Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali LinuxKey FeaturesEfficiently perform penetration testing techniques on your public cloud instancesLearn not only to cover loopholes but also to automate security monitoring and alerting within your cloud-based deployment pipelinesA step-by-step guide that will help you leverage the most widely used security platform to secure your AWS Cloud environmentBook DescriptionThe cloud is taking over the IT industry.
Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurityKey FeaturesUnderstand the concept of Dark Net and Deep WebUse Tor to extract data and maintain anonymityDevelop a security framework using Deep web evidences Book DescriptionThe overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web.
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of EthereumKey FeaturesBuild end-to-end decentralized Ethereum apps using Truffle, Web3, and SolidityExplore various solution-based recipes to build smart contracts and foolproof decentralized applicationsDevelop decentralized marketplaces from scratch, build wallets, and manage transactionsBook DescriptionEthereum and Blockchain will change the way software is built for business transactions.
A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifactsKey FeaturesGet up and running with modern mobile forensic strategies and techniquesAnalyze the most popular Android applications using free and open source forensic toolsLearn malware detection and analysis techniques to investigate mobile cybersecurity incidentsBook DescriptionMany forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of these jobs perfectly.
Integrate an end-to-end logistic chain using IBM Blockchain and IoT platformsKey FeaturesExplore practical implementation of ledger technology in the IoT architectureStudy security best practices for your smart devicesUnderstand Blockchain implementation for end-to-end IoT solutionsBook DescriptionBlockchain has been the hot topic of late thanks to cryptocurrencies.
Explore the differences between ICOs, cryptocurrencies, and tokens (offerings), enabling the reader to understand the ICO landscape, how millions were raised in minutes, and where the future of the tokenized economy is heading.
Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environmentsKey FeaturesUnderstand how to identify and manage business drivers during transitionsExplore Microsoft Identity and Access Management as a Service (IDaaS) solutionOver 40 playbooks to support your learning process with practical guidelinesBook DescriptionMicrosoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management.
Become a master at penetration testing using machine learning with PythonKey Features Identify ambiguities and breach intelligent security systems Perform unique cyber attacks to breach robust systems Learn to leverage machine learning algorithmsBook DescriptionCyber security is crucial for both businesses and individuals.
Get into the world of smart data security using machine learning algorithms and Python librariesKey FeaturesLearn machine learning algorithms and cybersecurity fundamentalsAutomate your daily workflow by applying use cases to many facets of securityImplement smart machine learning solutions to detect various cybersecurity problemsBook DescriptionCyber threats today are one of the costliest losses that an organization can face.
Secure your Java applications by integrating the Spring Security framework in your codeKey FeaturesProvide authentication, authorization and other security features for Java applications.
Master Python scripting to build a network and perform security operationsKey FeaturesLearn to handle cyber attacks with modern Python scriptingDiscover various Python libraries for building and securing your networkUnderstand Python packages and libraries to secure your network infrastructureBook DescriptionIt's becoming more and more apparent that security is a critical aspect of IT infrastructure.
Your one-stop guide to blockchain technology and its business applicationsKey FeaturesAssimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications Know in and out of blockchain technology to understand various business use casesUnderstand various common and not-so-common challenges faced in blockchain development Book DescriptionBlockchain for Business 2019 is a comprehensive guide that enables you to bring in various blockchain functionalities to extend your existing business models and make correct fully-informed decisions.
Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease Key FeaturesWrite your own chaincode/smart contracts using Golang on hyperledger networkBuild and deploy decentralized applications (DApps)Dive into real world blockchain challenges such as integration and scalabilityBook DescriptionBBlockchain and Hyperledger technologiesare hot topics today.
Learn what the Blockchain is, what the differences between available blockchain platforms are, how to work with Oracle's Blockchain Cloud Service, and how Blockchain can change the direction of your Oracle work and the focus of your customers.
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threatsKey FeaturesProtect your financial environment with cybersecurity practices and methodologiesIdentify vulnerabilities such as data manipulation and fraudulent transactionsProvide end-to-end protection within organizationsBook DescriptionOrganizations have always been a target of cybercrime.
