Leanpub, 2025. — 609 р. "Exploitology: Web Apps Exploits" explores web app security, focusing on vulnerabilities, exploitation methods, and advanced strategies. With practical examples and real-world scenarios, this book helps readers understand, exploit, and defend against web app threats. Whether you're new to security or an experienced pro, it sharpens your penetration...
Apress Media LLC, 2025. — 648 p. — ISBN-13: 979-8-8688-1032-9. Gain a comprehensive understanding of digital reliability to ensure consistent, dependable user experiences that foster trust in technology. Part of author Saurav Bhattacharya’s trilogy that covers the essential pillars of digital ecosystems―security, reliability, and usability―this book tackles the challenges of...
John Wiley & Sons, , 2024. — 672 p. — ISBN 978-1394176809. Protect your system or web application with this accessible guide Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application,...
Palgrave Macmillan, 2024. — 363 p. — ISBN-13: 978-3-031-66196-9. Changes in the global environment, the complexity of decision-making, and the new role of social media have challenged the operating models and practices of traditional crisis preparedness and security of supply. In a knowledge society context, securing the continuous flow of information and communication on...
HiTeX Press, 2024. — 306 p. — ASIN: B0DHWS2C8B. "Network Security Guidebook: Protocols and Techniques" is an essential resource for anyone looking to gain a comprehensive understanding of network security principles and practices. This book delves into the core elements that protect digital infrastructure from the myriad of threats present in today's interconnected world. By...
John Wiley & Sons, Inc., 2024. — 221 р. — ISBN-13: 978-1394275885. A comprehensive and practical framework for ethical practices in contemporary cybersecurity. While some professions – including medicine, law, and engineering – have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard....
Springer, 2024. — 164 p. — (Digital Privacy and Security). — ISBN 978-981-97-5751-0. Безопасность и конфиденциальность в Web 3.0 Web 3.0 is the next generation of the Internet built on decentralized technologies such as blockchain and cryptography. It is designed to address issues encountered in the previous generation of the Internet such as imbalanced distribution of...
GitforGits, 2024. — 178 p. — ISBN-13: 978-8197416538. To help cybersecurity, networking, and information technology professionals learn Snort 3 fast, we've created the Snort 3 QuickStart Pro. This book offers practical insights into deploying and managing Snort in a variety of network environments, enabling you to effectively use Snort's powerful intrusion detection and...
Springer, 2024. — 443 p. — (Advances in Information Security 107 ). — ISBN 978-3-031-53509-3. Сетевая безопасность на базе искусственного интеллекта Information assurance in network science must provide authentic, accurate, secure, reliable, and timely information to warfighters to achieve information dominance, regardless of threat conditions. Computing and information...
Apress, 2024. — 790 p. The modern digital landscape presents many threats and opportunities, necessitating a robust understanding of cybersecurity. This book offers readers a broad-spectrum view of cybersecurity, providing insights from fundamental concepts to advanced technologies. Beginning with the foundational understanding of the ever-evolving threat landscape, the book...
Orange Education Pvt Ltd, 2024. — 195 p. Master one of the most essential tools a professional pen tester needs to know. Book Description This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose...
М.: Издательские решения, 2024 Эта книга – свод правил по безопасной работе в современном информационном мире. Мы и не заметили, как устройства в нашем доме стали играть ключевую роль в жизни каждого человека. Компьютеры, смартфоны, а так же другая техника, таит в себе много возможностей. Ими в полной мере могут воспользоваться хакеры, а не только законный владелец. По этой...
4th edition. — Burlington: Jones & Bartlett Learning, 2024. — 390 p. — ISBN 1284281957. Revised and updated to keep pace with this ever-changing field, Security Strategies in Windows Platforms and Applications, Fourth Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system, placing a particular emphasis on Windows 11,...
6th Edition. — Springer, 2024. — 654 p. — (Texts in Computer Science). — ISBN 978-3-031-47548-1. In the context of growing human dependence on a digital ecosystem, this book stresses the importance of security awareness—whether in homes, businesses, or public spaces. It also embraces the new and more agile and artificial-intelligence-boosted computing systems models, online...
IGI Global, 2023. — 360 p. The objective is to publish both disciplinary, multidisciplinary and interdisciplinary works on questions related to experiences and phenomena that can or could be covered by concepts regarding the protection of privacy of web services users. Another major objective of this book is to highlight the importance of web search privacy to the readers and...
4th Edition. — Pearson Education, 2024. — 640 p. — (Early Access) All you need to know about defending networks, in one book. Clearly explains concepts, terminology, challenges, tools, and skills Covers key security standards and models for business and government The perfect introduction for all network/computer security professionals and students Welcome to today’s most...
Spribger, 2023. — 725 p. – ISBN 978-981991124-0. Интегрированная сетевая безопасность космос-воздух-земля This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated...
Independently published, 2023. — 179 p. Burp Suite is an integrated platform/graphical tool for performing security testing of web applications. Burp suite is a Java application that can be used to secure or crack web applications. The suite consists of different tools, like a proxy server, a web spider an intruder and a so-called repeater, with which requests can be automated....
Leanpub, 2023. — 71 p. This book is a follow-up on Liran Tal's Essential Node.js Security for Express web applications and teaches you hands-on practical use of HTTP security headers as browser security controls to help secure web applications. 18 Lessons, 8 Quizzes, 30 Code Snippets, and 19 Illustrations to help you learn. If you have a development environment set with...
3rd Edition. — Jones & Bartlett Learning, 2022. — 500Ю Стратегии безопасности в платформах и приложениях Linux Security Strategies in Linux Platforms and Applications, Third Edition covers major aspects of security on a Linux system. The first part of this book describes the risks, threats, and vulnerabilities associated with Linux as an operating system. Linux is a common...
2nd Edition. — Packt, 2022. — 636 p. — ISBN 1803241411, 9781803241418. Deploy and manage industry-leading PAN-OS 10.x solutions to secure your users and infrastructure Key Features Understand how to optimally use PAN-OS features Build firewall solutions to safeguard local, cloud, and mobile networks Protect your infrastructure and users by implementing robust threat prevention...
No Starch Press, 2022. — 430 p. — ISBN-13: 978-1-7185-0099-0. Social engineering is the art of capitalizing on human psychology rather than technical vulnerabilities to compromise systems. It’s an effective method of attack because even the most advanced security detection teams can do little to defend against an employee clicking a malicious link or opening a file in an email...
Packt, 2021. — 528 p. — ISBN 1800208162, 9781800208162. An immersive learning experience enhanced with technical, hands-on labs to understand the concepts, methods, tools, platforms, and systems required to master the art of cybersecurity Key Features Get hold of the best defensive security strategies and tools Develop a defensive security strategy at an enterprise level Get...
Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk, Brij B. Gupta. — Springer, 2022. — 283 p. — ISBN 978-3-030-85427-0. This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in...
No Starch Press, 2021. — 418 p. — ISBN 978-1-7185-0154-6. Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You’ll also learn how to navigate bug bounty programs set up by companies to reward security professionals for finding bugs in their web...
Independently published, 2021. — 326 p. — ASIN B09CBNT5FJ. Version 2.0 This book is a comprehensive guide to performing network penetration testing (a.k.a., ethical hacking) according to international standards such as, the Penetration Testing Execution Standard (PTES). The book is highly technical with practical demonstration and tutorials on using different open-source tools....
Springer, 2021. — 252 p. — ISBN 978-3-030-76612-2. This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT). More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be...
Packt Publishing, 2021. — 336 p. — ISBN 978-1-80107-744-6. Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an...
Bobbert Y., Chtepen M., Kumar T., Vanderbeken Y., Verslegers D. - IGI Global, 2021. — 394 p. — (Advances in Information Security, Privacy, and Ethics). — ISBN 978-1799873679. Nowadays it is impossible to imagine a business without technology as most industries are becoming "smarter" and more tech-driven, ranging from small individual tech initiatives to complete business models...
