IT eBooks
Download, Read, Use
Foundations of Blockchain
Foundations of Blockchain

Blockchain technology is a combination of three popular concepts: cryptography, peer-to-peer networking, and game theory. This book is for anyone who wants to dive into blockchain from first principles and learn how decentralized applications and cryptocurrencies really work. This book begins with an overview of blockchain technology, including key definitions, its purposes and characteristics, so you can assess the full potential of blockchain. All essential aspects of cryptography are then presented, as the backbone of blockchain. For readers who want to study the underlying algorithms of blockchain, you'll see Python implementations throughout. You'll then learn how blockchain architecture can create decentralized applications. You'll see how blockchain achieves decentralization through peer-to-peer networking, and how a simple blockchain can be built in a P2P network. You'll learn how these elements can implement a cryptocurrency such as Bitcoin, and the wider applications of ...
Becoming the Hacker
Becoming the Hacker

Becoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a c ...
Secure by Design
Secure by Design

Secure by Design teaches developers how to use design to drive security in software development. This book is full of patterns, best practices, and mindsets that you can directly apply to your real world development. You'll also learn to spot weaknesses in legacy code and how to address them. Security should be the natural outcome of your development process. As applications increase in complexity, it becomes more important to bake security-mindedness into every step. The secure-by-design approach teaches best practices to implement essential software features using design as the primary driver for security. Secure by Design teaches you principles and best practices for writing highly secure software. At the code level, you'll discover security-promoting constructs like safe error handling, secure validation, and domain primitives. You'll also master security-centric techniques you can apply throughout your build-test-deploy pipeline, including the unique concerns of modern micro ...
Deploying SharePoint 2019
Deploying SharePoint 2019

Update to a version of SharePoint that offers the best of both on-premise and the cloud using SharePoint 2019, the latest release of this cornerstone technology from Microsoft. Don your technical learning hat to get up close and confident on the new time-saving modern features of on-premise, and the many new security and hybrid settings. Deploying SharePoint 2019 begins with a general introduction to SharePoint 2019, covering new features and expanding your knowledge and capability with the technology systematically. You will learn about the new world of SharePoint, and how it was “cloud-born” from Office 365. From there you will dive into learning how to design a physical architecture for SharePoint Server 2019 and get familiar with the key concepts of high availability (HA) and disaster recovery (DR) solutions. Install, configure, and optimize SharePoint 2019; Understand SharePoint 2019 as a hybrid framework; Get comfortable with new tools, such as Flow, PowerApps, and Powe ...
Black Hat Go
Black Hat Go

Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll Learn how to: Make performant tools that can be used for your own securit ...
Salesforce Platform App Builder Certification
Salesforce Platform App Builder Certification

New or intermediate developers will want to use this hands-on guide to prepare for the Salesforce Certified Platform App Builder credential, awarded for designing, building, and implementing applications using the declarative customization capabilities of the Salesforce Platform. This is the first book available covering this content, and Salesforce training is very costly. This book is filled with real-world examples and hands-on exercises, enabling you to prepare for the certification exam in a short span of time. Multiple-choice study questions and exercises are included to help you apply what you learn in each chapter. Author Rakesh Gupta explains Salesforce Platform fundamentals, including knowledge about the limitations of the declarative platform and when to use programmatic development versus the AppExchange. Data management and data analytics are covered. And you will learn how to set up organization-wide features that affect the look and feel of your application. San ...
Identity Attack Vectors
Identity Attack Vectors

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives. As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Managing accounts, credentials, roles, certification, and attestation reporting for all resources is now a security and compliance mandate. When identity theft and poor identity management is leveraged as an attack vector, risk and vulnerabilities increase exponentially. As cyber attacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities, to conduct their malicious activities through privileged ...
Jumpstart Snowflake
Jumpstart Snowflake

Explore the modern market of data analytics platforms and the benefits of using Snowflake computing, the data warehouse built for the cloud. With the rise of cloud technologies, organizations prefer to deploy their analytics using cloud providers such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform. Cloud vendors are offering modern data platforms for building cloud analytics solutions to collect data and consolidate into single storage solutions that provide insights for business users. The core of any analytics framework is the data warehouse, and previously customers did not have many choices of platform to use. Snowflake was built specifically for the cloud and it is a true game changer for the analytics market. This book will help onboard you to Snowflake, present best practices to deploy, and use the Snowflake data warehouse. In addition, it covers modern analytics architecture and use cases. It provides use cases of integration with leading analytic ...
Cyber Warfare - Truth, Tactics, and Strategies
Cyber Warfare - Truth, Tactics, and Strategies

The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare – Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geogra ...
The Pragmatic Programmer, 20th Anniversary Edition
The Pragmatic Programmer, 20th Anniversary Edition

For twenty years, the lessons from The Pragmatic Programmer have helped a generation of programmers examine the very essence of software development, independent of any particular language, framework, or methodology. This classic title is regularly featured on "Top Ten" lists, and many corporations issue it to their new hires. This new 20th Anniversary Edition offers a fresh look at the modern development landscape, cutting through the "business as usual" and tired advice from the net to help guide you through the next twenty years and beyond. Featuring new tips, new topics, and revisions throughout, you don't want to miss this one. Andy and Dave wrote this influential, classic book to help their clients create better software and rediscover the joy of coding. Almost twenty years later, its advice is still spot on, and the Pragmatic philosophy has spawned hundreds of books, screencasts, and audio books, as well as thousands of careers and success stories. This new edition exam ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025