|
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
A comprehensive guide to securing your Linux system against
cyberattacks and intruders Key Features Deliver a system that
reduces the risk of being hacked Explore a variety of advanced
Linux security techniques with the help of hands-on labs Master the
art of securing a Linux environment with this end-to-end practical
guide Book DescriptionFrom creating networks and servers to
automating the entire working environment, Linux has been extremely
popular with system administrators for the last couple of decades.
However, security has always been a major concern. With limited
resources available in the Linux security domain, this book will be
an invaluable guide in helping you get your Linux systems properly
secured. Complete with in-depth explanations of essential concepts,
practical examples, and self-assessment questions, this book begins
by helping you set up a practice lab environment and takes you
through the core functionalities of securing Linux. You'll practice
various Linux hardening techniques and advance to setting up a
locked-down Linux server. As you progress, you will also learn how
to create user accounts with appropriate privilege levels, protect
sensitive data by setting permissions and encryption, and configure
a firewall. The book will help you set up mandatory access control,
system auditing, security profiles, and kernel hardening, and
finally cover best practices and troubleshooting techniques to
secure your Linux environment efficiently. By the end of this Linux
security book, you will be able to confidently set up a Linux
server that will be much harder for malicious actors to compromise.
What you will learn Create locked-down user accounts with strong
passwords Configure firewalls with iptables, UFW, nftables, and
firewalld Protect your data with different encryption technologies
Harden the secure shell service to prevent security break-ins Use
mandatory access control to protect against system exploits Harden
kernel parameters and set up a kernel-level auditing system Apply
OpenSCAP security profiles and set up intrusion detection Configure
securely the GRUB 2 bootloader and BIOS/UEFI Who this book is
forThis book is for Linux administrators, system administrators,
and network engineers interested in securing moderate to complex
Linux environments. Security consultants looking to enhance their
Linux security skills will also find this book useful. Working
experience with the Linux command line and package management is
necessary to understand the concepts covered in this book.
Become well-versed with basic networking concepts such as routing,
switching, and subnetting, and prepare for the Microsoft 98-366
exam Key Features Build a strong foundation in networking concepts
Explore both the hardware and software aspects of networking
Prepare by taking mock tests with up-to-date exam questions Book
DescriptionA network is a collection of computers, servers, mobile
devices, or other computing devices connected for sharing data.
This book will help you become well versed in basic networking
concepts and prepare to pass Microsoft's MTA Networking
Fundamentals Exam 98-366. Following Microsoft's official syllabus,
the book starts by covering network infrastructures to help you
differentiate intranets, internets, and extranets, and learn about
network topologies. You'll then get up to date with common network
hardware devices such as routers and switches and the media types
used to connect them together. As you advance, the book will take
you through different protocols and services and the requirements
to follow a standardized approach to networking. You'll get to
grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The
book also shows you how to recall IP addresses through name
resolution. Finally, you'll be able to practice everything you've
learned and take the exam confidently with the help of mock tests.
By the end of this networking book, you'll have developed a strong
foundation in the essential networking concepts needed to pass Exam
98-366. What you will learnThings you will learn: Become well
versed in networking topologies and concepts Understand network
infrastructures such as intranets, extranets, and more Explore
network switches, routers, and other network hardware devices Get
to grips with different network protocols and models such as OSI
and TCP/IP Work with a variety of network services such as DHCP,
NAT, firewalls, and remote access Apply networking concepts in
different real-world scenarios Who this book is forIf you're new to
the IT industry or simply want to gain a thorough understanding of
networking, this book is for you. A basic understanding of the
Windows operating system and your network environment will be
helpful.
