Narrow your search

Library

ULB (13)

KU Leuven (12)

Thomas More Mechelen (12)

UCLL (12)

ULiège (12)

VIVES (12)

KDG (11)

AP (10)

Odisee (9)

Thomas More Kempen (9)

More...

Resource type

book (13)

digital (10)


Language

English (13)


Year
From To Submit

2019 (1)

2018 (3)

2016 (4)

2014 (4)

2001 (1)

Listing 1 - 10 of 13 << page
of 2
>>
Sort by

Book
Cyber Operations
Authors: ---
ISBN: 9781484242940 1484242947 Year: 2019 Publisher: Berkeley, CA Apress :Imprint: Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will end by building your own web applications servers, including WordPress and Joomla!. Systems from 2011 through 2017 are covered, including Windows 7, Windows 8, Windows 10, Windows Server 2012, and Windows Server 2016 as well as a range of Linux distributions, including Ubuntu, CentOS, Mint, and OpenSUSE. Key defensive techniques are integrated throughout and you will develop situational awareness of your network and build a complete defensive infrastructure, including log servers, network firewalls, web application firewalls, and intrusion detection systems. Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways. You will learn about Metasploit, browser attacks, privilege escalation, pass-the-hash attacks, malware, man-in-the-middle attacks, database attacks, and web application attacks. What You’ll Learn Construct a testing laboratory to experiment with software and attack techniques Build realistic networks that include active directory, file servers, databases, web servers, and web applications such as WordPress and Joomla! Manage networks remotely with tools, including PowerShell, WMI, and WinRM Use offensive tools such as Metasploit, Mimikatz, Veil, Burp Suite, and John the Ripper Exploit networks starting from malware and initial intrusion to privilege escalation through password cracking and persistence mechanisms Defend networks by developing operational awareness using auditd and Sysmon to analyze logs, and deploying defensive tools such as the Snort intrusion detection system, IPFire firewalls, and ModSecurity web application firewalls.


Multi
Oracle Enterprise Manager 12c Command-Line Interface
Authors: --- ---
ISBN: 9781484202388 1484202384 Year: 2014 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Oracle Enterprise Manager 12c Command-Line Interface shows how to use Enterprise Manager’s powerful scripting language to automate your database administration work and save time by scripting routine tasks, and then executing those scripts across collections of databases and instances in your environment. This book is chock full of ready-made scripting examples contributed by the authors and leading members of the community. For example, you'll find scripts and examples of commands to: Remove an Enterprise Manager agent and its related targets Quickly create administrator accounts that are fully-configured with pre-expired passwords and all needed roles Invoke batch files to execute sequences of related commands with consistency against multiple targets Batch create large groups of user logins with a single command and more! The Enterprise Manager Command Line Interface (EM CLI) is the administrator's key to unlocking the power of Enterprise Manager 12c (EM12c) with scalability, repeatability, and confidence. In previous versions, most administrators ventured into the command-line interface only with the assistance of Oracle Support. But now there are many features in EM12c that are accessible only from the command-line. This is far from a disadvantage! Enterprise Manager is now a powerful tool for automation in the hands of a skilled database administrator. Enterprise Manager scripting offers potential for all administrators who manage Oracle’s enterprise-level products in their environment. You can automate from the smallest, single-instance configuration all the way up to a broadly distributed enterprise-level rollout having database instances strewn across broad geographical distributions. The power of the EM CLI returns the administrator to the golden age, where the entire environment, from database to application to infrastructure, can often be managed from this powerful command line tool secured by the robust Enterprise Manager framework. Brings a golden-age of automation to Oracle Database administrators Provides ready-made scripts contributed by leading members of the community Covers advanced techniques involving Jython and Python.


Multi
Firewalls Don't Stop Dragons : A Step-by-Step Guide to Computer Security for Non-Techies
Author:
ISBN: 9781484238523 1484238524 Year: 2018 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data—just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes: Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra Expanded coverage on mobile device safety Expanded coverage on safety for kids online More than 150 tips with complete step-by-step instructions and pictures What You’ll Learn: Solve your password problems once and for all Browse the web safely and with confidence Block online tracking and dangerous ads Choose the right antivirus software for you Send files and messages securely Set up secure home networking Conduct secure shopping and banking online Lock down social media accounts Create automated backups of all your devices Manage your home computers Use your smartphone and tablet safely Safeguard your kids online And more!


Multi
Privileged Attack Vectors : Building Effective Cyber-Defense Strategies to Protect Organizations
Authors: ---
ISBN: 9781484230480 1484230485 Year: 2018 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today’s environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. There is no one silver bullet to provide the protection you need against all vectors and stages of an attack. And while some new and innovative solutions will help protect against or detect the initial infection, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. What You’ll Learn: Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and auditing strategies to mitigate the threats and risk Understand a 12-step privileged access management Implementation plan Consider deployment and scope, including risk, auditing, regulations, and oversight solutions.


Multi
PHP for Absolute Beginners
Authors: ---
ISBN: 9781430268147 143026814X Year: 2014 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

PHP is a server-side scripting language that enables you to develop dynamic sites that engage users in ways that are simply not possible using only HTML and CSS. PHP for Absolute Beginners takes a practical approach to teaching you how to build dynamic content for your website using PHP. You’ll quickly get started with practical PHP projects, learning how to build a dynamic image gallery. By the end of the book you’ll will have developed a personal blog complete with a password protected admin module. PHP for Absolute Beginners won't swamp you with every detail of the full PHP language up front – instead, you’ll be introduced to a small, versatile subset of PHP and learn to use it creatively to develop dynamic web sites. In the process you will learn to use variables, control structures, functions, and objects to your advantage. You will learn how to plan and create databases and how to organize your PHP scripts beautifully. At the end of the book, you will be a confident PHP user, ready to take the next steps in creating great websites.


Multi
Dynamic secrets in communication security
Authors: --- ---
ISBN: 9781461478317 1461478316 Year: 2014 Publisher: New York : Springer Science,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user’s password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.


Multi
Securing PHP Apps
Author:
ISBN: 9781484221204 1484221206 Year: 2016 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is a quick read, at just over 100 pages. This is a handbook style guide to specific items you can act on. Is your PHP app truly secure? Let's make sure you get home on time and sleep well at night. Learn the security basics that a senior developer usually acquires over years of experience, all condensed down into one quick and easy handbook. Do you ever wonder how vulnerable you are to being hacked? Do you feel confident about storing your users sensitive information? Imagine feeling confident in the integrity of your software when you store your user's sensitive data. No more fighting fires with lost data, no more late nights, your application is secure. In this short book I'll give you clear, actionable details on how to secure various parts of your web application. You will also find scenarios to handle and improve existing legacy issues. What you'll learn Never trust your users - escape all input HTTPS/SSL/BCA/JWH/SHA and other random letters, some of them actually matter Password Encryption and Storage for Everyone Authentication, Access Control, and Safe File Handing Safe Defaults, Cross Site Scripting and other Popular Hacks.


Multi
IT Security Risk Control Management : An Audit Preparation Plan
Author:
ISBN: 9781484221402 1484221400 Year: 2016 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. IT Security Risk Control Management provides step-by-step guidance for IT professionals on how to craft a successful security program. Readers will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes, including: Building a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constant changing threats Preparing for and passing such common audits as PCI-DSS, SSAE-16, and ISO 27001. Calibrating the scope, and customizing security controls to fit into an organization’s culture. Implementing the most challenging processes, pointing out common pitfalls and distractions. Framing security and risk issues to be clear and actionable so that decision makers, technical personnel, and users will listen and value your advice. With IT Security Risk Control Management, you will be able to construct an information security program, from inception to audit, with enduring, practical, hands-on advice, and actionable strategies for IT professionals.


Multi
From Hacking to Report Writing : An Introduction to Security and Penetration Testing
Author:
ISBN: 9781484222836 Year: 2016 Publisher: Berkeley, CA Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Learn everything you need to know to become a professional security and penetration tester. You will learn how to easily find vulnerabilities and misconfigurations as each step of the process is broken down and simplified. You also will learn how to methodically locate, exploit, and professionally report security weaknesses using techniques such as SQL-injection, denial-of-service attacks, and password hacking. From Hacking to Report Writing gives you the technical know-how you need to carry out advanced security tests and also provides insight into crafting professional reports that describe your work and how your customers can benefit from it. The book gives you the tools you need to clearly communicate the benefits of high-quality security and penetration testing to IT management, executives, and other stakeholders. We live in a time where computer security is more important than ever. Staying one step ahead of hackers has never been a bigger challenge. From Hacking to Report Writing clarifies how you can sleep better at night knowing that your systems have been thoroughly tested for security weaknesses. On-the-job stories are included to show you how to apply what you have learned to real-world situations. With this book you will know: • Why security and penetration testing is important • How to find vulnerabilities in any system using the same tools and techniques used by hackers • How to write professional reports • Which security and penetration testing method to apply for any given situation • How to successfully hold together a security and penetration test project.

Hacking exposed: network security: secrets & solutions
Authors: --- ---
ISBN: 0072127481 Year: 2001 Publisher: Berkeley, Calif. Osborne/McGraw-Hill

Loading...
Export citation

Choose an application

Bookmark

Abstract

All-new Windows footprinting and scanning tools and techniques&#13;&#13;NetBIOS, MSRPC, SMB, DNS, SNMP, and Active Directory enumeration protection&#13;&#13;Updated exploits of Windows-specific services, including the MSRPC interface vulnerability that led to the Blaster worm, SQL, Slammer, and eavesdropping attacks on Kerberos&#13;&#13;Details on the new ISS6 security architecture, URLScan, Microsoft Web services source code disclosures exploits, and HTR chunked encoding exploits&#13;&#13;All-new terminal services information including new password guessing, privellege escalation, and eavesdropping countermeasures&#13;&#13;New client-side exploits using popular multimedia file formats, and strong new countermeasures using Internet Explorer Enhanced Security Configuration&#13;&#13;The latest countermeasures for Denial of Services (DOS) attacks including bogon filtering and sink holes&#13;&#13;New security features such as Internet Connection Firewall, software restriction policies, and updates to IPSec&#13;&#13;

Listing 1 - 10 of 13 << page
of 2
>>
Sort by