Descargar Libros y Ebooks (PDF / EPUB)

La mejor selección de ebooks gratis en español

Hemos encontrado un total de 39 libros disponibles para descargar

Desarrollo de componentes software para servicios de comunicaciones. IFCT0609

Autor: Federico Huércano Ruíz , José Villar Cueli

Número de Páginas: 234

Libro especializado que se ajusta al desarrollo de la cualificación profesional y adquisición del certificado de profesionalidad "IFCT0609 - PROGRAMACIÓN DE SISTEMAS INFORMÁTICOS". Manual imprescindible para la formación y la capacitación, que se basa en los principios de la cualificación y dinamización del conocimiento, como premisas para la mejora de la empleabilidad y eficacia para el desempeño del trabajo.

The Hacker Playbook

Autor: Peter Kim

Número de Páginas: 276

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software. From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of...

Handbook of Research on Applied Social Psychology in Multiculturalism

Autor: Christiansen, Bryan , Chandan, Harish C.

Número de Páginas: 375

Social psychology is the scientific study of how the thoughts, feelings, and behaviors of individuals are influenced by the actual, imagined, and implied presence of others. In this definition, scientific refers to the empirical investigation using the scientific method, while the terms thoughts, feelings, and behaviors refer to the psychological variables that can be measured in humans. Moreover, the notion that the presence of others may be imagined or implied suggests that humans are malleable to social influences even when alone, such as when watching videos or quietly appreciating art. In such situations, people can be influenced to follow internalized cultural norms. Social psychology deals with social influence, social perception, and social interaction. The research in this field deals with what shapes our attitudes and how we develop prejudice. The Handbook of Research on Applied Social Psychology in Multiculturalism explores social psychology within the context of multiculturalism and the way society deals with cultural diversity at national and community levels. It will cover major topics of social psychology such as group behavior, social perception, leadership,...

Hacking APIs

Autor: Corey J. Ball

Número de Páginas: 362

Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure. Hacking APIs is a crash course on web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure. You’ll learn how REST and GraphQL APIs work in the wild and set up a streamlined API testing lab with Burp Suite and Postman. Then you’ll master tools useful for reconnaissance, endpoint analysis, and fuzzing, such as Kiterunner and OWASP Amass. Next, you’ll learn to perform common attacks, like those targeting an API’s authentication mechanisms and the injection vulnerabilities commonly found in web applications. You’ll also learn techniques for bypassing protections against these attacks. In the book’s nine guided labs, which target intentionally vulnerable APIs, you’ll practice: • Enumerating APIs users and endpoints using fuzzing techniques • Using Postman to discover an excessive data exposure vulnerability • Performing a JSON Web Token attack against an API authentication process •...

The Pentester BluePrint

Autor: Phillip L. Wylie , Kim Crawley

Número de Páginas: 192

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The...

Hacking - Guide pratique des tests d'intrusion

Autor: Peter Kim

Número de Páginas: 262

Le livre indispensable pour contourner et éradiquer les attaques des hackers et sécuriser tous vos systèmes informatiques Pour combattre un pirate, il faut penser comme un pirate et connaître toutes leurs pratiques. L'expert Peter Kim vous explique les motivations et les objectifs des hackers. Il vous révèle les secrets des tests de vulnérabilité et de pénétration, des meilleures pratiques et de tout ce qu'il faut connaître pour neutraliser les pirates avant qu'ils aient pu commettre des dégâts. Découvrez comment protéger vos serveurs et vos postes de travail, vos applications web, vos appareils mobiles et tous vos réseaux. Ce livre est illustré par des exemples d'attaques réelles.

Hackers

Autor: Juan Andres Maillo Fernandez

Número de Páginas: 474

En el año 2020 todo el mundo que nos rodea es digital. Puede que no seamos conscientes (o por lo menos, no plenamente conscientes) de ello, pero si nos paramos a pensar unos minutos en nuestro entorno diario, nos daremos cuenta de la gran cantidad de tecnología que envuelve nuestras vidas. Los grandes avances que hemos experimentado en los últimos años, tanto en los dispositivos como en las comunicaciones, han conseguido transformar no solo la tecnología, sino todo lo que hacemos. El modo en el que trabajamos, nos comunicamos, nos relacionamos, jugamos, aprendemos... cualquier aspecto de nuestra vida está bañado de una manera u otra por el mundo digital. Las ventajas que esta nueva revolución ha aportado a nuestro día a día son evidentes, pero no podemos perder de vista las nuevas amenazas que han surgido hacia nuestra seguridad. Si la tecnología modifica el mundo, el crimen no podía dejar pasar la oportunidad de aprovecharse de ella para aumentar sus beneficios disminuyendo sus propios riesgos. Ante este nuevo escenario es de vital importancia que, tanto las Fuerzas y Cuerpos de seguridad del Estado que deben luchar contra la delincuencia, como los responsables de...

