Hacking

W kategorii Hacking zebrano publikacje dotyczące nie tylko hackerów, crackerów i ich technik działania, ale także opisujące różne aspekty bezpieczeństwa komputerów i danych na nich przechowywanych. Poznacie technikę przeprowadzania audytów bezpieczeństwa oraz sposoby zabezpieczania się przed atakami hackerów, programami szpiegującymi czy zwykłą plagą wirusów.

Nauczycie się chronić nie tylko poszczególne komputery ale całe sieci komputerowe przez opracowanie i wdrożenie odpowiedniej polityki bezpieczeństwa, poprawne użycie firewalli czy odpowiednie skonfigurowanie serwerów pracujących pod Waszym nadzorem, a także opanujecie sposoby bezpiecznego surfowania po internecie.

193
Ładowanie...
EBOOK

Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks

Tim Rains

After scrutinizing numerous cybersecurity strategies, Microsoft’s former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more.Cybersecurity Threats, Malware Trends, and Strategies offers an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of.The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them.By the end of this book, you will know how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.

194
Ładowanie...
EBOOK

Cybersecurity w pytaniach i odpowiedziach

Wojciech Ciemski

Co o cyberbezpieczeństwie każdy wiedzieć powinien W świecie, w którym większość naszych mniej lub bardziej wrażliwych danych przechowywana jest w sieci, cyberbezpieczeństwo powinno być tematem numer jeden. Niestety, na ogół nie jest, bo… Po prostu nie chce się nam myśleć o zastosowaniu odpowiednich zabezpieczeń. Stają się one dla nas kluczowe dopiero, kiedy ktoś się cyberwłamie i realnie skradnie coś, co było dla nas istotne: hasło do poczty e-mail, pieniądze z konta w banku, zdjęcia, które wolelibyśmy zachować dla siebie, itd. Tyle że wtedy jest już za późno.  Ta książka powstała po to, by jej czytelnik zdążył wyprzedzić zagrożenie. Stanowi wprowadzenie do zagadnienia cyberbezpieczeństwa. Podzielona na kilka kluczowych części (systemy operacyjne, sieci komputerowe, aplikacje webowe, kryptografia, wreszcie cyberbezpieczeństwo jako takie), pozwala zapoznać się z najważniejszymi zagrożeniami i ze sposobami zabezpieczeń. Przybliża terminologię związaną z tematem i stanowi świetny punkt wyjścia do dalszego zgłębiania jego wybranych aspektów.  Cyberniebezpieczeństwo czyha. Czy jesteś na nie przygotowany?

195
Ładowanie...
EBOOK

Cybersecurity w pytaniach i odpowiedziach

Wojciech Ciemski

Co o cyberbezpieczeństwie każdy wiedzieć powinien W świecie, w którym większość naszych mniej lub bardziej wrażliwych danych przechowywana jest w sieci, cyberbezpieczeństwo powinno być tematem numer jeden. Niestety, na ogół nie jest, bo… Po prostu nie chce się nam myśleć o zastosowaniu odpowiednich zabezpieczeń. Stają się one dla nas kluczowe dopiero, kiedy ktoś się cyberwłamie i realnie skradnie coś, co było dla nas istotne: hasło do poczty e-mail, pieniądze z konta w banku, zdjęcia, które wolelibyśmy zachować dla siebie, itd. Tyle że wtedy jest już za późno.  Ta książka powstała po to, by jej czytelnik zdążył wyprzedzić zagrożenie. Stanowi wprowadzenie do zagadnienia cyberbezpieczeństwa. Podzielona na kilka kluczowych części (systemy operacyjne, sieci komputerowe, aplikacje webowe, kryptografia, wreszcie cyberbezpieczeństwo jako takie), pozwala zapoznać się z najważniejszymi zagrożeniami i ze sposobami zabezpieczeń. Przybliża terminologię związaną z tematem i stanowi świetny punkt wyjścia do dalszego zgłębiania jego wybranych aspektów.  Cyberniebezpieczeństwo czyha. Czy jesteś na nie przygotowany?