New edition of the bestselling guide to mastering Python
Networking, updated to Python 3 and including the latest on network
data analysis, Cloud Networking, Ansible 2.8, and new libraries Key
Features Explore the power of Python libraries to tackle difficult
network problems efficiently and effectively, including pyATS,
Nornir, and Ansible 2.8 Use Python and Ansible for DevOps, network
device automation, DevOps, and software-defined networking Become
an expert in implementing advanced network-related tasks with
Python 3 Book DescriptionNetworks in your infrastructure set the
foundation for how your application can be deployed, maintained,
and serviced. Python is the ideal language for network engineers to
explore tools that were previously available to systems engineers
and application developers. In Mastering Python Networking, Third
edition, you'll embark on a Python-based journey to transition from
traditional network engineers to network developers ready for the
next-generation of networks. This new edition is completely revised
and updated to work with Python 3. In addition to new chapters on
network data analysis with ELK stack (Elasticsearch, Logstash,
Kibana, and Beats) and Azure Cloud Networking, it includes updates
on using newer libraries such as pyATS and Nornir, as well as
Ansible 2.8. Each chapter is updated with the latest libraries with
working examples to ensure compatibility and understanding of the
concepts. Starting with a basic overview of Python, the book
teaches you how it can interact with both legacy and API-enabled
network devices. You will learn to leverage high-level Python
packages and frameworks to perform network automation tasks,
monitoring, management, and enhanced network security followed by
Azure and AWS Cloud networking. Finally, you will use Jenkins for
continuous integration as well as testing tools to verify your
network. What you will learn Use Python libraries to interact with
your network Integrate Ansible 2.8 using Python to control Cisco,
Juniper, and Arista network devices Leverage existing Flask web
frameworks to construct high-level APIs Learn how to build virtual
networks in the AWS & Azure Cloud Learn how to use Elastic
Stack for network data analysis Understand how Jenkins can be used
to automatically deploy changes in your network Use PyTest and
Unittest for Test-Driven Network Development in networking
engineering with Python Who this book is forMastering Python
Networking, Third edition is for network engineers, developers, and
SREs who want to use Python for network automation,
programmability, and data analysis. Basic familiarity with Python
programming and networking-related concepts such as Transmission
Control Protocol/Internet Protocol (TCP/IP) will be useful.
Understand the constructs of the Python programming language and
use them to build data science projects Key Features Learn the
basics of developing applications with Python and deploy your first
data application Take your first steps in Python programming by
understanding and using data structures, variables, and loops Delve
into Jupyter, NumPy, Pandas, SciPy, and sklearn to explore the data
science ecosystem in Python Book DescriptionPython is the most
widely used programming language for building data science
applications. Complete with step-by-step instructions, this book
contains easy-to-follow tutorials to help you learn Python and
develop real-world data science projects. The "secret sauce" of the
book is its curated list of topics and solutions, put together
using a range of real-world projects, covering initial data
collection, data analysis, and production. This Python book starts
by taking you through the basics of programming, right from
variables and data types to classes and functions. You'll learn how
to write idiomatic code and test and debug it, and discover how you
can create packages or use the range of built-in ones. You'll also
be introduced to the extensive ecosystem of Python data science
packages, including NumPy, Pandas, scikit-learn, Altair, and
Datashader. Furthermore, you'll be able to perform data analysis,
train models, and interpret and communicate the results. Finally,
you'll get to grips with structuring and scheduling scripts using
Luigi and sharing your machine learning models with the world as a
microservice. By the end of the book, you'll have learned not only
how to implement Python in data science projects, but also how to
maintain and design them to meet high programming standards. What
you will learn Code in Python using Jupyter and VS Code Explore the
basics of coding - loops, variables, functions, and classes Deploy
continuous integration with Git, Bash, and DVC Get to grips with
Pandas, NumPy, and scikit-learn Perform data visualization with
Matplotlib, Altair, and Datashader Create a package out of your
code using poetry and test it with PyTest Make your machine
learning model accessible to anyone with the web API Who this book
is forIf you want to learn Python or data science in a fun and
engaging way, this book is for you. You'll also find this book
useful if you're a high school student, researcher, analyst, or
anyone with little or no coding experience with an interest in the
subject and courage to learn, fail, and learn from failing. A basic
understanding of how computers work will be useful.
Over 100 recipes to analyze and troubleshoot network problems using
Wireshark 2 Key Features Place Wireshark 2 in your network and
configure it for effective network analysis Deep dive into the
enhanced functionalities of Wireshark 2 and protect your network
with ease A practical guide with exciting recipes on a widely used
network protocol analyzer Book DescriptionThis book contains
practical recipes on troubleshooting a data communications network.