Springer, 2021. — 123 p. — (Services and Business Process Reengineering). — ISBN 978-981-16-1204-6. This book covers selected topics and methods for peripheral security, which are gaining attention nowadays. The book discusses the security arrangement and methods for monitoring the inside/outside entry of peripheral areas that need to be secured. It relates to a periphery,...
IGI Global, 2021. — 319 p. — ISBN 9781799875895. The security of an organizational information system with the invention of next-generation technologies is a prime focus these days. The industries and institutions in the field of computing and communication, especially in internet of things, cloud computing, mobile networks, next-generation networks, the energy market, banking...
Rheinwerk Publishing, 2018. — 574 p. — (SAP PRESS). — ISBN 978-1-4932-1481-5. If you're a Basis administrator looking to keep your SAP system under lock and key, this is the book for you! Discover information on security-relevant issues, from identity and access management to network and backend security. Get the technical know-how to identify vulnerabilities, defend your...
McGraw-Hill Education, 2021. — 208 p. — ISBN 978-1260460353. A hands-on guide and mathematical approach to tackling security challenges and overall performance issues in 5G-based IoT communications The Internet of Things (IoT) provides connectivity and data exchange anytime and anywhere among a wide variety of physical objects such as sensors, vehicles, and mobile phones. This...
3rd edition. — Jones & Bartlett Learning, 2021. — 374 p. — ISBN 9781284175622. Revised and updated to keep pace with this ever changing field, Security Strategies in Windows Platforms and Applications, Third Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system, placing a particular emphasis on Windows 10, and Windows...
3rd Edition. — John Wiley &Sons, Inc., 2020. — 1235 p. — ISBN:978-1-119-64278-7. Now that there’s software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates...
Wiley, 2021. — 175 p. — ISBN 1119676843, 9781119676843. Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk? In...
O’Reilly Media, Inc., 2020. — 240 p. — ISBN: 978-1-492-05655-3. Threat modeling is one of the most essential–and most misunderstood–parts of the development lifecycle. Whether you’re a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply core threat modeling concepts to your practice to protect your...
Springer, 2020. — 152 p. — ISBN: 978-981-15-6575-5 (eBook). This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in...
John Wiley & Sons, Inc., 2021. — 576 p. — ISBN: 978-1-119-67234-0 (ebk). Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor...
3rd Edition. — Jones & Bartlett Learning, 2020. — 400 p. — ISBN: 978-1284183658. PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIESFully revised and updated with the latest data from the field, Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business challenges and threats that are...
O’Reilly Media, Inc., 2020. — ISBN: 978-1-492-05648-5. (Early Release). Threat modeling is one of the most essential—and most misunderstood—parts of the development lifecycle. Whether you’re a security practitioner or application developer, this book will help you gain a better understanding of core concepts and how to apply them to your practice to protect your systems from...
Arthur S Sapp, 2020. — 181 p. The book mainly covers what it means to be an ethical hacker and how to do it correctly to find effective countermeasures and close any back doors that your system might have to keep out malicious hackers. This book helps you understand the following: The results of several important and impactful case studies made by different experts in the field...
No Starch Press, Inc., 2020. — 216 p. — ISBN13: 978-1-5932-7995-0. Website security made easy. This book covers the most common ways websites get hacked and how web developers can defend themselves. The world has changed. Today, every time you make a site live, you’re opening it up to attack. A first-time developer can easily be discouraged by the difficulties involved with...
McGraw-Hill Education, 2020. — 320 p. — ISBN: 978-1-26-045832-9. Manage your own robust, inexpensive cybersecurity testing environment This hands-on guide shows clearly how to administer an effective cybersecurity testing lab using affordable technologies and cloud resources. Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based...
Packt Publishing, 2018. — 488 p. — ISBN: 978-1-78899-523-8. Your one-stop guide to learning and implementing Red Team tactics effectively Red Teaming is used to enhance security by performing simulated attacks on an organization in order to detect network and system vulnerabilities. Hands-On Red Team Tactics starts with an overview of pentesting and Red Teaming, before giving...