196
Ładowanie...
EBOOK

Cybersecurity w pytaniach i odpowiedziach

Wojciech Ciemski

Co o cyberbezpieczeństwie każdy wiedzieć powinien W świecie, w którym większość naszych mniej lub bardziej wrażliwych danych przechowywana jest w sieci, cyberbezpieczeństwo powinno być tematem numer jeden. Niestety, na ogół nie jest, bo… Po prostu nie chce się nam myśleć o zastosowaniu odpowiednich zabezpieczeń. Stają się one dla nas kluczowe dopiero, kiedy ktoś się cyberwłamie i realnie skradnie coś, co było dla nas istotne: hasło do poczty e-mail, pieniądze z konta w banku, zdjęcia, które wolelibyśmy zachować dla siebie, itd. Tyle że wtedy jest już za późno.  Ta książka powstała po to, by jej czytelnik zdążył wyprzedzić zagrożenie. Stanowi wprowadzenie do zagadnienia cyberbezpieczeństwa. Podzielona na kilka kluczowych części (systemy operacyjne, sieci komputerowe, aplikacje webowe, kryptografia, wreszcie cyberbezpieczeństwo jako takie), pozwala zapoznać się z najważniejszymi zagrożeniami i ze sposobami zabezpieczeń. Przybliża terminologię związaną z tematem i stanowi świetny punkt wyjścia do dalszego zgłębiania jego wybranych aspektów.  Cyberniebezpieczeństwo czyha. Czy jesteś na nie przygotowany?

197
Ładowanie...
EBOOK

Data Science for Malware Analysis. A comprehensive guide to using AI in detection, analysis, and compliance

Shane Molinari, Jim Packer

In today's world full of online threats, the complexity of harmful software presents a significant challenge for detection and analysis. This insightful guide will teach you how to apply the principles of data science to online security, acting as both an educational resource and a practical manual for everyday use.Data Science for Malware Analysis starts by explaining the nuances of malware, from its lifecycle to its technological aspects before introducing you to the capabilities of data science in malware detection by leveraging machine learning, statistical analytics, and social network analysis. As you progress through the chapters, you’ll explore the analytical methods of reverse engineering, machine language, dynamic scrutiny, and behavioral assessments of malicious software. You’ll also develop an understanding of the evolving cybersecurity compliance landscape with regulations such as GDPR and CCPA, and gain insights into the global efforts in curbing cyber threats.By the end of this book, you’ll have a firm grasp on the modern malware lifecycle and how you can employ data science within cybersecurity to ward off new and evolving threats.

198
Ładowanie...
EBOOK

Data Science for Malware Analysis. A comprehensive guide to using AI in detection, analysis, and compliance

Shane Molinari, Jim Packer

In today's world full of online threats, the complexity of harmful software presents a significant challenge for detection and analysis. This insightful guide will teach you how to apply the principles of data science to online security, acting as both an educational resource and a practical manual for everyday use.Data Science for Malware Analysis starts by explaining the nuances of malware, from its lifecycle to its technological aspects before introducing you to the capabilities of data science in malware detection by leveraging machine learning, statistical analytics, and social network analysis. As you progress through the chapters, you’ll explore the analytical methods of reverse engineering, machine language, dynamic scrutiny, and behavioral assessments of malicious software. You’ll also develop an understanding of the evolving cybersecurity compliance landscape with regulations such as GDPR and CCPA, and gain insights into the global efforts in curbing cyber threats.By the end of this book, you’ll have a firm grasp on the modern malware lifecycle and how you can employ data science within cybersecurity to ward off new and evolving threats.

199
Ładowanie...
EBOOK

Data Science for Malware Analysis. A comprehensive guide to using AI in detection, analysis, and compliance

Shane Molinari, Jim Packer

In today's world full of online threats, the complexity of harmful software presents a significant challenge for detection and analysis. This insightful guide will teach you how to apply the principles of data science to online security, acting as both an educational resource and a practical manual for everyday use.Data Science for Malware Analysis starts by explaining the nuances of malware, from its lifecycle to its technological aspects before introducing you to the capabilities of data science in malware detection by leveraging machine learning, statistical analytics, and social network analysis. As you progress through the chapters, you’ll explore the analytical methods of reverse engineering, machine language, dynamic scrutiny, and behavioral assessments of malicious software. You’ll also develop an understanding of the evolving cybersecurity compliance landscape with regulations such as GDPR and CCPA, and gain insights into the global efforts in curbing cyber threats.By the end of this book, you’ll have a firm grasp on the modern malware lifecycle and how you can employ data science within cybersecurity to ward off new and evolving threats.

