Hacking

W kategorii Hacking zebrano publikacje dotyczące nie tylko hackerów, crackerów i ich technik działania, ale także opisujące różne aspekty bezpieczeństwa komputerów i danych na nich przechowywanych. Poznacie technikę przeprowadzania audytów bezpieczeństwa oraz sposoby zabezpieczania się przed atakami hackerów, programami szpiegującymi czy zwykłą plagą wirusów.

Nauczycie się chronić nie tylko poszczególne komputery ale całe sieci komputerowe przez opracowanie i wdrożenie odpowiedniej polityki bezpieczeństwa, poprawne użycie firewalli czy odpowiednie skonfigurowanie serwerów pracujących pod Waszym nadzorem, a także opanujecie sposoby bezpiecznego surfowania po internecie.

681
Ładowanie...
EBOOK

SnowPro Core Certification Study Guide. Build a solid foundation in Snowflake to pass the SnowPro Core exam on the first attempt

Jatin Verma

Through this hands-on Snowflake certification book with real-world examples, you’ll quickly learn fundamental concepts and perform required labs to develop an understanding of Snowflake architecture and data security. As you progress, you will dive into critical domains of the exam, including SQL for Snowflake certification, data governance, access control, and transformations.Alongside top resources for SnowPro Core exam preparation, you will progress from the basics of the Snowflake data pipeline and ETL processes through best practices for Snowflake query optimization to onboarding users with the right access controls to ensure your data stays safe and secure. You’ll also learn how to share data outside of Snowflake.Combined with the Snowflake hands-on projects and lab exercises, you’ll be ready to take the SnowPro Core exam and pass it the first time. You’ll gain all the skills to use Snowflake to fulfill your organization’s data needs.The book is written by Jatin Verma, a certified SnowPro Core expert, and includes practical exam strategies, practice tests, and flashcards to enhance your preparation. Whether you're a data engineer, architect, analyst, or cloud professional, this guide will ensure you're fully prepared for Snowflake certification success.

682
Ładowanie...
EBOOK

SOC Analyst Career Guide. Become highly skilled in security tools, tactics, and techniques to jumpstart your SOC analyst career

Kyler Kent

As cyberattacks continue to disrupt modern enterprises, organizations urgently need vigilant security operations center (SOC) analysts who can detect and stop threats fast. With modern SIEMs and ingestion strategies, much of the necessary data is already within easy reach. This book provides you with the daily tactics, techniques, and procedures of a SOC analyst and shows how to exceed expectations in a modern SOC.The book builds a solid foundation in security operations, preparing you for the SOC analyst role and other positions within the SOC. With this base in place, you’ll advance into key SOC roles and blue team principles, such as detection and engineering. You’ll be able to clearly articulate your future as a SOC analyst in an interview as well as talk about your career path to impress prospective employers. You’ll get to grips with advanced threat actors, including advanced persistent threats (APTs) that wield considerable resources in campaigning against an organization. The chapters cover important concepts, such as governance, risk, and compliance (GRC), blue and red team tools, network security, web app security, and job search skills.By the end of this book, you’ll be able to demonstrate competency and acquire a SOC analyst position with an additional career outlook moving forward.

683
Ładowanie...
EBOOK

SOC Analyst Career Guide. Become highly skilled in security tools, tactics, and techniques to jumpstart your SOC analyst career

Kyler Kent

As cyberattacks continue to disrupt modern enterprises, organizations urgently need vigilant security operations center (SOC) analysts who can detect and stop threats fast. With modern SIEMs and ingestion strategies, much of the necessary data is already within easy reach. This book provides you with the daily tactics, techniques, and procedures of a SOC analyst and shows how to exceed expectations in a modern SOC.The book builds a solid foundation in security operations, preparing you for the SOC analyst role and other positions within the SOC. With this base in place, you’ll advance into key SOC roles and blue team principles, such as detection and engineering. You’ll be able to clearly articulate your future as a SOC analyst in an interview as well as talk about your career path to impress prospective employers. You’ll get to grips with advanced threat actors, including advanced persistent threats (APTs) that wield considerable resources in campaigning against an organization. The chapters cover important concepts, such as governance, risk, and compliance (GRC), blue and red team tools, network security, web app security, and job search skills.By the end of this book, you’ll be able to demonstrate competency and acquire a SOC analyst position with an additional career outlook moving forward.

