Tag: Securing

Securing Our Digital World Defending Against the Enemies Within [Audiobook]


Free Download Mike Chapple, Darril Gibson, Alaura Howitzer (Narrator), "Securing Our Digital World: Defending Against the Enemies Within"
English | ISBN: 9798868707223 | 2024 | MP3@64 kbps | ~05:25:00 | 154 MB
Securing Our Digital World: Defending Against the Enemies Within
Are you concerned about the ever-growing and evolving threats to your digital world? Do the complexities of cybersecurity leave you wondering about the vulnerability of your personal and professional data? How can you safeguard yourself against the invisible dangers lurking in the digital realm?

(more…)

BlackHat – Attacking and Securing APIs Course


Free Download BlackHat – Attacking and Securing APIs Course
MP4 | Video: H264 2304×1300 | Audio: AAC 44100Hz 2 Ch
Language: English | Duration: 10+ hours | Size: 11.14 GB
This is a hand-on practical concentrated course on securing and attacking web and cloud APIs. APIs are everywhere nowadays: In web apps, embedded systems, enterprise apps, cloud environments and even IoT, and it is becoming increasingly necessary to learn how to defend, secure and attack API implementation and infrastructure.
This training aims to engage you in creating secure modern APIs, while showing you both new and old attack vectors.

(more…)

Testing and Securing Web Applications


Free Download Testing and Securing Web Applications By Ravi Das
2020 | 224 Pages | ISBN: 0367333759 | PDF | 9 MB
Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don’t touch a front end or a back end; today’s web apps impact just about every corner of it. Today’s web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.

(more…)

Securing the Seas the Soviet Naval Challenge and Western Alliance Options


Free Download Securing the Seas: the Soviet Naval Challenge and Western Alliance Options By Paul H. Nitze; Leonard Sullivan; Atlantic Council Working Group on Securing the Seas
2019 | 499 Pages | ISBN: 0367286904 | PDF | 51 MB
This book is the effort of experts brought together by the Atlantic Council to analyze the capabilities of the Western Alliance to defend sea lines of communication under various conditions of peace, tension, and war. It reviews the way in which Soviet naval forces have been used in the Alliance.

(more…)

ISSE 2009 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2009 Conference


Free Download ISSE 2009 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2009 Conference By Vittorio Bertocci (auth.), Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider (eds.)
2010 | 368 Pages | ISBN: 3834809586 | PDF | 88 MB
This book presents the most interesting talks given at ISSE 2009 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: – Economics of Security and Identity Management – Security Services and Large Scale Public Applications – Privacy and Data Protection and Awareness Raising – Standards and Technical Solutions – Secure Software, Trust and Assurance Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2009. Content/noch mit MS abgleichen!! Economics of Security and Identity Management – Security Services and Large Scale Public Applications – Privacy and Data Protection and Awareness Raising – Standards and Technical Solutions – Secure Software, Trust and Assurance Target Group: – Developers of Electronic Business Processes – IT Managers – IT Security Experts – Researchers Wolfgang Schneider: Deputy Institute Director, Fraunhofer Institute SIT Abouth the Editors: Norbert Pohlmann: Professor for System and Information Security at the University of Applied Sciences in Gelsenkirchen Helmut Reimer: Senior Consultant, TeleTrusT

(more…)

Securing Unmanned Aerial Vehicle Networks Models and Algorithms


Free Download Securing Unmanned Aerial Vehicle Networks: Models and Algorithms by Bin Duo , Xiaojun Yuan , Yifan Liu
English | PDF EPUB (True) | 2023 (2024 Edition) | 130 Pages | ISBN : 3031456041 | 21.9 MB
This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.

(more…)