200
Ładowanie...
EBOOK

Data science od podstaw. Analiza danych w Pythonie

Joel Grus

Współczesne ogromne zbiory danych zawierają odpowiedzi na prawie każde pytanie. Równocześnie nauka o danych jest dziedziną, która cokolwiek onieśmiela. Znajduje się gdzieś pomiędzy subtelnymi umiejętnościami hakerskimi, twardą wiedzą z matematyki i statystyki a merytoryczną znajomością zagadnień z danej branży. Co więcej, dziedzina ta niezwykle dynamicznie się rozwija. Trud włożony w naukę o danych niewątpliwie się jednak opłaca: biegły analityk danych może liczyć na dobrze płatną, inspirującą i bardzo atrakcyjną pracę. Dzięki tej książce opanujesz najważniejsze zagadnienia związane z matematyką i statystyką, będziesz także rozwijać umiejętności hakerskie. W ten sposób zyskasz podstawy pozwalające na rozpoczęcie przygody z analizą danych. Gruntownie zapoznasz się z potrzebnymi narzędziami i algorytmami. Pozwoli Ci to lepiej zrozumieć ich działanie. Poszczególne przykłady, którymi zilustrowano omawiane zagadnienia, są przejrzyste, dobrze opisane i zrozumiałe. Podczas lektury książki poznasz biblioteki, które umożliwią zaimplementowanie omówionych technik podczas analizy dużych zbiorów danych. Szybko się przekonasz, że aby zostać analitykiem danych, wystarczy odrobina ciekawości, sporo chęci, mnóstwo ciężkiej pracy i... ta książka. Najważniejsze zagadnienia: Praktyczne wprowadzenie do Pythona Podstawy algebry liniowej, statystyki i rachunku prawdopodobieństwa w analizie danych Podstawy uczenia maszynowego Implementacje algorytmów modeli, w tym naiwny klasyfikator bayesowski, regresja liniowa, regresja logistyczna, drzewa decyzyjne, sieci neuronowe i grupowanie, MapReduce Systemy rekomendacji i mechanizmy przetwarzania języka naturalnego Korzystanie z mediów społecznościowych i baz danych. Python. Wyciśniesz z danych każdą kroplę wiedzy!

201
Ładowanie...
EBOOK

Data science od podstaw. Analiza danych w Pythonie. Wydanie II

Joel Grus

Analityka danych jest uważana za wyjątkowo obiecującą dziedzinę wiedzy. Rozwija się błyskawicznie i znajduje coraz to nowsze zastosowania. Profesjonaliści biegli w eksploracji danych i wydobywaniu z nich pożytecznych informacji mogą liczyć na interesującą pracę i bardzo atrakcyjne warunki zatrudnienia. Jednak aby zostać analitykiem danych, trzeba znać matematykę i statystykę, a także nauczyć się programowania. Umiejętności w zakresie uczenia maszynowego i uczenia głębokiego również są ważne. W przypadku tak specyficznej dziedziny, jaką jest nauka o danych, szczególnie istotne jest zdobycie gruntownych podstaw i dogłębne ich zrozumienie. W tym przewodniku opisano zagadnienia związane z podstawami nauki o danych. Wyjaśniono niezbędne elementy matematyki i statystyki. Przedstawiono także techniki budowy potrzebnych narzędzi i sposoby działania najistotniejszych algorytmów. Książka została skonstruowana tak, aby poszczególne implementacje były jak najbardziej przejrzyste i zrozumiałe. Zamieszczone tu przykłady napisano w Pythonie: jest to język dość łatwy do nauki, a pracę na danych ułatwia szereg przydatnych bibliotek Pythona. W drugim wydaniu znalazły się nowe tematy, takie jak uczenie głębokie, statystyka i przetwarzanie języka naturalnego, a także działania na ogromnych zbiorach danych. Zagadnienia te często pojawiają się w pracy współczesnego analityka danych. W książce między innymi: elementy algebry liniowej, statystyki i rachunku prawdopodobieństwa zbieranie, oczyszczanie i eksploracja danych algorytmy modeli analizy danych podstawy uczenia maszynowego systemy rekomendacji i przetwarzanie języka naturalnego analiza sieci społecznościowych i algorytm MapReduce Nauka o danych: bazuj na solidnych podstawach!

202
Ładowanie...
EBOOK

Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience

Rohan Pinto

Looking forward to mastering digital identity? This book will help you get to grips with complete frameworks, tools, and strategies for safeguarding personal data, securing online transactions, and ensuring trust in digital interactions in today's cybersecurity landscape.Decentralized Identity Explained delves into the evolution of digital identities, from their historical roots to the present landscape and future trajectories, exploring crucial concepts such as IAM, the significance of trust anchors and sources of truth, and emerging trends such as SSI and DIDs. Additionally, you’ll gain insights into the intricate relationships between trust and risk, the importance of informed consent, and the evolving role of biometrics in enhancing security within distributed identity management systems. Through detailed discussions on protocols, standards, and authentication mechanisms, this book equips you with the knowledge and tools needed to navigate the complexities of digital identity management in both current and future cybersecurity landscapes.By the end of this book, you’ll have a detailed understanding of digital identity management and best practices to implement secure and efficient digital identity frameworks, enhancing both organizational security and user experiences in the digital realm.