Security Strategies in Windows Platforms and Applications

Autor: Michael G. Solomon

Número de Páginas: 392

Revised and updated to keep pace with this ever changing field, Security Strategies in Windows Platforms and Applications, Third Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system, placing a particular emphasis on Windows 10, and Windows Server 2016 and 2019. The Third Edition highlights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style, and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security strategies and techniques.

Security Strategies in Windows Platforms and Applications

Autor: Robert Shimonski , Michael G. Solomon

Número de Páginas: 437

Revised edition of: Security strategies in windows platforms and applications, Michael G. Solomon, third edition. Burlington, MA: Jones & Bartlett Learning, [2021].

PCI DSS

Autor: Jim Seaman

Número de Páginas: 549

Gain a broad understanding of how PCI DSS is structured and obtain a high-level view of the contents and context of each of the 12 top-level requirements. The guidance provided in this book will help you effectively apply PCI DSS in your business environments, enhance your payment card defensive posture, and reduce the opportunities for criminals to compromise your network or steal sensitive data assets. Businesses are seeing an increased volume of data breaches, where an opportunist attacker from outside the business or a disaffected employee successfully exploits poor company practices. Rather than being a regurgitation of the PCI DSS controls, this book aims to help you balance the needs of running your business with the value of implementing PCI DSS for the protection of consumer payment card data. Applying lessons learned from history, military experiences (including multiple deployments into hostile areas), numerous PCI QSA assignments, and corporate cybersecurity and InfoSec roles, author Jim Seaman helps you understand the complexities of the payment card industry data security standard as you protect cardholder data. You will learn how to align the standard with your...

Hacking ético

Autor: Berenguel GÓmez, Jose Luis , Esteban SÁnchez, Pablo

Número de Páginas: 554

Con Hacking ético aprenderás a descubrir vulnerabilidades atacando sistemas antes de que lo hagan los ciberdelincuentes. Este libro desarrolla los contenidos del módulo profesional de Hacking ético, del Curso de Especialización en Ciberseguridad en Entornos de las Tecnologías de la Información, perteneciente a la familia profesional de Informática y Comunicaciones. También va dirigido a titulados universitarios y de grados superiores de FP, así como trabajadores y expertos con conocimientos en Informática, que desean actualizar y mejorar sus competencias en ciberseguridad. Hacking ético permite adquirir las habilidades fundamentales para realizar un test de intrusión, desde el reconocimiento del objetivo donde se descubre información relevante, hasta las fases de explotación de las vulnerabilidades del sistema, la escalada de privilegios para obtener permisos de administrador y los movimientos laterales hacia otros equipos de la red. Además, se explica el hacking de aplicaciones web, de entornos empresariales de Microsoft con Active Directory, de sistemas operativos GNU/Linux y de redes inalámbricas, a través de numerosos ejemplos y laboratorios prácticos...

The Cybersecurity Workforce of Tomorrow

Autor: Michael Nizich

Número de Páginas: 225

The Cybersecurity Workforce of Tomorrow discusses the current requirements of the cybersecurity worker and analyses the ways in which these roles may change in the future as attacks from hackers, criminals and enemy states become increasingly sophisticated.

Proceedings of the 8th International Scientific and Practical Conference «Scientific Trends and Trends in the Context of Globalization»

Autor: Anna Svoboda

Número de Páginas: 549

This issue of Scientific Collection «InterConf+» contains the materials of the International Scientific and Practical Conference. The conference provides an interdisciplinary forum for researchers, practitioners and scholars to present and discuss the most recent innovations and developments in modern science. The aim of conference is to enable academics, researchers, practitioners and college students to publish their research findings, ideas, developments, and innovations.

Practical Security

Autor: Roman Zabicki

Número de Páginas: 174

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and you'll have a solid foundation if you bring in a dedicated security staff later. Identify the weaknesses in your system, and defend against the attacks most likely to compromise your organization, without needing to become a trained security professional. Computer security is a complex issue. But you don't have to be an expert in all the esoteric details to prevent many common attacks. Attackers are opportunistic and won't use a complex attack when a simple one will do. You can get a lot of benefit without too much complexity, by putting systems and processes in place that ensure you aren't making the obvious mistakes. Secure your systems better, with simple (though not always easy) practices. Plan to patch often to improve your security posture. Identify the most common software vulnerabilities, so you can avoid them when writing software. Discover cryptography - how it works, how easy it is...

The Mobile Application Hacker's Handbook

Autor: Dominic Chell , Tyrone Erasmus , Shaun Colley , Ollie Whitehouse

Número de Páginas: 816

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by...

Заработок для хакера

Autor: Михаил Тарасов

Número de Páginas: 205

«Заработок для хакера» – руководство о том, как превратить навыки хакера в доход. Книга охватывает легальные пути: карьеру в кибербезопасности, Bug Bounty-платформы (HackerOne), консалтинг, обучение. Рассматривает риски «серых» схем (даркнет, фишинг), предупреждая о юридических последствиях. Автор раскрывает инструменты (Metasploit, Wireshark), языки программирования (Python), и этические принципы. Отдельные главы посвящены анализу трендов, историям успеха и советам для новичков.

API 해킹의 모든 것

Autor: 코리 볼 (corey Ball)

Número de Páginas: 403

칼리 리눅스 실습과 함께 배우는 차세대 웹 보안 취약점 정복 API 대상 공격은 해마다 크게 증가하고 있고, 2022년에는 모든 공격의 과반을 넘어섰다는 보고서도 나왔다. API는 전체 인터넷 트래픽의 80% 이상을 차지할 정도로 사용량이 폭발적으로 증가했지만, 상대적으로 보안이 미비하여 확장된 공격 표면이 공격자들의 손쉬운 표적이 되고 있다. API 보안의 중요성이 높아지는 가운데, API 해킹의 이론과 실제를 포괄적으로 정리한 것이 이 책이다. 1부에서는 웹 애플리케이션 작동 원리, REST/그래프QL 웹 API의 구조, 그리고 정보 누출, BOLA, BFLA, 대량 할당, 주입(인젝션) 등 널리 알려진 API 취약점들을 살펴보며 보안 기초를 쌓는다. 2부에서는 실습을 위해 가상 머신에 칼리 리눅스를 설치하고 공격 및 대상 시스템을 구축한다. 버프 스위트와 포스트맨 등 주요 해킹 툴을 소개하고, 대상 시스템에는 crAPI나 DVGA 등 취약한 애플리케이션을 설치해 실습을 준비한다. 3부는 앞에서 소개한 툴들을 사용해 발견, 사전...

Offensive security

Autor: Waqas Haider

Número de Páginas: 99

This book is a comprehensive guide that caters to a diverse audience, including students interested in learning pen testing, reading enthusiasts, career changers, and national security experts. The book is organized into five chapters, each covering an important aspect of pen testing, from the pentest process to reporting. The book covers advanced topics such as SDR, RF threats, open air attacks, and the business opportunities in offensive security. With the goal of serving as a tutorial for students and providing comprehensive knowledge for all readers, the author has included detailed labs and encourages readers to contact them for additional support. Whether you're a new student seeking a foundation in pen testing, an experienced professional looking to expand your knowledge, or simply a reader interested in the field, this book provides a comprehensive guide to the world of pen testing. The book's breadth and depth of content make it an essential resource for anyone looking to understand this critical area of cybersecurity.

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition

Autor: Allen Harper , Ryan Linn , Stephen Sims , Michael Baucom , Huascar Tejeda , Daniel Fernandez , Moses Frost

Número de Páginas: 705

Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks. Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition clearly explains the enemy’s devious weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. You will get complete coverage of Internet of Things, mobile, and Cloud security along with penetration testing, malware analysis, and reverse engineering techniques. State-of-the-art malware, ransomware, and system exploits are thoroughly explained. Fully revised content includes 7 new chapters covering the latest threats Includes proof-of-concept code stored on the GitHub repository Authors train attendees at major security conferences, including RSA, Black Hat, Defcon, and Besides

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition

Autor: Daniel Regalado , Shon Harris , Allen Harper , Chris Eagle , Jonathan Ness , Branko Spasojevic , Ryan Linn , Stephen Sims

Número de Páginas: 637

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition. •Build and launch spoofing exploits with Ettercap •Induce error conditions and crash software using fuzzers •Use advanced reverse engineering to exploit Windows and Linux software •Bypass Windows Access Control and memory protection schemes •Exploit web applications with Padding Oracle Attacks •Learn the use-after-free technique used in recent zero days •Hijack web browsers with advanced XSS attacks ...

The Lean Entrepreneurship Playbook

Autor: George Watt

Número de Páginas: 771

Established organizations in the public and private sectors struggle when bringing new, innovative ideas to life. This has resulted in the creation of countless “innovation programs” and initiatives, with many, perhaps most, failing to deliver meaningful results. Many of these initiatives fail because they do not get the momentum they need early on, they start in the wrong place, or they focus on the wrong problems; and creating the wrong type of initiative can doom it before it launches. This book takes you through a step-by-step approach which will help you select, structure, and create the right type of initiative to nurture new and innovative ideas and ensure they have the best possible chance to succeed. It includes updated insights, and is filled with questions, examples, artifacts, and tools to help you make key choices as you develop a way to ensure new ideas in your organization flourish. It contains information, experience, and anecdotes that will help you identify, anticipate, and overcome not only roadblocks to bringing those ideas to life, but also obstacles to the initiative itself, and includes frameworks to help accelerate your deployment. What You Will Learn...

Becoming the Hacker

Autor: Adrian Pruteanu

Número de Páginas: 405

Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key FeaturesBuilds on books and courses on penetration testing for beginnersCovers both attack and defense perspectivesExamines which tool to deploy to suit different applications and situationsBook Description Becoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over ...

Handbook of Research on Transformative Digital Content and Learning Technologies

Autor: Keengwe, Jared , Bull, Prince Hycy

Número de Páginas: 479

Technology is constantly evolving and can now aid society with the quest for knowledge in education systems. It is important to integrate the most recent technological advances into curriculums and classrooms, so the learning process can evolve just as technology has done. The Handbook of Research on Transformative Digital Content and Learning Technologies provides fresh insight into the most recent advancements and issues regarding educational technologies in contemporary classroom environments. Featuring detailed coverage on a variety of topics, such as mobile technology integration, ICT literacy integration, digital wellness, online group counseling, and distance learning, this publication will appeal to researchers and practitioners who are interested in discovering more about technological integration in education.

When

Autor: Daniel H. Pink

Número de Páginas: 168

Timing is everything. But we don't know much about timing itself. Timing, it's often assumed, is an art; in When, Pink shows that timing is in fact a science. Drawing on a rich trove of research from psychology, biology and economics, Pink reveals how best to live, work and succeed. How can we use the hidden patterns of the day to build the ideal schedule? Why do certain breaks dramatically improve student test scores? How can we turn a stumbling beginning into a fresh start? When should you have your first coffee of the day? Why is singing in time with other people as good for us as exercise? And what is the ideal time to quit a job, switch careers, or get married? In When, Pink distills cutting edge research and data on timing and synthesizes them into a fascinating, readable narrative packed with irresistible stories and practical takeaways that give readers compelling insights into how we can live richer, more engaged lives.

The Social-Emotional Learning Playbook

Autor: Nancy Frey , Douglas Fisher , Dominique Smith

Número de Páginas: 228

Teach skills and foster the dispositions of social and emotional learning in yourself, your students, and your school. Social and emotional learning (SEL) is like any academic subject students learn in school—their learning expands and deepens, year after year. As an educator, what can you do to support not only your students’ well-being and SEL development, but your own? The Social-Emotional Learning Playbook: A Guide to Student and Teacher Well-Being provides the language, moves, and evidence-based advice you need to identify and nurture social and emotional learning in yourself, your students, and your school. Sparking deep reflection and transformative growth, this highly interactive playbook profiles six tenets of social and emotional learning—building resilience, belonging and prosocial skills, emotional regulation, relational trust and communication, individual and collective efficacy, and community of care. Each module features Reflection prompts and self-awareness resources that help teachers identify strengths, target areas for growth, and engage with colleagues over social and emotional development. Strategies for teaching and reinforcing SEL skills that are...