This second version of the book focuses on Wireshark 2, which has
already gained a lot of traction due to the enhanced features that
it offers to users. The book expands on some of the subjects
explored in the first version, including TCP performance, network
security, Wireless LAN, and how to use Wireshark for cloud and
virtual system monitoring. You will learn how to analyze end-to-end
IPv4 and IPv6 connectivity failures for Unicast and Multicast
traffic using Wireshark. It also includes Wireshark capture files
so that you can practice what you've learned in the book. You will
understand the normal operation of E-mail protocols and learn how
to use Wireshark for basic analysis and troubleshooting. Using
Wireshark, you will be able to resolve and troubleshoot common
applications that are used in an enterprise network, like NetBIOS
and SMB protocols. Finally, you will also be able to measure
network parameters, check for network problems caused by them, and
solve them effectively. By the end of this book, you'll know how to
analyze traffic, find patterns of various offending traffic, and
secure your network from them. What you will learn Configure
Wireshark 2 for effective network analysis and troubleshooting Set
up various display and capture filters Understand networking
layers, including IPv4 and IPv6 analysis Explore performance issues
in TCP/IP Get to know about Wi-Fi testing and how to resolve
problems related to wireless LANs Get information about network
phenomena, events, and errors Locate faults in detecting security
failures and breaches in networks Who this book is forThis book is
for security professionals, network administrators, R&D,
engineering and technical support, and communications managers who
are using Wireshark for network analysis and troubleshooting. It
requires a basic understanding of networking concepts, but does not
require specific and detailed technical knowledge of protocols or
vendor implementations.
Discover network vulnerabilities and threats to design effective
network security strategies Key Features Plunge into scanning
techniques using the most popular tools Effective vulnerability
assessment techniques to safeguard network infrastructure Explore
the Nmap Scripting Engine (NSE) and the features used for port and
vulnerability scanning Book DescriptionNetwork scanning is a
discipline of network security that identifies active hosts on
networks and determining whether there are any vulnerabilities that
could be exploited. Nessus and Nmap are among the top tools that
enable you to scan your network for vulnerabilities and open ports,
which can be used as back doors into a network. Network Scanning
Cookbook contains recipes for configuring these tools in your
infrastructure that get you started with scanning ports, services,
and devices in your network. As you progress through the chapters,
you will learn how to carry out various key scanning tasks, such as
firewall detection, OS detection, and access management, and will
look at problems related to vulnerability scanning and exploitation
in the network. The book also contains recipes for assessing remote
services and the security risks that they bring to a network
infrastructure. By the end of the book, you will be familiar with
industry-grade tools for network scanning, and techniques for
vulnerability scanning and network protection. What you will learn
Install and configure Nmap and Nessus in your network
infrastructure Perform host discovery to identify network devices
Explore best practices for vulnerability scanning and risk
assessment Understand network enumeration with Nessus and Nmap
Carry out configuration audit using Nessus for various platforms
Write custom Nessus and Nmap scripts on your own Who this book is
forIf you're a network engineer or information security
professional wanting to protect your networks and perform advanced
scanning and remediation for your network infrastructure, this book
is for you.
Understand the nitty-gritty of Cybersecurity with ease Key Features
Align your security knowledge with industry leading concepts and
tools Acquire required skills and certifications to survive the
ever changing market needs Learn from industry experts to analyse,
implement, and maintain a robust environment Book DescriptionIt's
not a secret that there is a huge talent gap in the cybersecurity
industry. Everyone is talking about it including the prestigious
Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC
Magazine, among many others. Additionally, Fortune CEO's like Satya
Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along
with organizations like ISSA, research firms like Gartner too shine
light on it from time to time. This book put together all the
possible information with regards to cybersecurity, why you should
choose it, the need for cyber security and how can you be part of
it and fill the cybersecurity talent gap bit by bit. Starting with
the essential understanding of security and its needs, we will move
to security domain changes and how artificial intelligence and
machine learning are helping to secure systems. Later, this book
will walk you through all the skills and tools that everyone who
wants to work as security personal need to be aware of. Then, this
book will teach readers how to think like an attacker and explore
some advanced security methodologies. Lastly, this book will deep
dive into how to build practice labs, explore real-world use cases
and get acquainted with various cybersecurity certifications. By
the end of this book, readers will be well-versed with the security
domain and will be capable of making the right choices in the
cybersecurity field. What you will learn Get an overview of what
cybersecurity is and learn about the various faces of cybersecurity
as well as identify domain that suits you best Plan your transition
into cybersecurity in an efficient and effective way Learn how to
build upon your existing skills and experience in order to prepare
for your career in cybersecurity Who this book is forThis book is
targeted to any IT professional who is looking to venture in to the
world cyber attacks and threats. Anyone with some understanding or
IT infrastructure workflow will benefit from this book.
