Видавець: K-i-s-publishing
Ryan Soper, Nestor N Torres, Ahmed Almoailu
Maintaining your cybersecurity posture in the ever-changing, fast-paced security landscape requires constant attention and advancements. This book will help you safeguard your organization using the free and open source OWASP Zed Attack Proxy (ZAP) tool, which allows you to test for vulnerabilities and exploits with the same functionality as a licensed tool. Zed Attack Proxy Cookbook contains a vast array of practical recipes to help you set up, configure, and use ZAP to protect your vital systems from various adversaries. If you're interested in cybersecurity or working as a cybersecurity professional, this book will help you master ZAP.You’ll start with an overview of ZAP and understand how to set up a basic lab environment for hands-on activities over the course of the book. As you progress, you'll go through a myriad of step-by-step recipes detailing various types of exploits and vulnerabilities in web applications, along with advanced techniques such as Java deserialization.By the end of this ZAP book, you’ll be able to install and deploy ZAP, conduct basic to advanced web application penetration attacks, use the tool for API testing, deploy an integrated BOAST server, and build ZAP into a continuous integration and continuous delivery (CI/CD) pipeline.
Josephus Callaars
Zend Framework 2 is the latest creation of World Wide Web infrastructure company Zend Technologies Ltd. This new PHP framework comes with tons of features and an attractive way of creating applications. Not only is the overall usability of the technology much better, but it also makes your applications more testable, something that is often overlooked.Zend Framework 2 Cookbook will show you how applications are set up in Zend Framework 2 and how you can develop successfully in this massive framework. You will master features like Modules, Views, Controllers, and Authentication. The book also discusses the Event Manager, unit testing, and how to optimize your application.The book begins with a discussion about setting up Zend Framework 2, and you will also look at how the framework itself works. By the end of this book, you will be able to create entire secure applications on your own and make sure they are tested and optimized for performance as well.You will learn about sending and receiving e-mails, translation and localization of the application, and how to set up the framework on a Linux web server. You will also learn how to display data from the application to the user by using different display strategies and renderings. The creation of modules will also be discussed. Then, you will move on to look at how to authenticate users and make sure the developer knows how to pick the best method available. Unit testing, debugging, and enhancing the performance will also be covered in this book.Zend Framework 2 Cookbook is a perfect book for anyone who wants to start developing with Zend Framework 2.
Michael Badger
For system administrators, network engineers, and security analysts, it is essential to keep a track of network traffic.Zenoss Core is an enterprise-level systems and network monitoring solution that can be as complex as you need it to be. And while just about anyone can install it, turn it on, and monitor something, Zenoss Core has a complicated interface packed with features. The interface has been drastically improved over version 2, but it's still not the type of software you can use intuitively – in other words, a bit of guidance is in order.The role of this book is to serve as your Zenoss Core tour guide and save you hours, days, maybe weeks of time.This book will show you how to work with Zenoss and effectively adapt Zenoss for System and Network monitoring. Starting with the Zenoss basics, it requires no existing knowledge of systems management, and whether or not you can recite MIB trees and OIDs from memory is irrelevant. Advanced users will be able to identify ways in which they can customize the system to do more, while less advanced users will appreciate the ease of use Zenoss provides. The book contains step-by-step examples to demonstrate Zenoss Core's capabilities. The best approach to using this book is to sit down with Zenoss and apply the examples found in these pages to your system.The book covers the monitoring basics: adding devices, monitoring for availability and performance, processing events, and reviewing reports. It also dives into more advanced customizations, such as custom device reports, external event handling (for example, syslog server, zensendevent, and Windows Event Logs), custom monitoring templates using SNMP data sources, along with Nagios, and Cacti plugins. An example of a Nagios-style plugin is included and the book shows you where to get an example of a Cacti-compatible plugin for use as a command data source in monitoring templates. In Zenoss Core, ZenPacks are modules that add monitoring functionality. Using the Nagios plugin example, you will learn how to create, package, and distribute a ZenPack. You also learn how to explore Zenoss Core's data model using zendmd so that you can more effectively write event transformations and custom device reports.