Handbook of Comparative Political Economy

Autor: Marino Regini

Número de Páginas: 611

This comprehensive Handbook presents an overview of the evolution and current state of Comparative Political Economy (CPE). Taking an interdisciplinary approach, it explores the leading theories, main actors, key institutions, policy areas, geographical boundaries and emerging themes in the field.

Handbook of Research on Redesigning Teaching, Learning, and Assessment in the Digital Era

Autor: Meletiadou, Eleni

Número de Páginas: 522

Recent evolutions, such as pervasive networking and other enabling technologies, have been increasingly changing human life, knowledge acquisition, and the way works are performed and students learn. In this societal change, educational institutions must maintain their leading role. They have therefore embraced digitally enhanced learning to provide increased flexibility and access for their students. The Handbook of Research on Redesigning Teaching, Learning, and Assessment in the Digital Era provides insights into the transformation of education in the digital era and responds to the needs of learners of any context and background through relevant studies that include sound pedagogical and content knowledge. Covering key topics such as hybrid learning, media, remote learning, and social media, this major reference work is ideal for administrators, policymakers, academicians, researchers, scholars, practitioners, librarians, instructors, and students.

The Hacker’s Notes

Autor: Hamcodes K.h , Kayemba Hamiidu

Número de Páginas: 392

Ever feel like you know the theory — but not what to actually do during a live hack? The Hacker’s Notes: How to Hack All-Tech – No Fluff. No Theory. Just Execution You’re not alone. In today’s ever-evolving digital battlefield, most cybersecurity content overwhelms with theory, jargon, or outdated tools. You’re not looking for fluff — you want execution, not explanations. You want to be the operator in control, the one who knows what to do when the moment hits. But theory-heavy textbooks don’t teach that. Before: You’re jumping between YouTube videos, outdated PDFs, or scattered blog tutorials, trying to piece together a solid offensive or defensive strategy. The Hacker’s Notes: How to Hack All-Tech – No Fluff. No Theory. Just Execution. Master the art of hacking and enhance your cybersecurity skills. This streamlined field guide is built for: Red Team / Blue Team Operators Penetration Testers SOC Analysts Cybersecurity Students Ethical Hackers and InfoSec Hobbyists This no-nonsense guide is tailored for professionals who prefer practical over theoretical. With a focus on real-world applications, it’s the ultimate resource for anyone eager to learn...

Cybersecurity in Digital Transformation

Autor: Dietmar P.f. Möller

Número de Páginas: 126

This book brings together the essential methodologies required to understand the advancement of digital technologies into digital transformation, as well as to protect them against cyber threat vulnerabilities (in this context cybersecurity attack ontology is included, modeling different types of adversary knowledge). It covers such essential methodologies as CIA Triad, Security Risk, Likelihood, and Consequence Level, Threat Attack Profiling, Threat Intelligence, Threat Lifecycle and more. The idea behind digital transformation is to use digital technologies not only to replicate an existing process in a digital form, but to use digital technology to transform that process into something intelligent (where anything is connected with everything at any time and accessible and controlled and designed advanced). Against this background, cyber threat attacks become reality, using advanced digital technologies with their extreme interconnected capability which call for sophisticated cybersecurity protecting digital technologies of digital transformation. Scientists, advanced-level students and researchers working in computer science, electrical engineering and applied mathematics will...

Play Among Books

Autor: Miro Roman , Alice _ch3n81

Número de Páginas: 528

How does coding change the way we think about architecture? This question opens up an important research perspective. In this book, Miro Roman and his AI Alice_ch3n81 develop a playful scenario in which they propose coding as the new literacy of information. They convey knowledge in the form of a project model that links the fields of architecture and information through two interwoven narrative strands in an “infinite flow” of real books. Focusing on the intersection of information technology and architectural formulation, the authors create an evolving intellectual reflection on digital architecture and computer science.

