Ciberseguridad. Manual práctico

Ciberseguridad. Manual práctico PDF Author: ORTEGA CANDEL, JOSÉ MANUEL
Publisher: Ediciones Paraninfo, S.A.
ISBN: 8413661161
Category : Computers
Languages : es
Pages : 348

Get Book Here

Book Description
La ciberseguridad es uno de los desafíos más importantes de la era digital, pues se trata de un punto crítico en cualquier entorno tecnológico. Debido a que los entornos son cada vez más dinámicos y cambiantes, es necesario estar actualizado ante nuevas amenazas y vulnerabilidades que aparecen cada día. Por ello, las organizaciones han empezado a destinar una parte de su presupuesto a protegerse frente a los principales riesgos que se pueden encontrar en internet. El objetivo de este libro es dar a conocer las técnicas y herramientas en diferentes campos de la cibersegu¬ridad, aportando los conocimientos necesarios para desarrollar, evaluar y auditar la se¬guridad de los sistemas informáticos, en general, y aplicaciones, en particular. Utilizando un enfoque teórico-práctico, se guía al lector para obtener una visión global del estado de la ciberseguridad en campos como la seguridad en la nube, la privacidad y seguridad en Internet, la seguridad en aplicaciones web, el desarrollo seguro de apli¬caciones, el hacking ético y herramientas de análisis de red, la obtención de informa¬ción de fuentes abiertas utilizando herramientas OSINT y las funciones de los centros de operaciones de seguridad. El autor, José Manuel Ortega Candel, es ingeniero de software e investigador de seguri¬dad apasionado por las nuevas tecnologías, open source, seguridad y testing. Ha impar¬tido formación a nivel universitario y ha colaborado con la escuela oficial de ingenieros informáticos. Algunas de las conferencias que ha impartido a nivel nacional e interna¬cional están relacionadas con python, seguridad, docker y devops y se pueden visuali¬zar en su sitio personal http://jmortega.github.io.

The Hacker Playbook

The Hacker Playbook PDF Author: Peter Kim
Publisher: Createspace Independent Pub
ISBN: 9781494932633
Category : Computers
Languages : en
Pages : 276

Get Book Here

Book Description
Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software. From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library—so there's no reason not to get in the game.

Introduction to Computer Networks and Cybersecurity

Introduction to Computer Networks and Cybersecurity PDF Author: Chwan-Hwa (John) Wu
Publisher: CRC Press
ISBN: 1498760139
Category : Computers
Languages : en
Pages : 1960

Get Book Here

Book Description
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effective

Computer Security

Computer Security PDF Author: William Stallings
Publisher: Pearson Higher Ed
ISBN: 0133072630
Category : Computers
Languages : en
Pages : 817

Get Book Here

Book Description
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security. In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. The Text and Academic Authors Association named Computer Security: Principles and Practice, 1e, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.

The Hacker Playbook 2

The Hacker Playbook 2 PDF Author: Peter Kim
Publisher: Createspace Independent Publishing Platform
ISBN: 9781512214567
Category : Computer crimes
Languages : en
Pages : 0

Get Book Here

Book Description
Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing-including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. From "Pregame" research to "The Drive" and "The Lateral Pass," the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code. Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library-so there's no reason not to get in the game.

Developments and Advances in Defense and Security

Developments and Advances in Defense and Security PDF Author: Álvaro Rocha
Publisher: Springer
ISBN: 3319786059
Category : Technology & Engineering
Languages : en
Pages : 415

Get Book Here

Book Description
This book includes a selection of articles from The 2018 Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS’18), held in Salinas, Peninsula de Santa Elena, Ecuador, from April 18 to 20, 2018. MICRADS is an international forum for researchers and practitioners to present and discuss the most recent innovations, trends, results, experiences and concerns in the various areas of defense and security, together with their technological development and applications. The main topics covered are: Information and Communication Technology in Education; Computer Vision in Military Applications; Engineering Analysis and Signal Processing; Cybersecurity and Cyberdefense; Maritime Security and Safety; Strategy, Geopolitics and Oceanopolitics; Defense planning; Leadership (e-leadership); Defense Economics; Defense Logistics; Health Informatics in Military Applications; Simulation in Military Applications; Computer Networks, Mobility and Pervasive Systems; Military Marketing; Military Physical Training; Assistive Devices and Wearable Technology; Naval and Military Engineering; Weapons and Combat Systems; Operational Oceanography. The book is aimed at all those dealing with defense and security issues, including practitioners, researchers and teachers as well as undergraduate, graduate, master’s and doctorate students.

Penetration Testing

Penetration Testing PDF Author: Georgia Weidman
Publisher: No Starch Press
ISBN: 1593275641
Category : Computers
Languages : en
Pages : 531

Get Book Here

Book Description
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. Learn how to: –Crack passwords and wireless network keys with brute-forcing and wordlists –Test web applications for vulnerabilities –Use the Metasploit Framework to launch exploits and write your own Metasploit modules –Automate social-engineering attacks –Bypass antivirus software –Turn access to one machine into total control of the enterprise in the post exploitation phase You’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework. With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.

IT Control Objectives for Sarbanes-Oxley

IT Control Objectives for Sarbanes-Oxley PDF Author: IT Governance Institute
Publisher: ISACA
ISBN: 1933284765
Category : Business & Economics
Languages : en
Pages : 128

Get Book Here

Book Description


Mastering Python for Networking and Security

Mastering Python for Networking and Security PDF Author: José Ortega
Publisher: Packt Publishing Ltd
ISBN: 1839216212
Category : Computers
Languages : en
Pages : 539

Get Book Here

Book Description
Tackle security and networking issues using Python libraries such as Nmap, requests, asyncio, and scapy Key Features Enhance your Python programming skills in securing systems and executing networking tasks Explore Python scripts to debug and secure complex networks Learn to avoid common cyber events with modern Python scripting Book DescriptionIt’s now more apparent than ever that security is a critical aspect of IT infrastructure, and that devastating data breaches can occur from simple network line hacks. As shown in this book, combining the latest version of Python with an increased focus on network security can help you to level up your defenses against cyber attacks and cyber threats. Python is being used for increasingly advanced tasks, with the latest update introducing new libraries and packages featured in the Python 3.7.4 recommended version. Moreover, most scripts are compatible with the latest versions of Python and can also be executed in a virtual environment. This book will guide you through using these updated packages to build a secure network with the help of Python scripting. You’ll cover a range of topics, from building a network to the procedures you need to follow to secure it. Starting by exploring different packages and libraries, you’ll learn about various ways to build a network and connect with the Tor network through Python scripting. You will also learn how to assess a network's vulnerabilities using Python security scripting. Later, you’ll learn how to achieve endpoint protection by leveraging Python packages, along with writing forensic scripts. By the end of this Python book, you’ll be able to use Python to build secure apps using cryptography and steganography techniques.What you will learn Create scripts in Python to automate security and pentesting tasks Explore Python programming tools that are used in network security processes Automate tasks such as analyzing and extracting information from servers Understand how to detect server vulnerabilities and analyze security modules Discover ways to connect to and get information from the Tor network Focus on how to extract information with Python forensics tools Who this book is for This Python network security book is for network engineers, system administrators, or any security professional looking to overcome networking and security challenges. You will also find this book useful if you’re a programmer with prior experience in Python. A basic understanding of general programming structures and the Python programming language is required before getting started.

Drones

Drones PDF Author: George Dekoulis
Publisher: BoD – Books on Demand
ISBN: 1789232848
Category : Technology & Engineering
Languages : en
Pages : 160

Get Book Here

Book Description
Drone technologies have constantly been developing for over 100 years. The latest models exhibit a previously unseen set of specifications available to the end users. The collective effort of distinguished international researchers, within the field of drone technologies, has been incorporated into this textbook suitable to the broader audience. The book has been edited by Prof. George Dekoulis, Aerospace Engineering Institute (AEI), Cyprus, an expert on state-of-the-art implementations of reconfigurable space engineering systems. The book consists of four main sections, namely, "Introduction," "Drone History," "Drone Design," and "Drone Applications." We hope this book will be beneficial to professionals, researchers, and academicians and, moreover, to inspire the younger generations into pursuing relevant academic studies and professional careers within the drone industry.