203
Ładowanie...
EBOOK

Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition

Maxim Lapan

Deep Reinforcement Learning Hands-On, Second Edition is an updated and expanded version of the bestselling guide to the very latest reinforcement learning (RL) tools and techniques. It provides you with an introduction to the fundamentals of RL, along with the hands-on ability to code intelligent learning agents to perform a range of practical tasks.With six new chapters devoted to a variety of up-to-the-minute developments in RL, including discrete optimization (solving the Rubik's Cube), multi-agent methods, Microsoft's TextWorld environment, advanced exploration techniques, and more, you will come away from this book with a deep understanding of the latest innovations in this emerging field.In addition, you will gain actionable insights into such topic areas as deep Q-networks, policy gradient methods, continuous control problems, and highly scalable, non-gradient methods. You will also discover how to build a real hardware robot trained with RL for less than $100 and solve the Pong environment in just 30 minutes of training using step-by-step code optimization.In short, Deep Reinforcement Learning Hands-On, Second Edition, is your companion to navigating the exciting complexities of RL as it helps you attain experience and knowledge through real-world examples.

204
Ładowanie...
EBOOK

Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces

Colin Domoney, Chris Wysopal, Isabelle Mauny

Along with the exponential growth of API adoption comes a rise in security concerns about their implementation and inherent vulnerabilities. For those seeking comprehensive insights into building, deploying, and managing APIs as the first line of cyber defense, this book offers invaluable guidance. Written by a seasoned DevSecOps expert, Defending APIs addresses the imperative task of API security with innovative approaches and techniques designed to combat API-specific safety challenges.The initial chapters are dedicated to API building blocks, hacking APIs by exploiting vulnerabilities, and case studies of recent breaches, while the subsequent sections of the book focus on building the skills necessary for securing APIs in real-world scenarios.Guided by clear step-by-step instructions, you’ll explore offensive techniques for testing vulnerabilities, attacking, and exploiting APIs. Transitioning to defensive techniques, the book equips you with effective methods to guard against common attacks. There are plenty of case studies peppered throughout the book to help you apply the techniques you’re learning in practice, complemented by in-depth insights and a wealth of best practices for building better APIs from the ground up.By the end of this book, you’ll have the expertise to develop secure APIs and test them against various cyber threats targeting APIs.

205
Ładowanie...
EBOOK

Defensive Security with Kali Purple. Cybersecurity strategies using ELK Stack and Kali Linux

Karl Lane

Defensive Security with Kali Purple combines red team tools from the Kali Linux OS and blue team tools commonly found within a security operations center (SOC) for an all-in-one approach to cybersecurity. This book takes you from an overview of today's cybersecurity services and their evolution to building a solid understanding of how Kali Purple can enhance training and support proof-of-concept scenarios for your technicians and analysts.After getting to grips with the basics, you’ll learn how to develop a cyber defense system for Small Office Home Office (SOHO ) services. This is demonstrated through the installation and configuration of supporting tools such as virtual machines, the Java SDK, Elastic, and related software. You’ll then explore Kali Purple’s compatibility with the Malcolm suite of tools, including Arkime, CyberChef, Suricata, and Zeek. As you progress, the book introduces advanced features, such as security incident response with StrangeBee’s Cortex and TheHive and threat and intelligence feeds. Finally, you’ll delve into digital forensics and explore tools for social engineering and exploit development.By the end of this book, you’ll have a clear and practical understanding of how this powerful suite of tools can be implemented in real-world scenarios.

206
Ładowanie...
EBOOK

Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java

Kamalmeet Singh, Ianculescu, Lucian-Paul Torje

Having a knowledge of design patterns enables you, as a developer, to improve your code base, promote code reuse, and make the architecture more robust. As languages evolve, new features take time to fully understand before they are adopted en masse. The mission of this book is to ease the adoption of the latest trends and provide good practices for programmers.We focus on showing you the practical aspects of smarter coding in Java. We'll start off by going over object-oriented (OOP) and functional programming (FP) paradigms, moving on to describe the most frequently used design patterns in their classical format and explain how Java’s functional programming features are changing them.You will learn to enhance implementations by mixing OOP and FP, and finally get to know about the reactive programming model, where FP and OOP are used in conjunction with a view to writing better code. Gradually, the book will show you the latest trends in architecture, moving from MVC to microservices and serverless architecture. We will finish off by highlighting the new Java features and best practices. By the end of the book, you will be able to efficiently address common problems faced while developing applications and be comfortable working on scalable and maintainable projects of any size.

