Explore the entire Hyperledger blockchain family, including frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and tools such as Composer, Explorer, and Caliper.
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilitiesConduct a preliminary assessment of attack surfaces and run exploits in your labExplore new tools in the Kali Linux ecosystem for web penetration testingBook DescriptionWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure.
Integrate an end-to-end logistic chain using IBM Blockchain and IoT platformsKey FeaturesExplore practical implementation of ledger technology in the IoT architectureStudy security best practices for your smart devicesUnderstand Blockchain implementation for end-to-end IoT solutionsBook DescriptionBlockchain has been the hot topic of late thanks to cryptocurrencies.
Test, fuzz, and break web applications and services using Burp Suite's powerful capabilitiesKey FeaturesMaster the skills to perform various types of security tests on your web applicationsGet hands-on experience working with components like scanner, proxy, intruder and much moreDiscover the best-way to penetrate and test web applicationsBook DescriptionBurp suite is a set of graphic tools focused towards penetration testing of web applications.
Become a master at penetration testing using machine learning with PythonKey Features Identify ambiguities and breach intelligent security systems Perform unique cyber attacks to breach robust systems Learn to leverage machine learning algorithmsBook DescriptionCyber security is crucial for both businesses and individuals.
Best practices for protecting critical data and systemsInformation Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures.
Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramatically improve your organization s security posture using the proven defense strategies in this thoroughly updated guide.
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.
Architect scalable, reliable, and maintainable applications for enterprises with PythonKey FeaturesExplore various Python design patterns used for enterprise software developmentApply best practices for testing and performance optimization to build stable applicationsLearn about different attacking strategies used on enterprise applications and how to avoid themBook DescriptionDynamically typed languages like Python are continuously improving.
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackersKey FeaturesEmploy advanced pentesting techniques with Kali Linux to build highly secured systemsDiscover various stealth techniques to remain undetected and defeat modern infrastructuresExplore red teaming techniques to exploit secured environmentBook DescriptionThis book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.
Master Python scripting to build a network and perform security operationsKey FeaturesLearn to handle cyber attacks with modern Python scriptingDiscover various Python libraries for building and securing your networkUnderstand Python packages and libraries to secure your network infrastructureBook DescriptionIt's becoming more and more apparent that security is a critical aspect of IT infrastructure.
A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile element of information security-humansPeople-Centric Security: Transforming Your Enterprise Security Culture addresses the urgent need for change at the intersection of people and security.
Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide.
From the #1 Name in Professional CertificationPrepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.
Written by the #1 name in IT security certification training, fully revised for the latest exam release, and featuring 750+ practice questions plus 24 hours of audio lecturesCISSP Practice Exams, Second Edition is the ideal companion to Shon Harris bestselling CISSP All-in-One Exam Guide.
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findingsAdvanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal.
An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-CouncilGet complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource.
A comprehensive guide for cybersecurity professionals to acquire unique insights on the evolution of the threat landscape and how you can address modern cybersecurity challenges in your organisationKey FeaturesProtect your organization from cybersecurity threats with field-tested strategiesDiscover the most common ways enterprises initially get compromisedMeasure the effectiveness of your organization's current cybersecurity program against cyber attacksBook DescriptionAfter scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more.
Build smart cybersecurity systems with the power of machine learning and deep learning to protect your corporate assetsKey FeaturesIdentify and predict security threats using artificial intelligenceDevelop intelligent systems that can detect unusual and suspicious patterns and attacksLearn how to test the effectiveness of your AI cybersecurity algorithms and toolsBook DescriptionToday's organizations spend billions of dollars globally on cybersecurity.
Learn quick and effective techniques for developing blockchain-based distributed ledgers with easeKey FeaturesDiscover why blockchain is a game changer in the technology landscapeSet up blockchain networks using Hyperledger FabricWrite smart contracts at speed with Hyperledger ComposerBook DescriptionBlockchain and Hyperledger are open source technologies that power the development of decentralized applications.
Build real-world projects like a smart contract deployment platform, betting apps, wallet services, and much more using blockchainKey FeaturesApply blockchain principles and features for making your life and business betterUnderstand Ethereum for smart contracts and DApp deploymentTackle current and future challenges and problems relating to blockchainBook DescriptionBlockchain applications provide a single-shared ledger to eliminate trust issues involving multiple stakeholders.
The latest Web app attacks and countermeasures from world-renowned practitionersProtect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker.
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practicesKey FeaturesExplore useful recipes for implementing robust cloud security solutions on AWSMonitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and MaciePrepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offeringsBook DescriptionAs a security consultant, securing your infrastructure by implementing policies and following best practices is critical.
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat hunting process and understand the environmentPerform advanced hunting using MITRE ATT&CK Evals emulations and Mordor datasetsBook DescriptionThreat hunting (TH) provides cybersecurity analysts and enterprises with the opportunity to proactively defend themselves by getting ahead of threats before they can cause major damage to their business.
Cyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while perfection in cybersecurity may be unattainable, significant improvements can be made through understanding history and fostering innovation.
The official report that has shaped the international debate about NSA surveillance"e;We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking.
Understand how blockchain works and explore a variety of strategies to implement it in your organization effectivelyKey FeaturesBecome familiar with business challenges faced by companies when using blockchainDiscover how companies implement blockchain to monetize and secure their dataStudy real-world examples to understand blockchain and its use in organizationsBook DescriptionIn addition to cryptocurrencies, blockchain-based apps are being developed in different industries such as banking, supply chain, and healthcare to achieve digital transformation and enhance user experience.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2018, held in Funchal, Madeira, Portugal, in January 2018.
This two-volume set constitutes the proceedings of the Third Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2019, held in Volgograd, Russia, in September 2019.
This volume constitutes the refereed proceedings of the 14th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2019, held in Leon, Spain, in September 2019.
This three-volume set LNAI 11670, LNAI 11671, and LNAI 11672 constitutes the thoroughly refereed proceedings of the 16th Pacific Rim Conference on Artificial Intelligence, PRICAI 2019, held in Cuvu, Yanuca Island, Fiji, in August 2019.
The proceedings set LNCS 11727, 11728, 11729, 11730, and 11731 constitute the proceedings of the 28th International Conference on Artificial Neural Networks, ICANN 2019, held in Munich, Germany, in September 2019.
The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019.
This book constitutes the refereed proceedings of the 14th International Symposium on Visual Computing, ISVC 2019, held in Lake Tahoe, NV, USA in October 2019.
This book constitutes the proceedings of the International Conference on Web of Services, ICWS 2020, held virtually as part of SCF 2020, in Honolulu, HI, USA, in September 2020.
The 30-volume set, comprising the LNCS books 12346 until 12375, constitutes the refereed proceedings of the 16th European Conference on Computer Vision, ECCV 2020, which was planned to be held in Glasgow, UK, during August 23-28, 2020.
The 4 volume set LNCS 12112-12114 constitutes the papers of the 25th International Conference on Database Systems for Advanced Applications which will be held online in September 2020.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.