Blockchain Basics: A Non-Technical Introduction in 25 Steps

Blockchain Basics: A Non-Technical Introduction in 25 Steps

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.What You'll LearnWhat the blockchain isWhy it is needed and what problem it solvesWhy there is so much excitement about the blockchain and its potentialMajor components and their purposeHow various components of the blockchain work and interactLimitations, why they exist, and what has been done to overcome themMajor application scenariosWho This Book Is For Everyone who wants to get a general idea of what blockchain technology is, how it works, and how it will potentially change the financial system as we know it

  • ASIN: B06XNWF5GP
  • Manufacturer: Apress

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases.Key defensive techniques are integrated throughout the exposition. You will develop situational awareness of your network and will build a complete defensive infrastructure—including log servers, network firewalls, web application firewalls, and intrusion detection systems.Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways beginning with elementary attacks against browsers through privilege escalation to a domain administrator, or attacks against simple network servers through the compromise of a defended e-commerce site.The author, who has coached his university’s cyber defense team three times to the finals of the National Collegiate Cyber Defense Competition, provides a practical, hands-on approach to cyber security. What you’ll learnHow to securely set up a complete network, from its infrastructure through web applicationsHow to integrate defensive technologies such as firewalls and intrusion detection systems into your networkHow to attack your network with tools like Kali Linux, Metasploit, and Burp SuiteHow to gain situational awareness on your network to detect and prevent such attacksWho this book is for This book is for beginning and intermediate professionals in cyber security who want to learn more about building, defending, and attacking computer networks. It is also suitable for use as a textbook and supplementary text for hands-on courses i... [Read More]

  • ASIN: 1484204581
  • ISBN: 1484204581
  • Manufacturer: Apress

Real World Microsoft Access Database Protection and Security

Real World Microsoft Access Database Protection and Security

Security issues for all versions of Access from 97 to 2003 are discussed and the merits of each security approach from both the perspective of the developer and the database administrator/manager are examined.

  • UPC: 689253152676
  • ASIN: 1590591267
  • ISBN: 1590591267
  • Manufacturer: Apress

Pro Apache (Expert's Voice)

Pro Apache (Expert's Voice)

* The Definitive Guide to Apache, Third Edition is a new revision of Peter Wainwright’s best-selling (actually, the highest-selling) book on Apache configuration and administration. * Provides multiple methods and examples of how to solve a particular problem; compares and contrasts the methods rather than recommending a single, "best" solution. * Demonstrates how to use many of the most-popular scripting languages such as PHP, Perl, and Python to create dynamic web sites.

  • UPC: 689253150061
  • ASIN: 1590593006
  • ISBN: 1590593006
  • Brand: Brand: Apress
  • Manufacturer: Apress

Securing Office 365: Masterminding MDM and Compliance in the Cloud

Securing Office 365: Masterminding MDM and Compliance in the Cloud

Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.Data breaches, compliance fines, and distribution of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today’s electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365. You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security services in Office 365 to protect and manage your business.What You’ll LearnManage security with the Azure Security Center and the Office 365 Compliance CenterConfigure information protection for document and electronic communicationsMonitor security for your business in the cloudUnderstand Mobile Application Management (MAM) and Mobile Device Management (MDM)Prevent data loss in Office 365Configure and manage the compliance manager tools for NIST and GDPRWho This Book Is ForIT managers and compliance and cybersecurity officers who have responsibility for compliance and data security in their business

