John Wiley & Sons, Inc., 2020. — 464 p. — ISBN: 978-1-119-56026-5. Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing...
Basta Alfred, Basta Nadine, Anwar Waqar, Essar Mohammad I. — Wiley, 2025. — 480 p. — ISBN-13: 978-1394201600. A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of...
O’Reilly Media, 2017. — 300 p. Machine learning has become a hot topic in computer security in the past couple of years as a technique that can counter advances in attacker competency. This book will provide security and software practitioners with a practical guide to approaching modern security with machine learning. If you have a surface-level understanding of machine...
O’Reilly Media, 2018. — 386 p. — ISBN: 978-1-491-97990-7. Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, you’ll explore ways to apply machine...
Packt Publishing, 2021. — 236 p. — ISBN 978-1-80056-798-6. Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users Key Features Get up to speed with Zscaler without the need for expensive training Implement Zscaler Internet Access (ZIA) and...
Mercury Learning and Information, 2022. — 350 p. — ISBN-13: 978-1683926634. Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases . Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader realm...
Apress Media LLC, 2025. — 224 p. — ISBN-13: 979-8-8688-1303-0. Remote development has drastically changed the way teams build software. The freedom to work from wherever and possibly whenever has increased flexibility, but these benefits have not come without growing pains. The people managing this new type of team have worked tirelessly to adapt existing practices to this new,...
Packt Publishing Ltd., July 2020. — 572 p. — ISBN: 978-1-83921-641-1. Enhance Windows security and protect your systems and servers from various cyber attacks Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide to help you gain expertise when implementing...
John Wiley & Sons, Inc., 2024. — 368 р. — ISBN-13: 978-1394253135. Discover the power of open source observability for your enterprise environment In Mastering Observability and OpenTelemetry: Enhancing Application and Infrastructure Performance and Avoiding Outages, accomplished engineering leader and open source contributor Steve Flanders unlocks the secrets of enterprise...
Jones & Bartlett Learning, 2023. — 658 р. — ISBN 978-1284261158. Secure Software Systems presents an approach to secure software systems design and development that tightly integrates security and systems design and development (or software engineering) together. It addresses the software development process from the perspective of a security practitioner. The text focuses on...
Packt Publishing, 2018. — 346 p. Master Shellcode to leverage the buffer overflow concept Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with Shellcode, assembly, and Metasploit. This book will teach you...
O’Reilly Media, Inc., 2023. — 340 р. — ISBN-13: 978-1-098-12946-0. Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern...
CRC Press, 2025. — 200 p. — ISBN-13: 978-1-003-60467-9. This book helps to reduce the risk of data loss by monitoring and controlling the flow of sensitive data via network, email, or web. Guardians of Data also shows guidance about data protection that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable legal or regulatory...
John Wiley & Sons, Inc., 2015. — 309 p. — ISBN: 978-1-118-89667-9 (ebk). Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology...
Packt Publishing, 2021. — 272 p. — ISBN 978-1800566354. Advance your career as an information security professional by turning theory into robust solutions to secure your organization Key Features Convert the theory of your security certifications into actionable changes to secure your organization Discover how to structure policies and procedures in order to operationalize...
BPB Publications, 2023. — 285 р. — ISBN 978-93-5551-362-5. Crack a ransomware by identifying and exploiting weaknesses in its design. Key Features: - Get an overview of the current security mechanisms available to prevent ransomware digital extortion. - Explore different techniques to analyze a ransomware attack. - Understand how cryptographic libraries are misused by malware...
5th Edition. — Apress Media, LLC., 2023. — 620 p. — ISBN-13: 978-1-4842-9036-1. Пошаговое руководство по компьютерной безопасности и конфиденциальности для неспециалистов Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers...
O’Reilly Media, Inc., 2021. — 370 p. — ISBN 978-1492094050. Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including...
Apress Media LLC., 2020. — 180 p. — ISBN13: 978-1-4842-6402-7. Use this comprehensive guide to learn the practical aspects of Burp Suite―from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely...
Leanpub, 2020-05-13. — 65 р. Book walks through a number of real world examples for reverse engineering data structures and algorithms found in malware. Walk through a number of real world examples for reverse engineering data structures and algorithms found in malware in order to gradually introduce the reader to more advanced examples culminating in reverse engineering a C2...
2nd Edition. — Packt Publishing, 2020. — 216 p. — ISBN: 978-1-83898-266-9. A comprehensive guide that will help you get started with the latest Metasploit 5.0 framework for exploiting real-world vulnerabilities Metasploit 5.x for Beginners, Second edition will help readers absorb the essential concepts of using the Metasploit framework for comprehensive penetration testing....
O’Reilly Media, Inc., 2024. — 402 р. — ISBN-13: 978-1-098-16947-3. By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of...
Packt Publishing, 2020. — 532 p. — ISBN: 978-1-78995-352-7. Identify, exploit, and test web application security with ease Metasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you’ll explore another aspect of the framework – web...
No Starch Press, 2022. — 781 p. — ISBN-13: 978-1-59327-875-5 (ebook). The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in...
Amazon.com Services LLC, 2020. — 193 p. — ISBN: 979-8614981143. This book will help you in Learning the Basics of Penetration Testing. It will cover the main features of Penetration Testing and will help you better understand the flaws in a network system and how to resolve them. It has been designed in such a way that it does not require any prior experience of testing or...
Packt Publishing, 2018. — 436 p. — ISBN: 178883884X. Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. Key Features Analyze and improvise software and hardware with real-world examples Learn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and...
Apress Media LLC., 2020. — 960 p. — ISBN13: (electronic): 978-1-4842-6106-4. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today’s antivirus scanning technology, it...
Packt Publishing, 2021. — 242 p. — ISBN 978-1-80107-974-7. Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniques Key Features Gain a clear understanding of the security landscape and research approaches to bypass antivirus software Become well-versed with practical techniques to bypass antivirus solutions Discover best practices to...
Комментарии