Practical Cryptography in PythonDevelop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly.
Cryptography is the lifeblood of the digital world's security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand.
Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience w ...
Hands-on Azure BoardsUnderstand and explore the features and management of Azure Boards with this book, which also covers Azure Boards configuration and advanced administration. This book starts by setting up projects with Azure DevOps and gives an overview of Azure Boards and its features. You will then learn to set up team projects and how to effectively use Azure Boards to plan and execute work.
Hands-on Azure Boards explains customizations, where you will understand the available options to track your work considering different scenarios. Next, you will learn visualizing with queries, charts, and dashboards along with reporting of Azure Boards. The author gives you hands-on lessons to set up Azure Boards and shows you how to handle multiple modules that are taken care of by different teams.
You will also explore the security options in Azure Boards as well as a detailed demonstration of working with the REST API and CLI. Finally, you will work with useful extensions for Azure Boards and see how t ...
The IoT Hacker's HandbookTake a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.
You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.
As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.
Perform a threat model of a real-world IoT device and locate all possible attacker entry points; Use reverse engineering of firmware binaries to identify securi ...
Exam Ref AZ-900 Microsoft Azure FundamentalsPrepare for Microsoft Exam AZ-900 - and help demonstrate your real-world mastery of cloud services and how they can be provided with Microsoft Azure. Designed for professionals in any non-technical or technical role, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Fundamentals level.
Focus on the expertise measured by these objectives: Understand cloud concepts; Understand core Azure services; Understand security, privacy, compliance, and trust; Understand Azure pricing and support.
Exam AZ-900 focuses on knowledge needed to evaluate cloud service's value; explain IaaS, PaaS, and SaaS; compare public, private, and hybrid cloud models; understand core Azure architectural components, products, and management tools; describe the Azure Marketplace, its usage, and key solutions; understand Azure security, identity services, and monitoring; manage privacy, compliance, and data protection; price subscriptions and manage ...
Exam Ref AZ-103 Microsoft Azure AdministratorPrepare for Microsoft Exam AZ-103 - and help demonstrate your real-world mastery of deploying and managing infrastructure in Microsoft Azure cloud environments. Designed for experienced cloud professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Associate level.
Focus on the expertise measured by these objectives: Manage Azure subscriptions and resources; Implement and manage storage; Deploy and manage virtual machines (VMs); Configure and manage virtual networks; Manage identities.
Exam AZ-103 focuses on skills and knowledge needed to manage Azure subscriptions; analyze resource utilization and consumption; manage resource groups; establish storage accounts; import/export data; configure Azure files; implement backup; create, configure, and automate VM deployment; manage VMs and VM backups; implement, manage, and connect virtual networks; configure name resolution; create an ...
Modernizing the Datacenter with Windows Server and Hybrid CloudTransform your datacenter for breakthrough flexibility, agility, and scalability!
Using public, private, and hybrid cloud services, you can transform your datacenter to serve fast-changing workloads, process and analyze enormous amounts of data, and achieve unprecedented flexibility and value. In this guide, two world-renowned experts in Microsoft datacenter technology show how to effectively leverage current legacy systems as you incorporate your optimal mix of cloud services. Drawing on extensive experience implementing Microsoft cloud solutions, they walk you step-by-step through your entire transition: strategy, deployment, security, identity protection, management, PowerShell automation, and more. Two concluding chapters offer indispensable advice for maximizing datacenter efficiency and supporting future innovation.
Two leading enterprise cloud and Windows Server experts show how to: Move from legacy IT models to an agile service structure; Implement managed self-service, ...
Exam Ref MD-100 Windows 10Prepare for Microsoft Exam MD-100: Windows 10 - and help demonstrate your real-world mastery of skills and knowledge required to deploy, configure, secure, manage, and monitor Windows devices and client applications. Designed for Windows administrators, Exam Ref MD-100: Windows 10 focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Associate level.
Focus on the expertise measured by these objectives: Deploy Windows; Manage devices and data; Configure connectivity; Maintain Windows.
Exam MD-100: Windows 10 focuses on knowledge needed to deploy Windows; perform post-installation configuration; manage local users, local groups, and devices; configure data access and protection; configure devices with local policies; manage Windows security; configure networking; configure remote connectivity; configure system and data recovery; manage updates; and monitor and manage Windows. ...
Rootkits and BootkitsRootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine's boot process or UEFI firmware.
With the aid of numerous case studies and professional research from three of the world's leading security experts, you'll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software.
As you inspect and dissect real malware, you'll learn: How Windows boots - including 32-bit, 64-bit, and UEFI mode - and where to find vulnerabilities; The details of boot process security mechanisms like Secure Boot, including an overview of Virtual Secure Mode (VSM) and Device Guard; Reverse engineering and forensic techniques for analyzing real malware, including bootkits like Rovnix/Carberp, Gapz, TDL4, and the infamous rootkits TDL3 and Festi; How to perform static and dynamic analysis using emulation and tools like Bochs ...
Real-World Bug HuntingLearn how people break websites and how you can, too. Real-World Bug Hunting is the premier field guide to finding software bugs. Whether you're a cyber-security beginner who wants to make the internet safer or a seasoned developer who wants to write secure code, ethical hacker Peter Yaworski will show you how it's done.
You'll learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery. Using real-life case studies of rewarded vulnerabilities from applications like Twitter, Facebook, Google, and Uber, you'll see how hackers manage to invoke race conditions while transferring money, use URL parameter to cause users to like unintended tweets, and more.
Each chapter introduces a vulnerability type accompanied by a series of actual reported bug bounties. The book's collection of tales from the field will teach you how attackers trick users into giving away their sensitive information and how sites may reveal ...
The Secret Life of ProgramsMany coders are unfamiliar with the underlying technologies that make their programs run. But why should you care when your code appears to work? Because you want it to run well and not be riddled with hard-to-find bugs. You don't want to be in the news because your code had a security problem.
Lots of technical detail is available online but it's not organized or collected into a convenient place. In The Secret Life of Programs, veteran engineer Jonathan E. Steinhart explores - in depth - the foundational concepts that underlie the machine. Subjects like computer hardware, how software behaves on hardware, as well as how people have solved problems using technology over time.
You'll learn: How the real world is converted into a form that computers understand, like bits, logic, numbers, text, and colors; The fundamental building blocks that make up a computer including logic gates, adders, decoders, registers, and memory; Why designing programs to match computer hardware, especia ...