Acquire a holistic comprehension and practical expertise in embedding security within the DevOps pipeline, specifically tailored for Azure cloud environments Key Features Master integrating security into Azure DevOps workflows for cloud infrastructure Refine your skills with cutting-edge tools to build a secure CI/CD pipeline for both app and infrastructure Harden the entire DevOps workflow, from planning and coding to source control, CI, and cloud workload deployment Book DescriptionThe secu...
Red Team Operator's Handbook
by David Meece, Cybertech Dave and Dr. Willie Sanders, Jr.
Jumpstart your career in red team cybersecurity by mastering the art of planning, deploying, and mitigating modern cyber-attacks in a safe and controlled home lab environment. Key Features Master red team tools and techniques while developing an adversarial mindset Learn to simulate cyberattacks and test the security posture of your network and systems Acquire to elevate from red team hobbyist to professional by earning top credentials and using effective job search strategies Book Descripti...
How to protect yourself from adware and spyware
by Luis Paulo Soares
The book gives an overview on principles and applications of network security technologies against internet attack, computer virus and intrusion detection, and discusses security initiatives for wireless network, operation systems, network devices, removable devices and databases. With an application-oriented view, the book is an essential reference for graduate students in computer science and industrial engineers.
This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in impor...
Master the art of penetration testing with Metasploit Framework in 7 days About This Book • A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days • Carry out penetration testing in complex and highly-secured environments. • Learn techniques to Integrate Metasploit with industry's leading tools Who This Book Is For If you are a penetration tester, ethical hacker, or security consultant who quickly wants to master the Metasploit framework and carry out adv...
Venture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infrastructure Key Features Gain an overview of the fundamental principles of cybersecurity in critical infrastructure Explore real-world case studies that provide a more exciting learning experience, increasing retention Bridge the knowledge gap associated with IT/OT convergence through practical examples Purchase of the print or Kindle book includes a free PDF eBook Book Description- This book will...
Build your expertise in Windows incident analysis by mastering artifacts and techniques for efficient cybercrime investigation with this comprehensive guide Key Features Gain hands-on experience with reputable and reliable tools such as KAPE and FTK Imager Explore artifacts and techniques for successful cybercrime investigation in Microsoft Teams, email, and memory forensics Understand advanced browser forensics by investigating Chrome, Edge, Firefox, and IE intricacies Purchase of the print o...
Learn how people break websites and how you can, too. Real-World Bug Hunting is the premier field guide to finding software bugs. Whether you're a cyber-security beginner who wants to make the internet safer or a seasoned developer who wants to write secure code, ethical hacker Peter Yaworski will show you how it's done. You'll learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery. Using real-life case studies...
Get started with Microsoft Intune and explore its many facets, including task automation with Microsoft Graph Key Features Create and configure your new mobile device management (MDM) environment Become an Intune pro by mastering compliance policies, monitoring techniques, reporting practices, and application deployment procedures Learn how to manage Windows, Android, iOS, and macOS devices using Intune Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionMicrosoft I...
How to Hack Like a Ghost takes readers deep inside the mind of a hacker as they carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way. • Readers shadow a hacker as they describe, with detailed code, how they might hack a tech company and escape detection • While the account is fictional, the tech company's vulnerabilities are drawn from real-life weaknesses common in today's corporate, cloud-based systems • By following along an...
Hacking with Kali Linux (Penetration Testing Hacking Bible, #1)
by Alex Wagner
99 Things You Wish You Knew Before Your Mobile Device Was Hacked
by Robert Siciliano
In this book you'll learn everything you wanted to know about computer viruses, ranging from the simplest 44-byte virus right on up to viruses for 32-bit Windows, Unix and the Internet. You'll learn how anti-virus programs stalk viruses and what viruses do to evade these digital policemen, including stealth techniques and poly-morphism. Next, you'll take a fascinating trip to the frontiers of science and learn about genetic viruses. Will such viruses take over the world, or will they become the...
Field-tested best practices and considerations for securely migrating data, apps, and services into the cloud Organized with network architects and network operations managers in mind, Secure Cloud Deployment is geared towards those not yet in the cloud and/or only partially in who need a roadmap for planning and migrating securely into the cloud. The book also provides an essential spot-checking guide for those organizations already in the cloud but without airtight security. This practical gui...
People working in our cyber world have access to a wide range of information including sensitive personal or corporate information which increases the risk to it. One of the aspects of the protection of this data is to train the user to behave more securely. This means that every person who handles sensitive information, their own or that of other people, be aware of the risks that their use can pose as well as how to do their job in such a way as to reduce that risk. The approach we use for t...