207
Ładowanie...
EBOOK

DevOps Bootcamp. The fastest way to learn DevOps

Mitesh Soni

DevOps Bootcamp delivers practical learning modules in manageable chunks. Each chunk is delivered in a day, and each day is a productive one. Each day builds your competency in DevOps. You will be able to take the task you learn every day and apply it to cultivate the DevOps culture.Each chapter presents core concepts and key takeaways about a topic in DevOps and provides a series of hands-on exercises. You will not only learn the importance of basic concepts or practices of DevOps but also how to use different tools to automate application lifecycle management. We will start off by building the foundation of the DevOps concepts. On day two, we will perform Continuous Integration using Jenkins and VSTS both by configuring Maven-based JEE Web Application?. We will also integrate Jenkins and Sonar qube for Static Code Analysis. Further, on day three, we will focus on Docker containers where we will install and configure Docker and also create a Tomcat Container to deploy our Java based web application. On day four, we will create and configure the environment for application deployment in AWS and Microsoft Azure Cloud for which we will use Infrastructure as a Service and Open Source Configuration Management tool Chef. For day five, our focus would be on Continuous Delivery. We will automate application deployment in Docker container using Jenkins Plugin, AWS EC2 using Script, AWS Elastic Beanstalk using Jenkins Plugin, Microsoft Azure VM using script, and Microsoft Azure App Services Using Jenkins. We will also configure Continuous Delivery using VSTS. We will then learn the concept of Automated Testing on day six using Apache JMeter and URL-based tests in VSTS. Further, on day seven, we will explore various ways to automate application lifecycle management using orchestration. We will see how Pipeline can be created in Jenkins and VSTS, so the moment Continuous? Integration is completed successfully, Continuous Delivery will start and application will be deployed. On the final day, our focus would be on Security access to Jenkins and Monitoring of CI resources, and cloud-based resources in AWS and Microsoft Azure Platform as a Service.

208
Ładowanie...
EBOOK

DevSecOps for Azure. End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud

David Okeyode, Joylynn Kirui, Scott Hanselman

Businesses must prioritize security, especially when working in the constantly evolving Azure cloud. However, many organizations struggle to maintain security and compliance. Attackers are increasingly targeting software development processes, making software supply chain security crucial. This includes source control systems, build systems, CI/CD platforms, and various artifacts. With the help of this book, you’ll be able to enhance security and compliance in Azure software development processes.Starting with an overview of DevOps and its relationship with Agile methodologies and cloud computing, you'll gain a solid foundation in DevSecOps principles. The book then delves into the security challenges specific to DevOps workflows and how to address them effectively. You'll learn how to implement security measures in the planning phase, including threat modeling and secure coding practices. You'll also explore pre-commit security controls, source control security, and the integration of various security tools in the build and test phases. The book covers crucial aspects of securing the release and deploy phases, focusing on artifact integrity, infrastructure as code security, and runtime protection.By the end of this book, you’ll have the knowledge and skills to implement a secure code-to-cloud process for the Azure cloud.

209
Ładowanie...
EBOOK

DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio

Parth Pandit, Robert Hardt

As Kubernetes (or K8s) becomes more prolific, managing large clusters at scale in a multi-cloud environment becomes more challenging – especially from a developer productivity and operational efficiency point of view. DevSecOps in Practice with VMware Tanzu addresses these challenges by automating the delivery of containerized workloads and controlling multi-cloud Kubernetes operations using Tanzu tools.This comprehensive guide begins with an overview of the VMWare Tanzu platform and discusses its tools for building useful and secure applications using the App Accelerator, Build Service, Catalog service, and API portal. Next, you’ll delve into running those applications efficiently at scale with Tanzu Kubernetes Grid and Tanzu Application Platform. As you advance, you’ll find out how to manage these applications, and control, observe, and connect them using Tanzu Mission Control, Tanzu Observability, and Tanzu Service Mesh. Finally, you’ll explore the architecture, capabilities, features, installation, configuration, implementation, and benefits of these services with the help of examples.By the end of this VMware book, you’ll have gained a thorough understanding of the VMWare Tanzu platform and be able to efficiently articulate and solve real-world business problems.

210
Ładowanie...
EBOOK

Digital Ethics in the Age of AI. Navigating the ethical frontier today and beyond

IT Governance Publishing, Dr. Julie E. Mehan

Digital Ethics in the Age of AI explores the profound ethical challenges posed by the rise of artificial intelligence and its integration into our daily lives. The book covers AI’s disruptive effects across various sectors, including misinformation, privacy, and job displacement, offering clear explanations and real-world examples. The author delves into the role of AI in spreading misinformation and disinformation, including the creation of deepfakes, and highlights the increasing risk of online disinhibition driven by AI-powered interactions. The book also addresses the cognitive biases embedded within AI systems and the growing concerns over privacy, data security, and surveillance in an age of ubiquitous AI technologies. Finally, the book explores the potential for AI-driven job displacement, particularly in the cognitive class, and the societal implications of such disruptions. It also covers intellectual property challenges in the age of AI and the complexities surrounding generative AI’s impact on privacy and digital ownership. Offering solutions for mitigating these risks, Digital Ethics in the Age of AI provides a roadmap for navigating the ethical and regulatory landscape of AI today and in the future.