Pearson, 2018. — 512 p. — ISBN: 978-0134817125, 0134817125. 11th Edition. Prepare for the modern workplace with networking and security essentials With a clear writing style and a focus on contemporary technologies, Business Data Networks and Security guides readers through the details of networking, while effectively training them for the demands of the modern workplace....
Cham: Springer International Publishing, 2019. — 183 p. — ISBN: 978-3-030-01150-5. This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy...
Cham : Springer International Publishing, 2018. — 384 p. — ISBN: 978-3-319-92624-7. This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel...
Packt, 2018. — 458 p. — ISBN10: 178883268X, 13 978-1788832687. Securing connected industries and autonomous systems is a top concern for the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security is an intricate discipline that directly ties to system reliability as well as human and environmental safety. Practical Industrial Internet of...
Packt Publishing, 2018. — 566 p. Improve information security by learning Social Engineering. This book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. Learn Social Engineering starts by giving you a grounding in the...
2018. — 289 p. Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the...
Packt Publishing, 2018. — 316 p. Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation. Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber...
Packt Publishing, 2017. - 330p. - ASIN: B0753DZ2HM Implement information security effectively as per your organization's needs. Key Features Learn to build your own information security framework, the best fit for your organization Build on the concepts of threat modeling, incidence response, and security analysis Practical use cases and best practices for information security...
Springer, 2016. — 272 p. — (Advances in Information Security). — ISBN: 3319467670. This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs...
CRC Press, 2017. — 614 p. — ISBN: 978-750-8400. Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...
CreateSpace Independent Publishing Platform, 2017. — 156 p. — (ISBN: 978-1548121914). This Book is produced with the goal of providing information that is as accurate and reliable as possible. If you are thinking of becoming an Ethical Hacker, also known as Penetration tester, the concepts explained in this book will provide an excellent learning opportunity that you can use in...
Amazon Digital Services LLC, 2017. — 120 p. — ISBN10: 154133518X. This book will teach you how you can protect yourself from most common hacking attacks by knowing how hacking actually works! After all, in order to prevent your system from being compromised, you need to stay a step ahead of any criminal hacker. You can do that by learning how to hack and how to do a...
Packt Publishing, 2017. — 350 p. — ISBN: 978-1-78646-627-3. Master the art of detecting and averting advanced network security attacks and techniques Computer networks are increasing at an exponential rate and the most challenging factor organisations are currently facing is network security. Breaching a network is not considered an ingenious effort anymore, so it is very...
Omega Brdarevic at Smashwords, 2016. — 561 p. — ASIN B01MTKQGQ9. This book opens the door to the wonderful world of security mechanisms, showing you how protection is created, and then bypassed. This book opens the door to the wonderful world of security mechanisms, showing you how protection is created, and then bypassed. It is addressed to anyone who likes captivating...
CreateSpace Independent Publishing Platform, 2014. — 294 p. — ISBN: 1494932636. Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC,...
Amazon Digital Services LLC, 2015. —16 p. — ASIN: B0192TB5Y4 Best Book for becoming a Hacker! (Even You Can Hack!) Inside... Reasons why you should learn how to hack Facebook Phishing Session Hacking Keylogging Stealer’s Sidejacking Mobile Phone Hacking Botnets DNS Spoofing USB Hacking Software for Facebook Hacking
Packt Publishing, 2013. — 116 p. — ISBN: 978-1-78216-682-5. На англ. языке. An intuitive guide to learning OpenAM access management capabilities for web and application servers. OpenAM is a web-based open source application that provides authentication, authorization, entitlement and federation services. OpenAM provides core identity services to simplify the implementation of...
СПб.: Питер, 2003. — 368 p. — ISBN: 5-318-00193-9
В этой книге Брюс Шнайер — автор нескольких бестселлеров и признанный специалист в области безопасности и защиты информации, — опираясь на собственный опыт, разрушает заблуждения многих, уверенных в конфиденциальности и неприкосновенности информации. Он разъясняет читателям, почему так сложно предотвратить доступ третьих лиц к...
Комментарии