684
Ładowanie...
EBOOK

SOC Analyst Career Guide. Become highly skilled in security tools, tactics, and techniques to jumpstart your SOC analyst career

Kyler Kent

As cyberattacks continue to disrupt modern enterprises, organizations urgently need vigilant security operations center (SOC) analysts who can detect and stop threats fast. With modern SIEMs and ingestion strategies, much of the necessary data is already within easy reach. This book provides you with the daily tactics, techniques, and procedures of a SOC analyst and shows how to exceed expectations in a modern SOC.The book builds a solid foundation in security operations, preparing you for the SOC analyst role and other positions within the SOC. With this base in place, you’ll advance into key SOC roles and blue team principles, such as detection and engineering. You’ll be able to clearly articulate your future as a SOC analyst in an interview as well as talk about your career path to impress prospective employers. You’ll get to grips with advanced threat actors, including advanced persistent threats (APTs) that wield considerable resources in campaigning against an organization. The chapters cover important concepts, such as governance, risk, and compliance (GRC), blue and red team tools, network security, web app security, and job search skills.By the end of this book, you’ll be able to demonstrate competency and acquire a SOC analyst position with an additional career outlook moving forward.

685
Ładowanie...
EBOOK

SOC Analyst Career Guide. Become highly skilled in security tools, tactics, and techniques to jumpstart your SOC analyst career

Kyler Kent

As cyberattacks continue to disrupt modern enterprises, organizations urgently need vigilant security operations center (SOC) analysts who can detect and stop threats fast. With modern SIEMs and ingestion strategies, much of the necessary data is already within easy reach. This book provides you with the daily tactics, techniques, and procedures of a SOC analyst and shows how to exceed expectations in a modern SOC.The book builds a solid foundation in security operations, preparing you for the SOC analyst role and other positions within the SOC. With this base in place, you’ll advance into key SOC roles and blue team principles, such as detection and engineering. You’ll be able to clearly articulate your future as a SOC analyst in an interview as well as talk about your career path to impress prospective employers. You’ll get to grips with advanced threat actors, including advanced persistent threats (APTs) that wield considerable resources in campaigning against an organization. The chapters cover important concepts, such as governance, risk, and compliance (GRC), blue and red team tools, network security, web app security, and job search skills.By the end of this book, you’ll be able to demonstrate competency and acquire a SOC analyst position with an additional career outlook moving forward.

686
Ładowanie...
EBOOK

SOC Analyst Career Guide. Become highly skilled in security tools, tactics, and techniques to jumpstart your SOC analyst career

Kyler Kent

As cyberattacks continue to disrupt modern enterprises, organizations urgently need vigilant security operations center (SOC) analysts who can detect and stop threats fast. With modern SIEMs and ingestion strategies, much of the necessary data is already within easy reach. This book provides you with the daily tactics, techniques, and procedures of a SOC analyst and shows how to exceed expectations in a modern SOC.The book builds a solid foundation in security operations, preparing you for the SOC analyst role and other positions within the SOC. With this base in place, you’ll advance into key SOC roles and blue team principles, such as detection and engineering. You’ll be able to clearly articulate your future as a SOC analyst in an interview as well as talk about your career path to impress prospective employers. You’ll get to grips with advanced threat actors, including advanced persistent threats (APTs) that wield considerable resources in campaigning against an organization. The chapters cover important concepts, such as governance, risk, and compliance (GRC), blue and red team tools, network security, web app security, and job search skills.By the end of this book, you’ll be able to demonstrate competency and acquire a SOC analyst position with an additional career outlook moving forward.

687
Ładowanie...
EBOOK

Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II

Christopher Hadnagy

Nowa książka Chrisa Hadnagy'ego, Socjotechnika. Sztuka zdobywania władzy nad umysłami jest doskonałą lekturą dla każdego, kto jest choć trochę zainteresowany kwestią inżynierii społecznej. Opisane w niej działania, od zdobywania informacji po wykonanie planu, umożliwiają infiltrację dowolnego celu. Kevin Mitnick, autor, prelegent i konsultant Wykorzystaj najlepsze techniki hackerskie, aby lepiej bronić się przed atakami. W sieci zabezpieczeń, które stworzyliśmy dla ochrony naszych danych, najsłabszym elementem jest zawsze czynnik ludzki. Hackerzy, zarówno etyczni, jak i nie, korzystają z wachlarza sztuczek opierających na "hackowaniu osobistym" i pozwalających przekonać innych do ujawnienia haseł, przekazania wrażliwych plików, przelania znacznych sum pieniędzy i świadomego podjęcia działań, które zdecydowanie nie są w najlepszym interesie osób, które wykonują te czynności. Książka Socjotechnika. Sztuka zdobywania władzy nad umysłami opisuje te sztuczki, aby umożliwić specjalistom zajmującym się bezpieczeństwem danych wykorzystanie tych umiejętności w celu odkrycia i wyeliminowania słabości zabezpieczeń. Niniejsza pozycja zarówno przedstawia techniki takie, jak modelowanie komunikacji, mentalność plemienna, obserwacja bądź manipulacja, jak i prezentuje wskazówki umożliwiające rozpoznanie, zwalczanie i zapobieganie atakom wykorzystującym inżynierię społeczną. Drugie, rozszerzone wydanie prezentuje różne techniki inżynierii społecznej, od klasycznych po najnowocześniejsze, przedstawiając je w kontekście zdarzeń znanych z pierwszych stron gazet, jak z własnych doświadczeń autora. Szczegółowe omówienie technik, takich jak wzbudzanie emocji, tworzenie pretekstu, biały wywiad, tailgating bądź phishing pozwala zrozumieć, jak łatwo jest skłonić ludzi do podjęcia szkodliwych decyzji. "W późnych latach 70. zacząłem korzystać z inżynierii społecznej, aby jeździć autobusem za darmo jako nastolatek, przechwytywać połączenia NSA w liceum i łamać dowolne zabezpieczenia w wieku studenckim. Wszystko to robiłem wyłącznie z ciekawości, chęci sprawdzenia się i żądzy przygód. Dziś, po kilku dekadach, wciąż twierdze, że inżynieria społeczna jest najważniejszą metodą każdego testu penetracji. Nie tylko ja zresztą. Agenci rządowi, hackerzy kryminalni i hacktywiści korzystają z takiej taktyki, aby kraść pieniędze, zdobywać dane a czasami nawet wpływać na wyniki wyborów w państwie." Kevin Mitnick, autor, prelegent i konsultant Posłuchaj audiobooka:

688
Ładowanie...
EBOOK

Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II

Christopher Hadnagy

Nowa książka Chrisa Hadnagy'ego, Socjotechnika. Sztuka zdobywania władzy nad umysłami jest doskonałą lekturą dla każdego, kto jest choć trochę zainteresowany kwestią inżynierii społecznej. Opisane w niej działania, od zdobywania informacji po wykonanie planu, umożliwiają infiltrację dowolnego celu. Kevin Mitnick, autor, prelegent i konsultant Wykorzystaj najlepsze techniki hackerskie, aby lepiej bronić się przed atakami. W sieci zabezpieczeń, które stworzyliśmy dla ochrony naszych danych, najsłabszym elementem jest zawsze czynnik ludzki. Hackerzy, zarówno etyczni, jak i nie, korzystają z wachlarza sztuczek opierających na "hackowaniu osobistym" i pozwalających przekonać innych do ujawnienia haseł, przekazania wrażliwych plików, przelania znacznych sum pieniędzy i świadomego podjęcia działań, które zdecydowanie nie są w najlepszym interesie osób, które wykonują te czynności. Książka Socjotechnika. Sztuka zdobywania władzy nad umysłami opisuje te sztuczki, aby umożliwić specjalistom zajmującym się bezpieczeństwem danych wykorzystanie tych umiejętności w celu odkrycia i wyeliminowania słabości zabezpieczeń. Niniejsza pozycja zarówno przedstawia techniki takie, jak modelowanie komunikacji, mentalność plemienna, obserwacja bądź manipulacja, jak i prezentuje wskazówki umożliwiające rozpoznanie, zwalczanie i zapobieganie atakom wykorzystującym inżynierię społeczną. Drugie, rozszerzone wydanie prezentuje różne techniki inżynierii społecznej, od klasycznych po najnowocześniejsze, przedstawiając je w kontekście zdarzeń znanych z pierwszych stron gazet, jak z własnych doświadczeń autora. Szczegółowe omówienie technik, takich jak wzbudzanie emocji, tworzenie pretekstu, biały wywiad, tailgating bądź phishing pozwala zrozumieć, jak łatwo jest skłonić ludzi do podjęcia szkodliwych decyzji. "W późnych latach 70. zacząłem korzystać z inżynierii społecznej, aby jeździć autobusem za darmo jako nastolatek, przechwytywać połączenia NSA w liceum i łamać dowolne zabezpieczenia w wieku studenckim. Wszystko to robiłem wyłącznie z ciekawości, chęci sprawdzenia się i żądzy przygód. Dziś, po kilku dekadach, wciąż twierdze, że inżynieria społeczna jest najważniejszą metodą każdego testu penetracji. Nie tylko ja zresztą. Agenci rządowi, hackerzy kryminalni i hacktywiści korzystają z takiej taktyki, aby kraść pieniędze, zdobywać dane a czasami nawet wpływać na wyniki wyborów w państwie." Kevin Mitnick, autor, prelegent i konsultant Posłuchaj audiobooka:

689
Ładowanie...
EBOOK

Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts

Joseph Ingeno

The Software Architect’s Handbook is a comprehensive guide to help developers, architects, and senior programmers advance their career in the software architecture domain. This book takes you through all the important concepts, right from design principles to different considerations at various stages of your career in software architecture. The book begins by covering the fundamentals, benefits, and purpose of software architecture. You will discover how software architecture relates to an organization, followed by identifying its significant quality attributes. Once you have covered the basics, you will explore design patterns, best practices, and paradigms for efficient software development.The book discusses which factors you need to consider for performance and security enhancements. You will learn to write documentation for your architectures and make appropriate decisions when considering DevOps. In addition to this, you will explore how to design legacy applications before understanding how to create software architectures that evolve as the market, business requirements, frameworks, tools, and best practices change over time.By the end of this book, you will not only have studied software architecture concepts but also built the soft skills necessary to grow in this field.

690
Ładowanie...
EBOOK

Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python

Anand Balachandran Pillai

This book starts by explaining how Python fits into an application's architecture. As you move along, you will get to grips with architecturally significant demands and how to determine them. Later, you’ll gain a complete understanding of the different architectural quality requirements for building a product that satisfies business needs, such as maintainability/reusability, testability, scalability, performance, usability, and security.You will also use various techniques such as incorporating DevOps, continuous integration, and more to make your application robust. You will discover when and when not to use object orientation in your applications, and design scalable applications.The focus is on building the business logic based on the business process documentation, and understanding which frameworks to use and when to use them. The book also covers some important patterns that should be taken into account while solving design problems, as well as those in relatively new domains such as the Cloud.By the end of this book, you will have understood the ins and outs of Python so that you can make critical design decisions that not just live up to but also surpassyour clients’ expectations.

691
Ładowanie...
EBOOK

SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM

Joe Dissmeyer, Joseph Dissmeyer

Orion Network Performance Monitor is a scalable, easy-to-use, cost-effective network monitoring system that provides a complete overview of network environments by monitoring performance and availability. Orion NPM enables you to be proactive in detecting, diagnosing, and resolving network issues and outages and has the benefit of supporting hundreds of types of server, OS, and network vendors including Cisco, HP, Microsoft, Linux, Motorola, Brocade, Foundry, and more.Orion NPM is a well-known product and is used by thousands of public and private companies, educational institutions, and government entities for network monitoring. In SolarWinds Orion Network Performance Monitor you will learn how to install, implement, and manage Orion NPM to ensure you maintain an efficient, healthy, and performant network.In this book you will start with an overview of the constituent features of Orion NPM. Leading you through installation and configuration this book will help you set up a flexible and dynamic monitoring solution.With Orion NPM in place the book will then take you on a journey through essential Orion NPM and network monitoring concepts and practices. You will cover device management, learning how to use the Network Sonar Wizard, as well as adding devices manually.Turning from novice to pro, you will then be introduced to the core of network monitoring with Orion NPM. You will learn about monitoring Windows and Linux solutions as well as Virtual Servers. You will then master wireless networks and virtual networks. You will then learn how to set up and edit alerts to make network monitoring more efficient and less time-consuming. You will also learn how to develop reports and network maps as well as essential administrative techniques.

692
Ładowanie...
EBOOK

Solidity Programming Essentials. A beginner's guide to build smart contracts for Ethereum and blockchain

Ritesh Modi

Solidity is a contract-oriented language whose syntax is highly influenced by JavaScript, and is designed to compile code for the Ethereum Virtual Machine. Solidity Programming Essentials will be your guide to understanding Solidity programming to build smart contracts for Ethereum and blockchain from ground-up.We begin with a brief run-through of blockchain, Ethereum, and their most important concepts or components. You will learn how to install all the necessary tools to write, test, and debug Solidity contracts on Ethereum. Then, you will explore the layout of a Solidity source file and work with the different data types. The next set of recipes will help you work with operators, control structures, and data structures while building your smart contracts. We take you through function calls, return types, function modifers, and recipes in object-oriented programming with Solidity. Learn all you can on event logging and exception handling, as well as testing and debugging smart contracts.By the end of this book, you will be able to write, deploy, and test smart contracts in Ethereum. This book will bring forth the essence of writing contracts using Solidity and also help you develop Solidity skills in no time.

693
Ładowanie...
EBOOK

Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more

Dinesh Rajput

Design patterns help speed up the development process by offering well tested and proven solutions to common problems. These patterns coupled with the Spring framework offer tremendous improvements in the development process.The book begins with an overview of Spring Framework 5.0 and design patterns. You will understand the Dependency Injection pattern, which is the main principle behind the decoupling process that Spring performs, thus making it easier to manage your code. You will learn how GoF patterns can be used in Application Design. You will then learn to use Proxy patterns in Aspect Oriented Programming and remoting. Moving on, you will understand the JDBC template patterns and their use in abstracting database access. Then, you will be introduced to MVC patterns to build Reactive web applications. Finally, you will move on to more advanced topics such as Reactive streams and Concurrency.At the end of this book, you will be well equipped to develop efficient enterprise applications using Spring 5 with common design patterns