Cybersecurity experts interested in enhancing their skill set will
also find this book useful.
Discover and implement a system of your choice using Bluetooth Low
Energy. About This Book * Learn the basics of Bluetooth Low Energy
with its exciting new protocol stack and security. * Build
customized Bluetooth Low Energy projects that make your web or
mobile apps smarter in terms of networking and communications. *
Using Android, iOS, and the Web, acquire key skills to harness the
power of Bluetooth Low Energy in your IoT applications. Who This
Book Is For The book is for developers and enthusiasts who are
passionate about learning Bluetooth Low Energy technologies and
want to add new features and services to their new or existing
products. They should be familiar with programming languages such
as Swift, Java, and JavaScript. Knowledge of debugging skills would
be an advantage. What You Will Learn * Bluetooth Low Energy in
theory. * Bluetooth Low Energy Hardware and Software Development
Kits. * Implement Bluetooth low energy communication (central and
peripheral) using Android. * Master BLE Beacons with examples
implemented over Eddystone and iBeacons. * Implement indoor
navigation using Estimote Beacons on iOS. * Implement Internet
gateways to control BLE devices on a Wi-Fi network. * Understand
BLE security mechanisms with a special focus on Bluetooth pairing,
bonding, and key exchange to cover encryption, privacy, and user
data integrity. * Implement Bluetooth Mesh using CSRMesh
Technology. In Detail Bluetooth Low Energy (BLE) is a Wireless
Personal Area network technology aimed at novel applications for
smart devices. High-tech BLE profiles and services are being
increasingly used by application developers and hardware
enthusiasts to allow devices to interact with the surrounding
world. This book will focus on a technical introduction to BLE and
how it is reshaping small-distance communication. We will start
with IoT, where many technologies such as BLE, Zigbee, and IEEE
802.15.4 Mesh will be introduced. The book will present BLE from an
engineering perspective, from which the protocol stack,
architecture, and layers are discussed. You will learn to implement
customized projects for Peripheral/Central communication, BLE
Beacons, indoor navigation using triangulation, and the Internet
gateway for Bluetooth Low Energy Personal Network, all using
various code samples and APIs on Android, iOS, and the Web.
Finally, the book will conclude with a glimpse into future
technologies destined to be prominent in years to come. Style and
approach The book is a practical tutorial that will help you
understand the background and technicalities of BLE and offers a
friendly environment to build and create robust BLE projects. This
hands-on approach will give you a clear vision of Bluetooth Low
Energy and how it can be used in IoT.
In IoT scenarios, ways in which large-scale and cross-domain
service systems can be established are still unclear, and no
systematic or in-depth theories and methods have yet been found. An
effective, formal foundation to IoT application designs could serve
as a knowledge base for a variety of virtual world applications.
Integrating and Streamlining Event-Driven IoT Services discusses
how to observe isolated services running by different observation
sources, how to fuse different observations to deal with
observation conflict and incompleteness, and how to deal with
adversaries and physical system features for real-time property
enforcement over the fused knowledge. Overall, presenting an
exploration of systematic theories and methods for the design of
IoT services based on the principles of streamlining and
integration, this book features research on topics such as CEP
service, virtual machine technologies, and hybrid EPC. It is
ideally designed for engineers, researchers, and university
students seeking coverage on applications for smart cities, smart
grids, and Industry 4.0.
