The Age of Decentralization talks about various decentralization technologies including Web3, decentralized identity, and decentralized storage, and how they can be incorporated in traditional tech architectures to improve technical and business performance.
Identify, exploit, and test web application security with easeKey FeaturesGet up to speed with Metasploit and discover how to use it for pentestingUnderstand how to exploit and protect your web environment effectivelyLearn how an exploit works and what causes vulnerabilitiesBook DescriptionMetasploit has been a crucial security tool for many years.
A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldKey FeaturesLearn best practices to secure your data from the device to the cloudUse systems security engineering and privacy-by-design principles to design a secure IoT ecosystemA practical guide that will help you design and implement cyber security strategies for your organizationBook DescriptionWith the advent of the Internet of Things (IoT), businesses have to defend against new types of threat.
Master powerful strategies to acquire and analyze evidence from real-life scenariosAbout This BookA straightforward guide to address the roadblocks face when doing mobile forensicsSimplify mobile forensics using the right mix of methods, techniques, and toolsGet valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experienceWho This Book Is ForThis book is for forensic analysts and law enforcement and IT security officers who have to deal with digital evidence as part of their daily job.
Cyber Minds brings together an unrivalled panel of international experts who offer their insights into current cybersecurity issues in the military, business, and government.
An expert guide to implementing fast, secure, and scalable decentralized applications that work with thousands of users in real timeKey FeaturesImplement advanced features of the Ethereum network to build powerful decentralized applicationsBuild smart contracts on different domains using the programming techniques of Solidity and VyperExplore the architecture of Ethereum network to understand advanced use cases of blockchain development Book DescriptionEthereum is one of the commonly used platforms for building blockchain applications.
Privacy today is much debated as an individual's right against real or feared intrusions by the state, as exemplified by proposed identity cards and surveillance measures in the United Kingdom.
Privacy today is much debated as an individual's right against real or feared intrusions by the state, as exemplified by proposed identity cards and surveillance measures in the United Kingdom.
Develop a deeper understanding of what's under the hood of blockchain with this technical reference guide on one of the most disruptive modern technologiesKey FeaturesUpdated with four new chapters on consensus algorithms, Ethereum 2.
Enhance Windows security and protect your systems and servers from various cyber attacksKey FeaturesProtect your device using a zero-trust approach and advanced security techniquesImplement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutionsUnderstand how to create cyber-threat defense solutions effectivelyBook DescriptionAre you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users?
Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacksKey FeaturesUnderstand SQL injection and its effects on websites and other systemsGet hands-on with SQL injection using both manual and automated toolsExplore practical tips for various attack and defense strategies relating to SQL injectionBook DescriptionSQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet.
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "e;zero trust networks"e;, and distributed computing.
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "e;zero trust networks"e;, and distributed computing.
Get up to speed with planning, deploying, and managing Microsoft Office 365 services and gain the skills you need to pass the MS-101 examKey FeaturesExplore everything from mobile device management and compliance,through to data governance and auditingGet to grips with using Azure advanced threat protection and Azure information protectionLearn effectively through exam-focused practice exercises and mock testsBook DescriptionExam MS-101: Microsoft 365 Mobility and Security is a part of the Microsoft 365 Certified: Enterprise Administrator Expert certification path designed to help users validate their skills in evaluating, planning, migrating, deploying, and managing Microsoft 365 services.
Get up to speed with expert tips and techniques to help you prepare effectively for the MS-500 ExamKey FeaturesGet the right guidance and discover techniques to improve the effectiveness of your studying and prepare for the examExplore a wide variety of strategies for security and complianceGain knowledge that can be applied in real-world situationsBook DescriptionThe Microsoft 365 Security Administration (MS-500) exam is designed to measure your ability to perform technical tasks such as managing, implementing, and monitoring security and compliance solutions for Microsoft 365 environments.
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurityKey FeaturesCovers the latest security threats and defense strategies for 2020Introduces techniques and skillsets required to conduct threat hunting and deal with a system breachProvides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much moreBook DescriptionCybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.
A practical blockchain handbook designed to take you through implementing and re-engineering banking and financial solutions and workflows using eight step-by-step projectsKey FeaturesImplement various end-to-end blockchain projects and learn to enhance present-day financial solutionsUse Ethereum, Hyperledger, and Stellar to build public and private decentralized applicationsAddress complex challenges faced in the BFSI domain using different blockchain platform servicesBook DescriptionBlockchain technology will continue to play an integral role in the banking and finance sector in the coming years.
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey FeaturesPerform evidence acquisition, preservation, and analysis using a variety of Kali Linux toolsUse PcapXray to perform timeline analysis of malware and network activityImplement the concept of cryptographic hashing and imaging using Kali LinuxBook DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics.
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniquesKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyPerform malware analysis for effective incident responseExplore real-life scenarios that effectively use threat intelligence and modeling techniquesBook DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks.