CISSP Exam Study Guide: 3 Books In 1

Autor: Richie Miller

Número de Páginas: 490

If you want to become a Cybersecurity Professional, this book is for you! IT Security jobs are on the rise! Small, medium or large size companies are always on the look out to get on board bright individuals to provide their services for Business as Usual (BAU) tasks or deploying new as well as on-going company projects. Most of these jobs requiring you to be on site but since 2020, companies are willing to negotiate with you if you want to work from home (WFH). Yet, to pass the Job interview, you must have experience. Still, if you think about it, all current IT security professionals at some point had no experience whatsoever. The question is; how did they get the job with no experience? Well, the answer is simpler then you think. All you have to do is convince the Hiring Manager that you are keen to learn and adopt new technologies and you have willingness to continuously research on the latest upcoming methods and techniques revolving around IT security. Here is where this book comes into the picture. Why? Well, if you want to become an IT Security professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam....

Advanced Informatics for Computing Research

Autor: Ashish Kumar Luhach , Dharm Singh , Pao-ann Hsiung , Kamarul Bin Ghazali Hawari , Pawan Lingras , Pradeep Kumar Singh

Número de Páginas: 619

This two-volume set (CCIS 955 and CCIS 956) constitutes the refereed proceedings of the Second International Conference on Advanced Informatics for Computing Research, ICAICR 2018, held in Shimla, India, in July 2018. The 122 revised full papers presented were carefully reviewed and selected from 427 submissions. The papers are organized in topical sections on computing methodologies; hardware; information systems; networks; security and privacy; computing methodologies.

Practical Security for Agile and DevOps

Autor: Mark S. Merkow

Número de Páginas: 249

This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students’ own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. ...

The Bottom-of-Funnel SEO + LLM Cost Hacker's Guide

Autor: İsmail Günaydın

Número de Páginas: 22

Turn every click into revenue—and slash AI content costs like a pro. "The Bottom‑of‑Funnel SEO + LLM Cost Hacker's Guide" is your tactical manual for mastering AI-powered SEO and dominating conversion-focused content. Designed for marketers, growth hackers, and founders, this book shows you how to capture ready-to-buy search traffic and scale content ops using the smartest Large Language Model (LLM) hacks. In a digital world where everyone’s focused on top-of-funnel fluff, this guide goes deep—right where money changes hands. What you’ll unlock: Advanced bottom-funnel SEO strategies that convert traffic into transactions How to structure and scale programmatic SEO with AI precision Real-world playbooks for slashing LLM content costs while improving quality Prompt engineering secrets for ecommerce, SaaS, B2B, and affiliate content AI-powered workflows for briefs, outlines, CTAs, and persuasive copywriting Conversion-first optimization, schema, and internal linking architecture Built for the next wave of content-led growth, this book is part SEO crash course, part AI cost-optimizer, and 100% no-fluff. Maximize output. Minimize spend. Monetize smarter. Whether you're a ...

CYBERWARFARE SOURCEBOOK

Autor: A. Kiyuna , L. Conyers

Número de Páginas: 312

Concerning application layer DDoS attacks, Bureau 121, camfecting, cyber attack threat trends, ECHELON, Fifth Dimension Operations, Intervasion of the UK, Military-digital complex, PLA Unit 61398, Stuxnet, and more

Dark World

Autor: Atif Ali , Muhammad Qasim

Número de Páginas: 343

Discover the hidden depths of the digital underworld in this comprehensive, interdisciplinary exploration of the dark web. Ideal for security agencies, professionals, counter-terrorism experts, and policymakers alike, this work offers invaluable insights that will enhance understanding and fortify strategies. By shedding particular light on the nuances of the ‘dark market,’ this book provides readers with a detailed understanding of the dark web, encompassing both its sinister underbelly and unexpected potential. This book also uncovers the latest trends and cutting-edge mitigation techniques. From illicit transactions to thriving business ventures, it examines the key domains and sectors that thrive within this clandestine environment. This book consolidates myriad perspectives on security and threats on the dark web.

Third International Congress on Information and Communication Technology

Autor: Xin-she Yang , Simon Sherratt , Nilanjan Dey , Amit Joshi

Número de Páginas: 968

The book includes selected high-quality research papers presented at the Third International Congress on Information and Communication Technology held at Brunel University, London on February 27–28, 2018. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IOT), and e-mining. Written by experts and researchers working on ICT, the book is suitable for new researchers involved in advanced studies.

Últimos libros y autores buscados