Bogdan Vaida
In today's fast-paced digital age, cryptocurrencies have emerged as a revolutionary financial asset class, capturing the attention of investors and traders worldwide. However, navigating the world of cryptocurrency trading can be overwhelming for beginners. Zero to Hero in Cryptocurrency Trading acts as a guiding light to navigate this complex realm.This comprehensive guide to cryptocurrency trading empowers you to go from a novice trader to a proficient investor by helping you implement your own trading strategy. As you progress, you’ll gain structured trading knowledge through hands-on examples and real-time scenarios, bolstered by trading psychology and money management techniques. You’ll be able to automate your manual trades with an algorithm that works even while you sleep. You’ll also benefit from interactive teaching methods, including screenshots, charts, and drawings to help decode market operations and craft your unique edge in the dynamic crypto world. As an added bonus, you’ll receive ready-to-use templates to identify useful indicators, test your strategy, and even maintain a trading journal.By the end of this book, you’ll be well-equipped to trade cryptocurrencies and automate manual trading to give you an edge in the markets.
Mark Simos, Nikhil Kumar, Ann Johnson
Zero Trust is cybersecurity for the digital era and cloud computing, protecting business assets anywhere on any network. By going beyond traditional network perimeter approaches to security, Zero Trust helps you keep up with ever-evolving threats.The playbook series provides simple, clear, and actionable guidance that fully answers your questions on Zero Trust using current threats, real-world implementation experiences, and open global standards.The Zero Trust playbook series guides you with specific role-by-role actionable information for planning, executing, and operating Zero Trust from the boardroom to technical reality.This first book in the series helps you understand what Zero Trust is, why it’s important for you, and what success looks like. You’ll learn about the driving forces behind Zero Trust – security threats, digital and cloud transformations, business disruptions, business resilience, agility, and adaptability. The six-stage playbook process and real-world examples will guide you through cultural, technical, and other critical elements for success.By the end of this book, you’ll have understood how to start and run your Zero Trust journey with clarity and confidence using this one-of-a-kind series that answers the why, what, and how of Zero Trust!
William Kennedy
Odosobniony obóz Armii USA Fort Marion w Północnej Karolinie z pozoru niczym nie różni się od innych tego typu obiektów. Jest jednak pewna różnica: szkolą się tu Zielone Berety, członkowie najbardziej elitarnej jednostki Sił Specjalnych. Właśnie w Fort Marion kolejne roczniki komandosów poddawane są morderczemu szkoleniu, podczas którego uczą się między innymi jak bezgłośnie zabijać, bezlitośnie przesłuchiwać jeńców lub... otruć ludność całego miasta. Nagle, ku przerażeniu dowództwa jednostki, okazuje się, że najwyraźniej jeden z Zielonych Beretów zaczyna wykorzystywać świeżo nabyte umiejętności przeciwko swoim przełożonym...
Tadeusz Woźniak
W małym domku pod lasem mieszkała z mamą mała dziewczynka, którą wszyscy nazywali Zielonym Kapturkiem. Pewnego razu mama Zielonego Kapturka poprosiła ją, aby odwiedziła swojego dziadka, który mieszkał po drugiej stronie lasu, a od wczoraj był poza zasięgiem operatora sieci komórkowej… Zielony Kapturek to pierwsza książeczka z serii BAŚNIE ODWRÓCONE, w której autor prezentuje współczesne podejście do klasycznych utworów tego gatunku literackiego. Bajka ta, inspirowana oczywiście Czerwonym Kapturkiem Charles’a Perraulta z XVII wieku, prezentuje nowe, z gruntu ekologiczne podejście do świata przyrody, małych dziewczynek i… myśliwych.
Ravi Devarasetty
Many organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications.You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise.By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution.