СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 24
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Penetration Testing with Kali NetHunter: Hands-on Android and iOS penetration testing
/ Комментариев: 0/

Название: Penetration Testing with Kali NetHunter: Hands-on Android and iOS penetration testing
Автор: Gerald "Tripp" Roybal III
Издательство: BPB Publications
Год: 2024
Страниц: 350
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

Fortify your mobile world: Discover cutting-edge techniques for mobile security testing. Mobile devices are vital in our lives, so securing the apps and systems on them is essential. Penetration testing with Kali NetHunter offers a detailed guide to this platform, helping readers perform effective security tests on Android and iOS devices. This mobile penetration testing guide helps you to find and fix security issues in mobile apps and systems. It covers threats to Android and iOS devices, sets up testing environments, and uses tools like Kali NetHunter. You will learn methods like reconnaissance, static analysis, dynamic analysis, and reverse engineering to spot vulnerabilities. The book discusses common weaknesses in Android and iOS, including ways to bypass security measures. It also teaches testing for mobile web apps and APIs. Advanced users can explore OS and binary exploitation. Lastly, it explains how to report issues and provides hands-on practice with safe apps. After finishing this book, readers will grasp mobile security testing methods and master Kali NetHunter for mobile penetration tests. Armed with these skills, they can spot vulnerabilities, enhance security, and safeguard mobile apps and devices from potential risks. This book is designed for security and application development teams, IT professionals, mobile developers, cybersecurity enthusiasts, and anyone interested in learning about mobile penetration testing for Android and iOS devices.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Beginning with Web3: An essential guide to building dApps in the new internet era
/ Комментариев: 0/

Название: Beginning with Web3: An essential guide to building dApps in the new internet era
Автор: Ken Huang
Издательство: BPB Publications
Год: 2024
Страниц: 378
Язык: английский
Формат: pdf, epub (true)
Размер: 10.1 MB

Beginning with Web3 is your comprehensive guide to navigating the complex yet captivating world of Web3 and blockchain technology. This book is designed to provide you with a deep understanding of the decentralized web, equipping you with the knowledge and skills necessary to develop decentralized applications (dApps). From the foundational principles of Web3 and the Ethereum blockchain to the intricacies of security, storage, and development tools, this guide is a gateway to the future of the internet. As you embark on this journey, you will discover the challenges and opportunities of Web3 development, inspiring you to contribute to the growth and innovation of this exciting domain. Let us explore the new era of the internet together and build the future, one dApp at a time. This book explores Web3, a decentralized web powered by blockchain technology. Discover Ethereum's role and tools for building Web3 apps as you dive into DeFi, NFTs, and deploying apps across blockchains. After reading this book, you will be able to unveil the potential of AI integration in Web3. Imagine a web where control is not centralized but distributed across many computers. You will learn Ethereum basics, transaction processing, and node functions. You will be able to securely manage digital assets with crypto wallets and utilize tools like Truffle and Hard Hat for smart contract development. The book teaches how to deploy apps across blockchain networks and understand AI's role in enhancing Web3. Whether you are aiming to transition into Web3 development or looking to deepen your existing skills, this book offers invaluable insights into the latest technologies and trends.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet (Tech Today)
/ Комментариев: 0/

Название: The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet (Tech Today)
Автор: David Sénécal
Издательство: Wiley
Год: 2024
Страниц: 253
Язык: английский
Формат: pdf (true), epub
Размер: 43.8 MB

A top-to-bottom discussion of website bot attacks and how to defend against them. In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves. The author uses plain language to lift the veil on bots and fraud, making a topic critical to your website's security easy to understand and even easier to implement. This book aims to provide a comprehensive overview of the threat landscape and defense strategies. It provides some insight into the evolution of attacks and defense strategies over time, the motivation of attackers, how detection methods work, and how to analyze the traffic to assess accuracy and decide on the most appropriate response strategy. The knowledge acquired from this book will help security teams regain their advantage over attackers. You'll learn how attackers think, what motivates them, how their strategies have evolved over time, and how website owners have changed their own behaviors to keep up with their adversaries. You'll also discover how you can best respond to patterns and incidents that pose a threat to your site, your business, and your customers. The target audience for this book includes web security professionals, website administrators, and anyone interested in or wanting to learn more about web security and, more specifically, bot management and automated fraud detection. No specific prior knowledge or experience is required to understand the content of this book. Beginners will learn the basics of the Internet and web security while progressively diving deeper into bots, fraud, and abuse detection and mitigation.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success, 2nd Edition
/ Комментариев: 0/

Название: Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success, 2nd Edition
Автор: Tyler Wall, Jarrett Rodrick
Издательство: Apress
Год: 2024
Страниц: 289
Язык: английский
Формат: pdf (true), epub
Размер: 31.0 MB

The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book. Authors Tyler E. Wall and Jarrett W. Rodrick carefully and expertly share real-world insights and practical tips in Jump-start Your SOC Analyst Career. The lessons revealed equip you for interview preparation, tackling day one on the job, and setting long-term development goals.This book highlights personal stories from five SOC professionals at various career levels with keen advice that is immediately applicable to your own journey. The gems of knowledge shared in this book provide you with a notable advantage for entering this dynamic field of work. The first requisite skill we’ll talk about is networking. No, this won’t be about how to talk to people, but we will cover the basics of the modern TCP/IP stack and OSI model. Basically, the TCP/IP stack can be viewed as a set of layers; each layer solves a set of problems around the transmission of data. The TCP/IP stack contains four layers. Alternatively, there is a seven-layer model called the Open Systems Interconnection (OSI) model that contains seven layers. Today, the OSI model is more generally used as it provides a more granular view of the encapsulation process. Data encapsulation and decapsulation is the process of taking data from one layer of the OSI model and translating it into the next layer.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Ultimate Microsoft Cybersecurity Architect SC-100 Exam Guide: Master the SC-100 Exam with Practical Examples and Case Studies
/ Комментариев: 0/

Название: Ultimate Microsoft Cybersecurity Architect SC-100 Exam Guide: Master the SC-100 Exam with Practical Examples and Case Studies to Secure the Digital World with Microsoft Cybersecurity Expertise
Автор: K.V.N. Rajesh
Издательство: Orange Education Pvt Ltd, AVA
Год: 2024
Страниц: 793
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Ultimate Microsoft Cybersecurity Architect SC-100 Exam Guide is your definitive resource for mastering the SC-100 exam and advancing your career in cybersecurity. This comprehensive resource covers all exam objectives in detail, equipping you with the knowledge and skills needed to design and implement effective security solutions. Clear explanations and practical examples ensure you grasp key concepts such as threat modeling, security operations, and identity management. In addition to theoretical knowledge, the book includes real-world case studies and hands-on exercises to help you apply what you’ve learned in practical scenarios. Whether you are an experienced security professional seeking to validate your skills with the SC-100 certification or a newcomer aiming to enter the field, this resource is an invaluable tool. By equipping you with essential knowledge and practical expertise, it aids in your job role by enhancing your ability to protect and secure your organization’s critical assets. With this guide, you will be well on your way to becoming a certified cybersecurity architect. This book is tailored for IT professionals, security analysts, administrators, and network professionals seeking to enhance their cybersecurity expertise and advance their careers through SC-100 certification. Individuals with foundational knowledge in cybersecurity principles, including experience in security operations, identity management, and network security, will find this book invaluable for learning industry best practices and practical applications on their path to mastering the field.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Ultimate AWS Certified Cloud Practitioner's Exam Guide: Master the Concepts, Services, Security, and Architectural
/ Комментариев: 0/

Название: Ultimate AWS Certified Cloud Practitioner's Exam Guide: Master the Concepts, Services, Security, and Architectural Best Practices of AWS, EC2, S3, and RDS, and Crack AWS CLF-C02 Certification
Автор: Gaurav H Kankaria
Издательство: Orange Education Pvt Ltd, AVA
Год: 2024
Страниц: 727
Язык: английский
Формат: pdf, epub
Размер: 13.1 MB

Embark on a journey into AWS cloud computing certification with the "Ultimate AWS Certified Cloud Practitioner’s Exam Guide". This book is your ultimate guide to mastering AWS CLF-C02 certification by simplifying cloud computing basics and giving you a strong grasp of its core principles and benefits. The book simplifies AWS services like EC2, S3, and RDS, with clear explanations and real-world examples. You'll master these services and learn industry best practices for cost optimization, security, and compliance, ensuring your deployments are efficient and secure. Additionally, it empowers you to navigate the ever-changing world of cloud computing with confidence. With exam readiness at the forefront, the book provides a meticulous preparation plan, complete with practice questions, exam strategies, and hands-on exercises to fortify your knowledge and boost your confidence. Whether you're gearing up for the AWS Cloud Practitioner exam or seeking to enhance your professional skill set, the practical approach ensures you're primed for success.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Exam Ref AZ-104 Microsoft Azure Administrator, 2nd Edition
/ Комментариев: 0/

Название: Exam Ref AZ-104 Microsoft Azure Administrator, 2nd Edition
Автор: Charles Pluta
Издательство: Pearson Education, Inc.
Год: 2025
Страниц: 385
Язык: английский
Формат: pdf (true)
Размер: 21.0 MB

Prepare for Microsoft Exam AZ-104 and demonstrate your real-world mastery and knowledge of Microsoft Azure administration. Designed for working Azure administrators, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Solutions Associate level. Some books take a very low-level approach, teaching you how to use individual classes and accomplish fine-grained tasks. Like the Microsoft AZ-104 certification exam, this book takes a high-level approach, building on your foundational knowledge of Microsoft Azure and common administrative actions to take in an Azure environment. We provide walk-throughs using the Azure portal; however, the exam might also include questions that use PowerShell or the Azure Command Line Interface (CLI) to perform the same task. You might encounter questions on the exam focused on these additional areas that are not specifically included in this Exam Ref. Passing this exam fulfills your requirements for the Microsoft Certified: Azure Administrator Associate credential, demonstrating your readiness to implement, manage, and monitor identity, governance, storage, compute, and virtual networks in a cloud environment, and to provision, size, monitor, and adjust resources as appropriate.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Network Slicing for Future Wireless Communication: Theory and Application
/ Комментариев: 0/

Название: Network Slicing for Future Wireless Communication: Theory and Application
Автор: Wanqing Guan, Haijun Zhang
Издательство: Springer
Серия: Wireless Networks
Год: 2024
Страниц: 122
Язык: английский
Формат: pdf (true), epub
Размер: 17.3 MB

This book comprehensively discusses the development, application and challenges of network slicing technology in wireless communications. Starting with the basic concept and enabling technologies of network slicing, this book introduces how to integrate AI (Artificial Intelligence) technology into the end-to-end deployment, resource allocation and performance enhancement for multi-tenant slicing. An in-depth exploration of managing multi-domain slices deployed in the federated infrastructure networks is presented, including on-demand cooperation among multiple infrastructure networks, distinct slice deployment, hierarchical slice orchestration and fast slice adaption. As a guide to leveraging AI to enhance traffic performance of multi-tenant slicing and customize resource slicing for industrial scenarios, this book provides insights, modeling, applications and research issues. A holistic perspective on prominent role of network slicing in managing wireless network resources is provided as well. A network slice is defined by International Telecommunication Union (ITU) as a logically isolated network partition consisting of multiple VNFs, which is isolated and equipped with a programmable control plane and a data plane. The VNFs that constitute the network slice may vary greatly according to specific service requirements. The service types associated with the network slice determine the resources allocated to this network slice and the corresponding processing flow. The realization of network slicing is inseparable from software defined network (SDN) architecture and network function virtualization (NFV) technology.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Recent Advances in Computational Intelligence and Cyber Security
/ Комментариев: 0/

Название: Recent Advances in Computational Intelligence and Cyber Security
Автор: Ashok Kumar Singh, Zeeshan Ali Siddiqui, Siddharth Singh, Amit Kumar Singh
Издательство: CRC Press
Год: 2024
Страниц: 400
Язык: английский
Формат: pdf (true)
Размер: 32.8 MB

In the ever-accelerating tapestry of our digital age, the symbiotic relationship between computational intelligence and cyber security has become the linchpin of progress. The relentless pace of technological evolution and the ceaseless emergence of cyber threats demand not only adaptation but also an exploration of the forefronts of innovation and defence. Recent Advances in Computational Intelligence and Cyber security is a testament to the exhilarating journey undertaken by researchers, practitioners, and visionaries in these pivotal fields. Within the confines of this book, we embark on a captivating exploration of the cutting-edge developments that define the current state of computational intelligence and the intricate dance with the ever-evolving landscape of cyber security. Creating models and methods that will enable computer systems to replicate human intellect is the aim of the Computer Science field of Artificial Intelligence (AI). That’s why cybersecurity is getting more and more crucial. Preventing data breaches, financial losses, and privacy violations requires effective network security and information security. This clarifes the growing signifcance of cybersecurity.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Improving Security, Privacy, and Trust in Cloud Computing
/ Комментариев: 0/

Название: Improving Security, Privacy, and Trust in Cloud Computing
Автор: Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal
Издательство: IGI Global
Год: 2024
Страниц: 319
Язык: английский
Формат: pdf (true), epub
Размер: 26.0 MB

Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. It recognizes that a resilient cloud strategy is built upon these three fundamental pillars, each reinforcing the other. Security forms the fortress that guards against external threats and internal vulnerabilities. Privacy ensures that individuals' personal information is respected and protected, even in the cloud. Trust is the bond that unites cloud service providers and consumers, fostering a relationship grounded in transparency, reliability, and accountability. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike.