Check Point firewalls and their most common implementation scenarios, showing you how to deploy them from scratch. You will begin by following the deployment and configuration of Check Point products and advance to their administration for an organization. Once you’ve learned how to plan, prepare, and implement Check Point infrastructure components and grasped the fundamental principles of their operation, you’ll be guided through the creation and modification of access control policies of increasing complexity, as well as the inclusion of additional features. To run your routine operations infallibly, you’ll also learn how to monitor security logs and dashboards. Generating reports detailing current or historical traffic patterns and security incidents is also covered.By the end of this book, you'll have gained the knowledge necessary to implement and comfortably operate Check Point firewalls.

129
Ładowanie...
EBOOK

Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration

Vladimir Yakovlev

Check Point firewalls are the premiere firewalls, access control, and threat prevention appliances for physical and virtual infrastructures. With Check Point’s superior security, administrators can help maintain confidentiality, integrity, and the availability of their resources protected by firewalls and threat prevention devices. This hands-on guide covers everything you need to be fluent in using Check Point firewalls for your operations.This book familiarizes you with Check Point firewalls and their most common implementation scenarios, showing you how to deploy them from scratch. You will begin by following the deployment and configuration of Check Point products and advance to their administration for an organization. Once you’ve learned how to plan, prepare, and implement Check Point infrastructure components and grasped the fundamental principles of their operation, you’ll be guided through the creation and modification of access control policies of increasing complexity, as well as the inclusion of additional features. To run your routine operations infallibly, you’ll also learn how to monitor security logs and dashboards. Generating reports detailing current or historical traffic patterns and security incidents is also covered.By the end of this book, you'll have gained the knowledge necessary to implement and comfortably operate Check Point firewalls.

130
Ładowanie...
EBOOK

Chmura Azure. Praktyczne wprowadzenie dla administratora. Implementacja, monitorowanie i zarządzanie ważnymi usługami i komponentami IaaS/PaaS

Mustafa Toroman

Decyzja o przeniesieniu zasobów informatycznych do chmury jest podejmowana najczęściej wtedy, gdy niezawodność i bezpieczeństwo systemu są dla firmy sprawą kluczową. Jeśli chodzi o rozwiązania oparte na chmurze obliczeniowej, warto zainteresować się Azure. Azure udostępnia takie usługi, by umożliwić rozbudowę i monitorowanie aplikacji, baz danych czy innych usług oraz zarządzanie nimi w sposób globalny. Pozwala na ciągłe dostarczanie znakomitych, innowacyjnych rozwiązań. Umożliwia wirtualizację rozmaitych systemów, takich jak Windows, Linux, dystrybucje serwerowe, strony WWW, aplikacje ASP .NET, systemy CMS, bazy danych czy rozproszone klastry obliczeniowe. Oto praktyczne wprowadzenie do Azure. Wyjaśniono tu wiele pojęć potrzebnych w pracy administratora, takich jak sieci wirtualne oraz koncepcja IaaS. Omówiono zasady pracy z Azure oraz pokazano, jak można przygotować platformę do wdrożenia własnego systemu. Od strony praktycznej przedstawiono tworzenie zaawansowanych usług w platformie Azure. Sporo miejsca poświęcono najważniejszym kwestiom bezpieczeństwa i administracji, zaprezentowano też szereg dobrych praktyk, a także sporo technik ułatwiających rozwiązywanie najczęstszych problemów. Książka jest napisana w zwięzły i przystępny sposób. Dzięki niej szybko i skutecznie zaczniesz administrować zasobami w chmurze Azure. W tej książce między innymi: podstawowe pojęcia, koncepcje i modele związane z chmurą obliczeniową tworzenie i konfiguracja wirtualnej maszyny Azure praca z bazami danych, usługi IaaS i PaaS usługi hybrydowe, implementacja i zarządzanie tożsamość i bezpieczeństwo zasobów w chmurze Azure Chmura Azure: przenieś swój system na wyższy poziom!

131
Ładowanie...
EBOOK

Chmura Azure. Praktyczne wprowadzenie dla administratora. Implementacja, monitorowanie i zarządzanie ważnymi usługami i komponentami IaaS/PaaS

Mustafa Toroman

Decyzja o przeniesieniu zasobów informatycznych do chmury jest podejmowana najczęściej wtedy, gdy niezawodność i bezpieczeństwo systemu są dla firmy sprawą kluczową. Jeśli chodzi o rozwiązania oparte na chmurze obliczeniowej, warto zainteresować się Azure. Azure udostępnia takie usługi, by umożliwić rozbudowę i monitorowanie aplikacji, baz danych czy innych usług oraz zarządzanie nimi w sposób globalny. Pozwala na ciągłe dostarczanie znakomitych, innowacyjnych rozwiązań. Umożliwia wirtualizację rozmaitych systemów, takich jak Windows, Linux, dystrybucje serwerowe, strony WWW, aplikacje ASP .NET, systemy CMS, bazy danych czy rozproszone klastry obliczeniowe. Oto praktyczne wprowadzenie do Azure. Wyjaśniono tu wiele pojęć potrzebnych w pracy administratora, takich jak sieci wirtualne oraz koncepcja IaaS. Omówiono zasady pracy z Azure oraz pokazano, jak można przygotować platformę do wdrożenia własnego systemu. Od strony praktycznej przedstawiono tworzenie zaawansowanych usług w platformie Azure. Sporo miejsca poświęcono najważniejszym kwestiom bezpieczeństwa i administracji, zaprezentowano też szereg dobrych praktyk, a także sporo technik ułatwiających rozwiązywanie najczęstszych problemów. Książka jest napisana w zwięzły i przystępny sposób. Dzięki niej szybko i skutecznie zaczniesz administrować zasobami w chmurze Azure. W tej książce między innymi: podstawowe pojęcia, koncepcje i modele związane z chmurą obliczeniową tworzenie i konfiguracja wirtualnej maszyny Azure praca z bazami danych, usługi IaaS i PaaS usługi hybrydowe, implementacja i zarządzanie tożsamość i bezpieczeństwo zasobów w chmurze Azure Chmura Azure: przenieś swój system na wyższy poziom!

132
Ładowanie...
EBOOK

Chmura Azure. Praktyczne wprowadzenie dla administratora. Implementacja, monitorowanie i zarządzanie ważnymi usługami i komponentami IaaS/PaaS

Mustafa Toroman

Decyzja o przeniesieniu zasobów informatycznych do chmury jest podejmowana najczęściej wtedy, gdy niezawodność i bezpieczeństwo systemu są dla firmy sprawą kluczową. Jeśli chodzi o rozwiązania oparte na chmurze obliczeniowej, warto zainteresować się Azure. Azure udostępnia takie usługi, by umożliwić rozbudowę i monitorowanie aplikacji, baz danych czy innych usług oraz zarządzanie nimi w sposób globalny. Pozwala na ciągłe dostarczanie znakomitych, innowacyjnych rozwiązań. Umożliwia wirtualizację rozmaitych systemów, takich jak Windows, Linux, dystrybucje serwerowe, strony WWW, aplikacje ASP .NET, systemy CMS, bazy danych czy rozproszone klastry obliczeniowe. Oto praktyczne wprowadzenie do Azure. Wyjaśniono tu wiele pojęć potrzebnych w pracy administratora, takich jak sieci wirtualne oraz koncepcja IaaS. Omówiono zasady pracy z Azure oraz pokazano, jak można przygotować platformę do wdrożenia własnego systemu. Od strony praktycznej przedstawiono tworzenie zaawansowanych usług w platformie Azure. Sporo miejsca poświęcono najważniejszym kwestiom bezpieczeństwa i administracji, zaprezentowano też szereg dobrych praktyk, a także sporo technik ułatwiających rozwiązywanie najczęstszych problemów. Książka jest napisana w zwięzły i przystępny sposób. Dzięki niej szybko i skutecznie zaczniesz administrować zasobami w chmurze Azure. W tej książce między innymi: podstawowe pojęcia, koncepcje i modele związane z chmurą obliczeniową tworzenie i konfiguracja wirtualnej maszyny Azure praca z bazami danych, usługi IaaS i PaaS usługi hybrydowe, implementacja i zarządzanie tożsamość i bezpieczeństwo zasobów w chmurze Azure Chmura Azure: przenieś swój system na wyższy poziom!

133
Ładowanie...
EBOOK

CHROŃ I ROZWIJAJ BIZNES - CYBER AI Część 1 Wykorzystanie AI w bezpieczeństwie organizacji

Dariusz Gołębiowski

Masz firmę, fundację, albo inną organizację, którą chcesz ochronić przed cyberzagrożeniami? Świetnie, bo właśnie trzymasz wirtualną broń do walki z cyfrowymi złoczyńcami! Pierwsza część serii "CHROŃ I ROZWIJAJ BIZNES - CYBER AI" to Twoje kompendium wiedzy o tym, jak nie tylko wywinąć się z rąk hakerów, ale też sprytnie wdrożyć sztuczną inteligencję, która pomoże Ci spać spokojnie... no, przynajmniej dopóki AI nie zacznie przejmować kontroli nad światem. 😉 W tej książce dowiesz się, dlaczego malware to coś więcej niż problem komputera wujka Janka, jak unikać pułapek phishingowych, które są bardziej podstępne niż zaproszenie na "darmową pizzę", oraz dlaczego dyrektywa NIS 2 nie jest tylko kolejnym nudnym prawniczym dokumentem, który gdzieś tam podpisano. A teraz najlepsza część: sztuczna inteligencja (tak, ta od filmów sci-fi!) może być Twoim najlepszym przyjacielem w walce z zagrożeniami. Dzięki AI Twój system zabezpieczeń będzie niczym Sherlock Holmes, który znajdzie każdą podejrzaną aktywność, zanim jeszcze pomyślisz o kawie. W książce znajdziesz konkretne przykłady, jak AI może ochronić Twoje dane, monitorować pracowników (bez robienia z tego kolejnego odcinka live-streaam badziewnych seriali dla samotnych ludzi) i automatyzować reakcje na zagrożenia. Jeśli myślisz, że to koniec... to niespodzianka! Druga część serii, zaplanowana na przyszły rok, będzie o tym, jak sztuczna inteligencja nie tylko ochroni Twoją organizację, ale także pomoże Ci ją rozwijać - kto wie, może nawet stworzy dla Ciebie plan na podbój świata (w granicach prawa, oczywiście). Nie przegap okazji, żeby zabezpieczyć swój biznes przed zagrożeniami, które krążą w sieci szybciej niż memy z kotami. Zrób to z uśmiechem i nutą technologicznej magii!

134
Ładowanie...
EBOOK

CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition

Hemang Doshi

With the latest updates and revised study material, this second edition of the Certified Information Systems Auditor Study Guide provides an excellent starting point for your CISA certification preparation. The book strengthens your grip on the core concepts through a three-step approach. First, it presents the fundamentals with easy-to-understand theoretical explanations. Next, it provides a list of key aspects that are crucial from the CISA exam perspective, ensuring you focus on important pointers for the exam. Finally, the book makes you an expert in specific topics by engaging you with self-assessment questions designed to align with the exam format, challenging you to apply your knowledge and sharpen your understanding.Moreover, the book comes with lifetime access to supplementary resources on an online platform, including CISA flashcards, practice questions, and valuable exam tips. With unlimited access to the website, you’ll have the flexibility to practice as many times as you desire, maximizing your exam readiness.By the end of this book, you’ll have developed the proficiency to successfully obtain the CISA certification and significantly upgrade your auditing career.

135
Ładowanie...
EBOOK

CISA - Certified Information Systems Auditor Study Guide. Aligned with the CISA Review Manual 2024 with over 1000 practice questions to ace the exam - Third Edition

Hemang Doshi, Javen Khoo Ai Wee

Following on from the success of its bestselling predecessor, this third edition of the CISA - Certified Information Systems Auditor Study Guide serves as your go-to resource for acing the CISA exam. Written by renowned CISA expert Hemang Doshi, this guide equips you with practical skills and in-depth knowledge to excel in information systems auditing, setting the foundation for a thriving career.Fully updated to align with the 28th edition of the CISA Official Review Manual, this guide covers the latest exam objectives and provides a deep dive into essential IT auditing areas, including IT governance, systems development, and asset protection. The book follows a structured, three-step approach to solidify your understanding. First, it breaks down the fundamentals with clear, concise explanations. Then, it highlights critical exam-focused points to ensure you concentrate on key areas. Finally, it challenges you with self-assessment questions that reflect the exam format, helping you assess your knowledge.Additionally, you’ll gain access to online resources, including mock exams, interactive flashcards, and invaluable exam tips, ensuring you’re fully prepared for the exam with unlimited practice opportunities.By the end of this guide, you’ll be ready to pass the CISA exam with confidence and advance your career in auditing.