Get hands-on experience on concepts of Bug Bounty HuntingKey FeaturesGet well-versed with the fundamentals of Bug Bounty HuntingHands-on experience on using different tools for bug huntingLearn to write a bug bounty report according to the different vulnerabilities and its analysisBook DescriptionBug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same.
Learn how to use AI and blockchain to build decentralized intelligent applications (DIApps) that overcome real-world challengesKey FeaturesUnderstand the fundamental concepts for converging artificial intelligence and blockchainApply your learnings to build apps using machine learning with Ethereum, IPFS, and MoiBitGet well-versed with the AI-blockchain ecosystem to develop your own DIAppsBook DescriptionAI and blockchain are two emerging technologies catalyzing the pace of enterprise innovation.
Plug the gaps in your network's infrastructure with resilient network security modelsKey FeaturesDevelop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement network enumeration with Nessus and Network Mapper (Nmap)Book DescriptionDigitization drives technology today, which is why it's so important for organizations to design security mechanisms for their network infrastructures.
Build a network security threat model with this comprehensive learning guideKey FeaturesDevelop a network security threat model for your organizationGain hands-on experience in working with network scanning and analyzing toolsLearn to secure your network infrastructureBook DescriptionThe tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures.
Implement decentralized blockchain applications to build scalable DappsKey FeaturesUnderstand the blockchain ecosystem and its terminologiesImplement smart contracts, wallets, and consensus protocolsDesign and develop decentralized applications using Bitcoin, Ethereum, and HyperledgerBook DescriptionThe Blockchain is a revolution promising a new world without middlemen.
Key FeaturesGain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tacticsLearn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategiesA practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your systemBook DescriptionThe book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations.
Learn what the Blockchain is, what the differences between available blockchain platforms are, how to work with Oracle's Blockchain Cloud Service, and how Blockchain can change the direction of your Oracle work and the focus of your customers.
Develop a deeper understanding of what's under the hood of blockchain with this technical reference guide on one of the most disruptive modern technologiesKey FeaturesUpdated with four new chapters on consensus algorithms, Ethereum 2.
Written by an acknowledged expert on the ISO/IEC 27001 Standard, ISO 27001:2022 - An Introduction to information security and the ISMS standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001:2022.
Written by an acknowledged expert on the ISO/IEC 27001 Standard, ISO 27001:2022 - An Introduction to information security and the ISMS standard is an ideal primer for anyone implementing an information security management system aligned to ISO 27001:2022.
This book is about cyber security, but it's also about so much more; it's about giving you the skills to think creatively about your role in the cyber security industry.
Digital Earth - Cyber threats, privacy and ethics in an age of paranoiaWhether it s the next big ransomware attack or cyber terrorism, digital threats have evolved drastically in recent years.
Digital Earth - Cyber threats, privacy and ethics in an age of paranoiaWhether it s the next big ransomware attack or cyber terrorism, digital threats have evolved drastically in recent years.
On May 4, 2020, Californians for Consumer Privacy (an advocacy group founded by Alistair MacTaggart) announced that it had collected more than 900,000 signatures to qualify the CPRA (California Privacy Rights Act) for the November 2020 ballot.
On May 4, 2020, Californians for Consumer Privacy (an advocacy group founded by Alistair MacTaggart) announced that it had collected more than 900,000 signatures to qualify the CPRA (California Privacy Rights Act) for the November 2020 ballot.
Understand your GDPR obligations and prioritise the steps you need to take to complyThe GDPR gives individuals significant rights over how their personal information is collected and processed, and places a range of obligations on organisations to be more accountable for data protection.
Understand your GDPR obligations and prioritise the steps you need to take to complyThe GDPR gives individuals significant rights over how their personal information is collected and processed, and places a range of obligations on organisations to be more accountable for data protection.
Cyber Security - Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks.
Cyber Security - Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks.