Mobile Security


Book Description

Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.




Mobile Security: How to secure, privatize and recover your devices


Book Description

Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online




Learning Puppet Security


Book Description

If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.




Learning iOS Security


Book Description

This book is intended for mobile security professionals who want to learn how to secure iOS operating systems and its applications. Any knowledge of iOS architecture would be an added advantage.




Learning AirWatch


Book Description

If you are a technical professional who wants to dive deeper into the functionality offered by AirWatch or manage the solution, then this book will help you choose the best set of configuration, device management, and monitoring options that you can use to effectively manage your EMM implementation.




Selected Readings in Cybersecurity


Book Description

This collection of papers highlights the current state of the art of cybersecurity. It is divided into five major sections: humans and information security; security systems design and development; security systems management and testing; applications of information security technologies; and outstanding cybersecurity technology development trends. This book will mainly appeal to practitioners in the cybersecurity industry and college faculty and students in the disciplines of cybersecurity, information systems, information technology, and computer science.




Meeting Security Challenges Through Data Analytics and Decision Support


Book Description

The sheer quantity of widely diverse data which now results from multiple sources presents a problem for decision-makers and analysts, who are finding it impossible to cope with the ever-increasing flow of material. This has potentially serious consequences for the quality of decisions and operational processes in areas such as counterterrorism and security. This book presents the papers delivered at the NATO Advanced Research Workshop (ARW) 'Meeting Security Challenges through Data Analytics and Decision Support’, held in Aghveran, Armenia, in June 2015. The aim of the conference was to promote and enhance cooperation and dialogue between NATO and Partner countries on the subject of effective decision support for security applications. The attendance of many leading scientists from a variety of backgrounds and disciplines provided the opportunity to improve mutual understanding, as well as cognizance of the specific requirements and issues of Cyber Physical Social Systems (CPPS) and the technical advances pertinent to all collaborative human-centric information support systems in a variety of applications. The book is divided into 3 sections: counter terrorism: methodology and applications; maritime and border security; and cyber security, and will be of interest to all those involved in decision-making processes based on the analysis of big data.




Mastering Windows Security and Hardening


Book Description

Enhance Windows security and protect your systems and servers from various cyber attacks Key Features Book DescriptionAre you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.What you will learn Understand baselining and learn the best practices for building a baseline Get to grips with identity management and access management on Windows-based systems Delve into the device administration and remote management of Windows-based systems Explore security tips to harden your Windows server and keep clients secure Audit, assess, and test to ensure controls are successfully applied and enforced Monitor and report activities to stay on top of vulnerabilities Who this book is for This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. A basic understanding of Windows security concepts, Intune, Configuration Manager, Windows PowerShell, and Microsoft Azure will help you get the best out of this book.




Mastering Linux Security and Hardening


Book Description

A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a system that reduces the risk of being hacked Explore a variety of advanced Linux security techniques with the help of hands-on labs Master the art of securing a Linux environment with this end-to-end practical guide Book DescriptionFrom creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades. However, security has always been a major concern. With limited resources available in the Linux security domain, this book will be an invaluable guide in helping you get your Linux systems properly secured. Complete with in-depth explanations of essential concepts, practical examples, and self-assessment questions, this book begins by helping you set up a practice lab environment and takes you through the core functionalities of securing Linux. You'll practice various Linux hardening techniques and advance to setting up a locked-down Linux server. As you progress, you will also learn how to create user accounts with appropriate privilege levels, protect sensitive data by setting permissions and encryption, and configure a firewall. The book will help you set up mandatory access control, system auditing, security profiles, and kernel hardening, and finally cover best practices and troubleshooting techniques to secure your Linux environment efficiently. By the end of this Linux security book, you will be able to confidently set up a Linux server that will be much harder for malicious actors to compromise.What you will learn Create locked-down user accounts with strong passwords Configure firewalls with iptables, UFW, nftables, and firewalld Protect your data with different encryption technologies Harden the secure shell service to prevent security break-ins Use mandatory access control to protect against system exploits Harden kernel parameters and set up a kernel-level auditing system Apply OpenSCAP security profiles and set up intrusion detection Configure securely the GRUB 2 bootloader and BIOS/UEFI Who this book is for This book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.




Web Security, Privacy & Commerce


Book Description

"Web Security, Privacy & Commerce" cuts through the hype and the front page stories. It tells readers what the real risks are and explains how to minimize them. Whether a casual (but concerned) Web surfer or a system administrator responsible for the security of a critical Web server, this book will tells users what they need to know.