Get to grips with essential concepts and step-by-step explanations to apply TDD practices to your Python projects while keeping your test suite under controlKey FeaturesBuild robust Python applications using TDD and BDD methodologiesTest Python web applications using WebTest and web frameworksLeverage PyTest to implement stringent testing mechanisms to ensure fault-tolerant applicationsBook DescriptionTest-driven development (TDD) is a set of best practices that helps developers to build more scalable software and is used to increase the robustness of software by using automatic tests.
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat hunting process and understand the environmentPerform advanced hunting using MITRE ATT&CK Evals emulations and Mordor datasetsBook DescriptionThreat hunting (TH) provides cybersecurity analysts and enterprises with the opportunity to proactively defend themselves by getting ahead of threats before they can cause major damage to their business.
Develop your cybersecurity knowledge to obtain CCNA Cyber Ops certification and gain professional skills to identify and remove potential threatsKey FeaturesExplore different security analysis tools and develop your knowledge to confidently pass the 210-255 SECOPS examGrasp real-world cybersecurity skills such as threat analysis, event correlation, and identifying malicious activityLearn through mock tests, useful tips, and up-to-date exam questionsBook DescriptionCybersecurity roles have grown exponentially in the IT industry and an increasing number of organizations have set up security operations centers (SOCs) to monitor and respond to security threats.
Understand how blockchain works and explore a variety of strategies to implement it in your organization effectivelyKey FeaturesBecome familiar with business challenges faced by companies when using blockchainDiscover how companies implement blockchain to monetize and secure their dataStudy real-world examples to understand blockchain and its use in organizationsBook DescriptionIn addition to cryptocurrencies, blockchain-based apps are being developed in different industries such as banking, supply chain, and healthcare to achieve digital transformation and enhance user experience.
A complete guide to understanding, developing, and testing popular security-token smart contractsKey FeaturesUnderstand key Blockchain and Ethereum platforms conceptsStep-by-step guide to developing STO smart contracts on EthereumMonetize digital tokens under various U.
Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming.
Discover how to implement information protection, data loss prevention, and information governance within Microsoft 365Key FeaturesDesign, implement, and administer Microsoft Information ProtectionImplement data loss prevention to minimize the risk of data exfiltrationUse Information Governance capabilities to ensure that data is stored in your environment for as long as necessaryBook DescriptionCloud technologies have massively increased the amount of data being produced and the places in which this data is stored.
Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use casesKey FeaturesDiscover tips and expert advice from the leading CISO and author of many cybersecurity booksBecome well-versed with a CISO's day-to-day responsibilities and learn how to perform them with easeUnderstand real-world challenges faced by a CISO and find out the best way to solve themBook DescriptionThe chief information security officer (CISO) is responsible for an organization's information and data security.
Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for cybersecurity job rolesPrepare for SOC analyst, penetration tester, malware analyst, digital forensics analyst, CISO, and more rolesUnderstand different key areas in each role and prepare for themBook DescriptionThis book is a comprehensive guide that helps both entry-level and experienced cybersecurity professionals prepare for interviews in a wide variety of career areas.
A reference for law enforcement and security organizations tasked with protecting the welfare of an individual or groups of individuals, this volume offers suggestions and guidance for confronting high-threat scenarios as well as the more mundane protective details.
Discussing social media-related scholarship found in criminology, legal studies, policing, courts, corrections, victimization, and crime prevention, this book presents the current state of our knowledge on the impact of social media and the major sociological frameworks employed to study the U.
Discover expert techniques for combining machine learning with the analytic capabilities of Elastic Stack and uncover actionable insights from your dataKey FeaturesIntegrate machine learning with distributed search and analyticsPreprocess and analyze large volumes of search data effortlesslyOperationalize machine learning in a scalable, production-worthy wayBook DescriptionElastic Stack, previously known as the ELK stack, is a log analysis solution that helps users ingest, process, and analyze search data effectively.
Learn advanced threat analysis techniques in practice by implementing Elastic Stack security featuresKey FeaturesGet started with Elastic Security configuration and featuresLeverage Elastic Stack features to provide optimal protection against threatsDiscover tips, tricks, and best practices to enhance the security of your environmentBook DescriptionThreat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats.
Use an open source firewall and features such as failover, load balancer, OpenVPN, IPSec, and Squid to protect your networkKey FeaturesExplore pfSense, a trusted open source network security solutionConfigure pfSense as a firewall and create and manage firewall rulesTest pfSense for failover and load balancing across multiple WAN connectionsBook DescriptionWhile connected to the internet, you're a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes.
Learn IT security essentials and prepare for the Security+ exam with this CompTIA exam guide, complete with additional online resources-including flashcards, PBQs, and mock exams-at securityplus.
Gain basic skills in network forensics and learn how to apply them effectivelyKey FeaturesInvestigate network threats with easePractice forensics tasks such as intrusion detection, network analysis, and scanningLearn forensics investigation at the network levelBook DescriptionNetwork forensics is a subset of digital forensics that deals with network attacks and their investigation.
In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production.
The emergence of artificial intelligence has created a vast amount of advancements within various professional sectors and has transformed the way organizations conduct themselves.
Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to these networks' shortcomings.