  • ASIN: B07N3S2H22
  • Manufacturer: Apress

Pro Oracle Identity and Access Management Suite

Pro Oracle Identity and Access Management Suite

This book presents a process-based approach to implementing Oracle’s Identity and Access Management Suite. Learn everything from basic installation through to advanced topics such as leveraging Oracle Virtual Directory and Identity Federation. Also covered is integrating with applications such as Oracle E-Business Suite and WebCenter Content. Pro Oracle Identity and Access Management Suite provides real world implementation examples that make up a valuable resource as you plan and implement the product stack in your own environment. The book and the examples are also useful post-installation as your enterprise begins to explore the capabilities that Identity Management Suite provides.Implementing an identity management system can be a daunting project. There are many aspects that must be considered to ensure the highest availability and high integration value to the enterprise business units. Pro Oracle Identity and Access Management Suite imparts the information needed to leverage Oracle’s Identity and Access Management suite and provide the level of service your organization demands. Show results to leadership by learning from example how to integrate cross-domain authentication using identity federation, how to allow user self-service capabilities across multiple directories with Virtual Directory, and how to perform the many other functions provided by Oracle Identity and Access Management Suite.Presents an example-based installation and configuration of the entire Oracle Identity and Access Management Suite, including high-availability and performance-tuning concepts.Demonstrates Identity Federation, Virtual Directory, Fusion Middleware Integration, and Integration with Oracle Access Manager.Introduces concepts such as Split Profiles for Identity Manager, MultiFactor authentication with Oracle Adaptive Access Manager, and Self Service Portals.

  • ASIN: B01N6FF92N
  • Manufacturer: Apress

ADO Examples and Best Practices

ADO Examples and Best Practices

Visual Basic database developers are faced with a dizzying cornucopia of choices when it comes to data access paradigms. The purpose of this book is to make the choice and implementation of the best of those technologies far easier. It does this through working examples and numerous discussions of what works and what does not. Vaughns "Best Practices" are the techniques that developers need to know because they cause the least amount of overhead, problems and confusion. While some are quite simple to implement, other "Best Practices" require considerable thought and planning. This is a developers bookfull of hints, tips, and notes passed on from those who show the medals and scars of battles won and lost.

  • ASIN: B075FQ4PSY
  • Manufacturer: Apress

Hardening Linux

Hardening Linux

*Imparts good security doctrine, methodology, and strategies *Each application-focused chapter will be able to be used as a stand-alone HOW-TO for that particular application. *Offers users a selection of resources (websites, mailing lists, and books) to further their knowledge.

  • UPC: 689253154441
  • ASIN: 1590594444
  • ISBN: 1590594444
  • Brand: Brand: Apress
  • Manufacturer: Apress

Securing SQL Server: DBAs Defending the Database

Securing SQL Server: DBAs Defending the Database

Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The multi-layered approach in this book helps ensure that a single breach does not lead to loss or compromise of confidential, or business sensitive data.Database professionals in today’s world deal increasingly with repeated data attacks against high-profile organizations and sensitive data. It is more important than ever to keep your company’s data secure. Securing SQL Server demonstrates how developers, administrators and architects can all play their part in the protection of their company’s SQL Server enterprise.This book not only provides a comprehensive guide to implementing the security model in SQL Server, including coverage of technologies such as Always Encrypted, Dynamic Data Masking, and Row Level Security, but also looks at common forms of attack against databases, such as SQL Injection and backup theft, with clear, concise examples of how to implement countermeasures against these specific scenarios. Most importantly, this book gives practical advice and engaging examples of how to defend your data, and ultimately your job, against attack and compromise.What You'll LearnPerform threat analysisImplement access level control and data encryptionAvoid non-reputability by implementing comprehensive auditingUse security metadata to ensure your security policies are enforcedMitigate the risk of credentials being stolenPut countermeasures in place against common forms of attackWho This Book Is ForDatabase administrators who need to understand and counteract the threat of attacks against their company’s data, and useful for SQL developers and architects

  • UPC: 001484241606
  • ASIN: 1484241606
  • ISBN: 1484241606
  • Manufacturer: Apress

Foundations of Security: What Every Programmer Needs to Know (Expert's Voice)

Foundations of Security: What Every Programmer Needs to Know (Expert's Voice)

Software developers need to worry about security as never before. They need clear guidance on safe coding practices, and that’s exactly what this book delivers. The book does not delve deep into theory, or rant about the politics of security. Instead, it clearly and simply lays out the most common threats that programmers need to defend against. It then shows programmers how to make their defense. The book takes a broad focus, ranging over SQL injection, worms and buffer overflows, password security, and more. It sets programmers on the path towards successfully defending against the entire gamut of security threats that they might face.

  • ASIN: 1590597842
  • ISBN: 1590597842
  • Brand: Brand: Apress
  • Manufacturer: Apress