211
Ładowanie...
EBOOK

Digital Ethics in the Age of AI. Navigating the ethical frontier today and beyond

IT Governance Publishing, Dr. Julie E. Mehan

Digital Ethics in the Age of AI explores the profound ethical challenges posed by the rise of artificial intelligence and its integration into our daily lives. The book covers AI’s disruptive effects across various sectors, including misinformation, privacy, and job displacement, offering clear explanations and real-world examples. The author delves into the role of AI in spreading misinformation and disinformation, including the creation of deepfakes, and highlights the increasing risk of online disinhibition driven by AI-powered interactions. The book also addresses the cognitive biases embedded within AI systems and the growing concerns over privacy, data security, and surveillance in an age of ubiquitous AI technologies. Finally, the book explores the potential for AI-driven job displacement, particularly in the cognitive class, and the societal implications of such disruptions. It also covers intellectual property challenges in the age of AI and the complexities surrounding generative AI’s impact on privacy and digital ownership. Offering solutions for mitigating these risks, Digital Ethics in the Age of AI provides a roadmap for navigating the ethical and regulatory landscape of AI today and in the future.

212
Ładowanie...
EBOOK

Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition

Gerard Johansen

An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization’s infrastructure from attacks. This updated third edition will help you perform cutting-edge digital forensic activities and incident response with a new focus on responding to ransomware attacks.After covering the fundamentals of incident response that are critical to any information security team, you’ll explore incident response frameworks. From understanding their importance to creating a swift and effective response to security incidents, the book will guide you using examples. Later, you’ll cover digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. You’ll be able to apply these techniques to the current threat of ransomware. As you progress, you’ll discover the role that threat intelligence plays in the incident response process. You’ll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis and demonstrate how you can proactively use your digital forensic skills in threat hunting.By the end of this book, you’ll be able to investigate and report unwanted security breaches and incidents in your organization.

213
Ładowanie...
EBOOK

Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition

Gerard Johansen

An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization’s infrastructure from attacks. This updated third edition will help you perform cutting-edge digital forensic activities and incident response with a new focus on responding to ransomware attacks.After covering the fundamentals of incident response that are critical to any information security team, you’ll explore incident response frameworks. From understanding their importance to creating a swift and effective response to security incidents, the book will guide you using examples. Later, you’ll cover digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. You’ll be able to apply these techniques to the current threat of ransomware. As you progress, you’ll discover the role that threat intelligence plays in the incident response process. You’ll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis and demonstrate how you can proactively use your digital forensic skills in threat hunting.By the end of this book, you’ll be able to investigate and report unwanted security breaches and incidents in your organization.

214
Ładowanie...
EBOOK

Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition

Shiva V. N. Parasram

Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. This third edition is updated with real-world examples and detailed labs to help you take your investigation skills to the next level using powerful tools.This new edition will help you explore modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, Hex Editor, and Axiom. You’ll cover the basics and advanced areas of digital forensics within the world of modern forensics while delving into the domain of operating systems. As you advance through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. You’ll also discover how to install Windows Emulator, Autopsy 4 in Kali, and how to use Nmap and NetDiscover to find device types and hosts on a network, along with creating forensic images of data and maintaining integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, memory, and operating systems.By the end of this digital forensics book, you'll have gained hands-on experience in implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation – all using Kali Linux's cutting-edge tools.

215
Ładowanie...
EBOOK

Disaster Recovery and Business Continuity. A quick guide for organisations and business managers

IT Governance Publishing, Thejendra B.S

This book delves into disaster recovery (DR) and business continuity (BC), offering practical strategies for organizations to prepare for and manage disruptions. It starts by defining core concepts of DR and BC, highlighting their role in crisis management. Early chapters explore business impact analysis, data protection, and risk assessment, while examining common IT and non-IT disasters like data loss, cyberattacks, and communication failures.Later sections focus on specific disaster scenarios, such as virus attacks, software failures, and data center risks, offering prevention methods and recovery plans. It also addresses human factors in DR, covering IT staff and contractor management, and the risks tied to outsourcing and project failures.In addition to IT risks, the book explores non-IT disasters, including health crises, financial challenges, and natural events, with strategies for mitigation. The final chapters provide guidance on creating and testing contingency plans, featuring checklists and mock run procedures. This book empowers readers to design, implement, and maintain effective DR and BC plans for their organization’s needs.

216
Ładowanie...
EBOOK

Disaster Recovery and Business Continuity. A quick guide for organisations and business managers

IT Governance Publishing, Thejendra B.S

This book delves into disaster recovery (DR) and business continuity (BC), offering practical strategies for organizations to prepare for and manage disruptions. It starts by defining core concepts of DR and BC, highlighting their role in crisis management. Early chapters explore business impact analysis, data protection, and risk assessment, while examining common IT and non-IT disasters like data loss, cyberattacks, and communication failures.Later sections focus on specific disaster scenarios, such as virus attacks, software failures, and data center risks, offering prevention methods and recovery plans. It also addresses human factors in DR, covering IT staff and contractor management, and the risks tied to outsourcing and project failures.In addition to IT risks, the book explores non-IT disasters, including health crises, financial challenges, and natural events, with strategies for mitigation. The final chapters provide guidance on creating and testing contingency plans, featuring checklists and mock run procedures. This book empowers readers to design, implement, and maintain effective DR and BC plans for their organization’s needs.

217
Ładowanie...
EBOOK

Discrete Mathematics With Cryptographic Applications. A Self-Teaching Guide to Unlocking the Power of Advanced Concepts and Computational Techniques

Mercury Learning and Information, Alexander I. Kheyfits

This book offers a comprehensive guide to discrete mathematics and its applications to cryptography. It is designed for students and professionals in fields such as discrete mathematics and finite mathematics, with all necessary prerequisites clearly explained and illustrated. The text introduces key concepts in number theory, coding theory, and information theory, which are essential for understanding cryptography.Understanding discrete mathematics is crucial for anyone working in cryptography and related fields. The book begins with a survey of elementary functions and moves on to propositional algebra, set theory, and algebraic structures like groups, rings, and fields. It covers binary relations, combinatorics, and elements of number theory, which are fundamental to cryptographic methods.Readers will explore topics such as Boolean functions, hashing functions, cryptographic maps, combinatorial circuits, and graph theory. The book also delves into advanced areas like finite automata, game theory, and Turing machines. Through numerous examples, problems, and solutions, readers will gain a solid foundation in discrete mathematics and its cryptographic applications.

218
Ładowanie...
EBOOK

Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed

Jeremiah Ginn

The SASE concept was coined by Gartner after seeing a pattern emerge in cloud and SD-WAN projects where full security integration was needed. The market behavior lately has sparked something like a space race for all technology manufacturers and cloud service providers to offer a SASE solution. The current training available in the market is minimal and manufacturer-oriented, with new services being released every few weeks. Professional architects and engineers trying to implement SASE need to take a manufacturer-neutral approach.This guide provides a foundation for understanding SASE, but it also has a lasting impact because it not only addresses the problems that existed at the time of publication, but also provides a continual learning approach to successfully lead in a market that evolves every few weeks. Technology teams need a tool that provides a model to keep up with new information as it becomes available and stay ahead of market hype.With this book, you’ll learn about crucial models for SASE success in designing, building, deploying, and supporting operations to ensure the most positive user experience (UX). In addition to SASE, you’ll gain insight into SD-WAN design, DevOps, zero trust, and next-generation technical education methods.

219
Ładowanie...
EBOOK

Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed

Jeremiah Ginn

The SASE concept was coined by Gartner after seeing a pattern emerge in cloud and SD-WAN projects where full security integration was needed. The market behavior lately has sparked something like a space race for all technology manufacturers and cloud service providers to offer a SASE solution. The current training available in the market is minimal and manufacturer-oriented, with new services being released every few weeks. Professional architects and engineers trying to implement SASE need to take a manufacturer-neutral approach.This guide provides a foundation for understanding SASE, but it also has a lasting impact because it not only addresses the problems that existed at the time of publication, but also provides a continual learning approach to successfully lead in a market that evolves every few weeks. Technology teams need a tool that provides a model to keep up with new information as it becomes available and stay ahead of market hype.With this book, you’ll learn about crucial models for SASE success in designing, building, deploying, and supporting operations to ensure the most positive user experience (UX). In addition to SASE, you’ll gain insight into SD-WAN design, DevOps, zero trust, and next-generation technical education methods.

220
Ładowanie...
EBOOK

Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications

Jaroslaw Krochmalski, Jarosław Krochmalski

Imagine creating and testing Java EE applications on Apache Tomcat Server or Wildfly Application server in minutes along with deploying and managing Java applications swiftly. Sounds too good to be true? But you have a reason to cheer as such scenarios are only possible by leveraging Docker and Kubernetes.This book will start by introducing Docker and delve deep into its networking and persistent storage concepts. You will then proceed to learn how to refactor monolith application into separate services by building an application and then packaging it into Docker containers. Next, you will create an image containing Java Enterprise Application and later run it using Docker. Moving on, the book will focus on Kubernetes and its features and you will learn to deploy a Java application to Kubernetes using Maven and monitor a Java application in production. By the end of the book, you will get hands-on with some more advanced topics to further extend your knowledge about Docker and Kubernetes.

221
Ładowanie...
EBOOK

Docker Deep Dive. Zero to Docker in a single book - Third Edition

Nigel Poulton

Embark on a transformative journey into the world of Docker and containers with this expertly crafted course. Starting with a high-level overview, you'll gain a solid understanding of containers and the significance of Docker in modern software development. Delve into Docker's core components, exploring essential standards, projects, and the intricacies of the Docker Engine, ensuring a robust foundation.As you progress, practical hands-on modules will guide you through working with images and containers, containerizing applications, and managing multi-container setups using Docker Compose. You'll learn to deploy applications efficiently with Docker Swarm and Docker Stacks, enhancing your ability to manage and scale containerized applications. The course also introduces Docker's integration with WebAssembly, offering a glimpse into cutting-edge container technologies.Concluding with advanced topics, you'll master Docker networking, including overlay networks and persistent data management with volumes. Emphasis on Docker security ensures you can safeguard your applications and data effectively. By the end of this course, you'll possess the skills and knowledge to leverage Docker's full capabilities, from development to deployment, ensuring you remain at the forefront of container technology.

222
Ładowanie...
EBOOK

Docker Deep Dive. Zero to Docker in a single book - Third Edition

Nigel Poulton

Embark on a transformative journey into the world of Docker and containers with this expertly crafted course. Starting with a high-level overview, you'll gain a solid understanding of containers and the significance of Docker in modern software development. Delve into Docker's core components, exploring essential standards, projects, and the intricacies of the Docker Engine, ensuring a robust foundation.As you progress, practical hands-on modules will guide you through working with images and containers, containerizing applications, and managing multi-container setups using Docker Compose. You'll learn to deploy applications efficiently with Docker Swarm and Docker Stacks, enhancing your ability to manage and scale containerized applications. The course also introduces Docker's integration with WebAssembly, offering a glimpse into cutting-edge container technologies.Concluding with advanced topics, you'll master Docker networking, including overlay networks and persistent data management with volumes. Emphasis on Docker security ensures you can safeguard your applications and data effectively. By the end of this course, you'll possess the skills and knowledge to leverage Docker's full capabilities, from development to deployment, ensuring you remain at the forefront of container technology.

223
Ładowanie...
EBOOK

Docker Networking Cookbook. 60 practical recipes that help you gain expertise with Docker networking and understand the underlying constructs that make it all work

Jon Langemak, Aditya Amar

Networking functionality in Docker has changed considerably since its first release, evolving to offer a rich set of built-in networking features, as well as an extensible plugin model allowing for a wide variety of networking functionality. This book explores Docker networking capabilities from end to end. Begin by examining the building blocks used by Docker to implement fundamental containing networking before learning how to consume built-in networking constructs as well as custom networks you create on your own. Next, explore common third-party networking plugins, including detailed information on how these plugins inter-operate with the Docker engine. Consider available options for securing container networks, as well as a process for troubleshooting container connectivity.Finally, examine advanced Docker networking functions and their relevant use cases, tying together everything you need to succeed with your own projects.

224
Ładowanie...
EBOOK

Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications

Earl Waud

Docker is an open source software platform that helps you with creating, deploying, and running your applications using containers. This book is your ideal introduction to Docker and containerization.You will learn how to set up a Docker development environment on a Linux, Mac, or Windows workstation, and learn your way around all the commands to run and manage your Docker images and containers.You will explore the Dockerfile and learn how to build your own enterprise-grade Docker images. Then you will learn about Docker networks, Docker swarm, and Docker volumes, and how to use these features with Docker stacks in order to define, deploy, and maintain highly-scalable, fault-tolerant multi-container applications.Finally, you will learn how to leverage Docker with Jenkins to automate the building of Docker images and the deployment of Docker containers. By the end of this book, you will be well prepared when it comes to using Docker for your next project.

225
Ładowanie...
EBOOK

Domain-Driven Design in PHP. A Highly Practical Guide

Keyvan Akbary, Carlos Buenosvinos, Christian Soronellas

Domain-Driven Design (DDD) has arrived in the PHP community, but for all the talk, there is very little real code. Without being in a training session and with no PHP real examples, learning DDD can be challenging. This book changes all that. It details how to implement tactical DDD patterns and gives full examples of topics such as integrating Bounded Contexts with REST, and DDD messaging strategies. In this book, the authors show you, with tons of details and examples, how to properly design Entities, Value Objects, Services, Domain Events, Aggregates, Factories, Repositories, Services, and Application Services with PHP. They show how to apply Hexagonal Architecture within your application whether you use an open source framework or your own.