Learn how to hack systems like black hat hackers and secure them
like security experts Key Features Understand how computer systems
work and their vulnerabilities Exploit weaknesses and hack into
machines to test their security Learn how to secure systems from
hackers Book DescriptionThis book starts with the basics of ethical
hacking, how to practice hacking safely and legally, and how to
install and interact with Kali Linux and the Linux terminal. You
will explore network hacking, where you will see how to test the
security of wired and wireless networks. You'll also learn how to
crack the password for any Wi-Fi network (whether it uses WEP, WPA,
or WPA2) and spy on the connected devices. Moving on, you will
discover how to gain access to remote computer systems using
client-side and server-side attacks. You will also get the hang of
post-exploitation techniques, including remotely controlling and
interacting with the systems that you compromised. Towards the end
of the book, you will be able to pick up web application hacking
techniques. You'll see how to discover, exploit, and prevent a
number of website vulnerabilities, such as XSS and SQL injections.
The attacks covered are practical techniques that work against real
systems and are purely for educational purposes. At the end of each
section, you will learn how to detect, prevent, and secure systems
from these attacks. What you will learn Understand ethical hacking
and the different fields and types of hackers Set up a penetration
testing lab to practice safe and legal hacking Explore Linux
basics, commands, and how to interact with the terminal Access
password-protected networks and spy on connected clients Use server
and client-side attacks to hack and control remote computers
Control a hacked system remotely and use it to hack other systems
Discover, exploit, and prevent a number of web application
vulnerabilities such as XSS and SQL injections Who this book is
forLearning Ethical Hacking from Scratch is for anyone interested
in learning how to hack and test the security of systems like
professional hackers and security experts.
Achieve improved network programmability and automation by
leveraging powerful network programming concepts, algorithms, and
tools Key Features Deal with remote network servers using SSH, FTP,
SNMP and LDAP protocols. Design multi threaded and event-driven
architectures for asynchronous servers programming. Leverage your
Python programming skills to build powerful network applications
Book DescriptionNetwork programming has always been a demanding
task. With full-featured and well-documented libraries all the way
up the stack, Python makes network programming the enjoyable
experience it should be. Starting with a walk through of today's
major networking protocols, through this book, you'll learn how to
employ Python for network programming, how to request and retrieve
web resources, and how to extract data in major formats over the
web. You will utilize Python for emailing using different
protocols, and you'll interact with remote systems and IP and DNS
networking. You will cover the connection of networking devices and
configuration using Python 3.7, along with cloud-based network
management tasks using Python. As the book progresses, socket
programming will be covered, followed by how to design servers, and
the pros and cons of multithreaded and event-driven architectures.
You'll develop practical clientside applications, including web API
clients, email clients, SSH, and FTP. These applications will also
be implemented through existing web application frameworks. What
you will learn Execute Python modules on networking tools Automate
tasks regarding the analysis and extraction of information from a
network Get to grips with asynchronous programming modules
available in Python Get to grips with IP address manipulation
modules using Python programming Understand the main frameworks
available in Python that are focused on web application Manipulate
IP addresses and perform CIDR calculations Who this book is forIf
you're a Python developer or a system administrator with Python
experience and you're looking to take your first steps in network
programming, then this book is for you. If you're a network
engineer or a network professional aiming to be more productive and
efficient in networking programmability and automation then this
book would serve as a useful resource. Basic knowledge of Python is
assumed.
Explore the features included in the latest versions of MQTT for
IoT and M2M communications and use them with modern Python 3. Key
Features Make your connected devices less prone to attackers by
understanding security mechanisms Take advantage of MQTT features
for IoT and Machine-to-Machine communications The only book that
covers MQTT with a single language, Python Book DescriptionMQTT is
a lightweight messaging protocol for small sensors and mobile
devices. This book explores the features of the latest versions of
MQTT for IoT and M2M communications, how to use them with Python 3,
and allow you to interact with sensors and actuators using Python.
The book begins with the specific vocabulary of MQTT and its
working modes, followed by installing a Mosquitto MQTT broker. You
will use different utilities and diagrams to understand the most
important concepts related to MQTT. You will learn to make all the
necessary configuration to work with digital certificates for
encrypting all data sent between the MQTT clients and the server.
You will also work with the different Quality of Service levels and
later analyze and compare their overheads. You will write Python
3.x code to control a vehicle with MQTT messages delivered through
encrypted connections (TLS 1.2), and learn how leverage your
knowledge of the MQTT protocol to build a solution based on
requirements. Towards the end, you will write Python code to use
the PubNub cloud-based real-time MQTT provider to monitor a surfing
competition. In the end, you will have a solution that was built
from scratch by analyzing the requirements and then write Python
code that will run on water-proof IoT boards connected to multiple
sensors in surfboards. What you will learn Learn how MQTT and its
lightweight messaging system work Understand the MQTT puzzle:
clients, servers (formerly known as brokers), and connections
Explore the features included in the latest versions of MQTT for
IoT and M2M communications Publish and receive MQTT messages with
Python Learn the difference between blocking and threaded network
loops Take advantage of the last will and testament feature Work
with cloud-based MQTT interfaces in Python Who this book is forThis
book is for developers who want to learn about the MQTT protocol
for their IoT projects. Prior knowledge of working with IoT and
Python will be helpful.
A comprehensive guide to learning Cacti and using it to implement
performance measurement and reporting within a Network Operations
Center About This Book * A complete Cacti book that focuses on the
basics as well as the advanced concepts you need to know for
implementing a Network Operations Center * A step-by-step
Beginner's Guide with detailed instructions on how to create and
implement custom plugins * Written by Thomas Urban - creator of the
"Cereus" and "NMID" plugins for Cacti known as Phalek in the Cacti
forum Who This Book Is For If you are a network operator and want
to use Cacti for implementing performance measurement for trending,
troubleshooting, and reporting purposes, then this book is for you.
You only need to know the basics of network management and SNMP.
What You Will Learn * Setting up Cacti on Linux and Windows systems
* Extending the core functionality by using the plugin architecture
* Building your own custom plugins * Creating your own custom data
input method to retrieve data from your systems * Using SNMP, SSH,
and WMI to retrieve remote performance data * Designing and create
enterprise-class reports with the reporting plugins * Implementing
threshold-based alerting using the Thold plugin * Automating common
administrative tasks utilizing the command-line interface and the
automate functionality * Migrating Cacti to new servers * Building
a multi remote-poller environment In Detail Cacti is a performance
measurement tool that provides easy methods and functions for
gathering and graphing system data. You can use Cacti to develop a
robust event management system that can alert on just about
anything you would like it to. But to do that, you need to gain a
solid understanding of the basics of Cacti, its plugin
architecture, and automation concepts. Cacti Beginner's Guide will
introduce you to the wide variety of features of Cacti and will
guide you on how to use them for maximum effectiveness. Advanced
topics such as the plugin architecture and Cacti automation using
the command-line interface will help you build a professional
performance measurement system. Designed as a beginner's guide, the
book starts off with the basics of installing and using Cacti, and
also covers the advanced topics that will show you how to customize
and extend the core Cacti functionalities. The book offers
essential tutorials for creating advanced graphs and using plugins
to create enterprise-class reports to show your customers and
colleagues. From data templates to input methods and plugin
installation to creating your own customized plugins, this book
provides you with a rich selection of step-by-step instructions to
reach your goals. It covers all you need to know to implement
professional performance measurement techniques with Cacti and ways
to fully customize Cacti to fit your needs. You will also learn how
to migrate Cacti to new servers. Lastly you will also be introduced
to the latest feature of building a scalable remote poller
environment. By the end of the book, you will be able to implement
and extend Cacti to monitor, display, and report the performance of
your network exactly the way you want. Style and approach Written
for beginners to Cacti, this book contains step-by-step
instructions and hands-on tutorials for network operators to learn
how to implement and use the core Cacti functions.
|
You may like...
TLS Mastery
Michael W Lucas
Hardcover
R893
R812
Discovery Miles 8 120
|