136
Ładowanie...
EBOOK

CISA - Certified Information Systems Auditor Study Guide. Aligned with the CISA Review Manual 2024 with over 1000 practice questions to ace the exam - Third Edition

Hemang Doshi, Javen Khoo Ai Wee

Following on from the success of its bestselling predecessor, this third edition of the CISA - Certified Information Systems Auditor Study Guide serves as your go-to resource for acing the CISA exam. Written by renowned CISA expert Hemang Doshi, this guide equips you with practical skills and in-depth knowledge to excel in information systems auditing, setting the foundation for a thriving career.Fully updated to align with the 28th edition of the CISA Official Review Manual, this guide covers the latest exam objectives and provides a deep dive into essential IT auditing areas, including IT governance, systems development, and asset protection. The book follows a structured, three-step approach to solidify your understanding. First, it breaks down the fundamentals with clear, concise explanations. Then, it highlights critical exam-focused points to ensure you concentrate on key areas. Finally, it challenges you with self-assessment questions that reflect the exam format, helping you assess your knowledge.Additionally, you’ll gain access to online resources, including mock exams, interactive flashcards, and invaluable exam tips, ensuring you’re fully prepared for the exam with unlimited practice opportunities.By the end of this guide, you’ll be ready to pass the CISA exam with confidence and advance your career in auditing.

137
Ładowanie...
EBOOK

CISA - Certified Information Systems Auditor Study Guide. Aligned with the CISA Review Manual 2024 with over 1000 practice questions to ace the exam - Third Edition

Hemang Doshi, Javen Khoo Ai Wee

Following on from the success of its bestselling predecessor, this third edition of the CISA - Certified Information Systems Auditor Study Guide serves as your go-to resource for acing the CISA exam. Written by renowned CISA expert Hemang Doshi, this guide equips you with practical skills and in-depth knowledge to excel in information systems auditing, setting the foundation for a thriving career.Fully updated to align with the 28th edition of the CISA Official Review Manual, this guide covers the latest exam objectives and provides a deep dive into essential IT auditing areas, including IT governance, systems development, and asset protection. The book follows a structured, three-step approach to solidify your understanding. First, it breaks down the fundamentals with clear, concise explanations. Then, it highlights critical exam-focused points to ensure you concentrate on key areas. Finally, it challenges you with self-assessment questions that reflect the exam format, helping you assess your knowledge.Additionally, you’ll gain access to online resources, including mock exams, interactive flashcards, and invaluable exam tips, ensuring you’re fully prepared for the exam with unlimited practice opportunities.By the end of this guide, you’ll be ready to pass the CISA exam with confidence and advance your career in auditing.

138
Ładowanie...
EBOOK

CISA - Certified Information Systems Auditor Study Guide. Aligned with the CISA Review Manual 2024 with over 1000 practice questions to ace the exam - Third Edition

Hemang Doshi, Javen Khoo Ai Wee

Following on from the success of its bestselling predecessor, this third edition of the CISA - Certified Information Systems Auditor Study Guide serves as your go-to resource for acing the CISA exam. Written by renowned CISA expert Hemang Doshi, this guide equips you with practical skills and in-depth knowledge to excel in information systems auditing, setting the foundation for a thriving career.Fully updated to align with the 28th edition of the CISA Official Review Manual, this guide covers the latest exam objectives and provides a deep dive into essential IT auditing areas, including IT governance, systems development, and asset protection. The book follows a structured, three-step approach to solidify your understanding. First, it breaks down the fundamentals with clear, concise explanations. Then, it highlights critical exam-focused points to ensure you concentrate on key areas. Finally, it challenges you with self-assessment questions that reflect the exam format, helping you assess your knowledge.Additionally, you’ll gain access to online resources, including mock exams, interactive flashcards, and invaluable exam tips, ensuring you’re fully prepared for the exam with unlimited practice opportunities.By the end of this guide, you’ll be ready to pass the CISA exam with confidence and advance your career in auditing.

139
Ładowanie...
EBOOK

Cisco Certified CyberOps Associate 200-201 Certification Guide. Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents

Glen D. Singh

Achieving the Cisco Certified CyberOps Associate 200-201 certification helps you to kickstart your career in cybersecurity operations. This book offers up-to-date coverage of 200-201 exam resources to fully equip you to pass on your first attempt.The book covers the essentials of network security concepts and shows you how to perform security threat monitoring. You'll begin by gaining an in-depth understanding of cryptography and exploring the methodology for performing both host and network-based intrusion analysis. Next, you'll learn about the importance of implementing security management and incident response strategies in an enterprise organization. As you advance, you'll see why implementing defenses is necessary by taking an in-depth approach, and then perform security monitoring and packet analysis on a network. You'll also discover the need for computer forensics and get to grips with the components used to identify network intrusions. Finally, the book will not only help you to learn the theory but also enable you to gain much-needed practical experience for the cybersecurity industry.By the end of this Cisco cybersecurity book, you'll have covered everything you need to pass the Cisco Certified CyberOps Associate 200-201 certification exam, and have a handy, on-the-job desktop reference guide.