Take a look at our COM053000 books. Shulph carries a great selection of COM053000 books, and we are always adding more.
Cyber crime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes. Key Features -Real-case studies and true events on cyber crime incidents. -Learn how to protect yourself from cyber threats and assist police for crime investigation. -Coverage on financial frauds, social media crimes, mobile payment frauds, and a lot more. Description The book ‘Cybercrime and Preventive Measures' provides a strong and precise introduction to the world of cybercrime and the need of cyber awareness for everyone. It begins with email-related popular cyber crimes such as phishing, spamming, spoofing, email bombing, etc. It talks about the methodologies adopted by cyber criminals to trap people along with some real-case studies (names of victims changed) and preventive measures to be taken to safeguard against email-related cyber crime. This book exposes you to a variety of financial frauds committed by cyber criminals and the modus of operandi they adopt while committing cyber crimes along with numerous case studies. The book keeps you informed about what preventive and safety measures can be exercised so that you can protect yourself, your family, and even your workplace. This book also assists young teenagers and school students about the methods adopted by hackers and how to remain safe while using social media applications and Internet shopping sites. This book talks about the risks involved and preventive measures that need to be taken while using mobile apps. What you will learn -Get familiar with the top rated cyber crime incidents in India. -Understand the different types of cyber crimes and the modus of operandi adopted by the cyber criminals. -Learn to identify and manage cybersecurity threats and protect yourself from cyber vulnerabilities. Who this book is for This book is for everyone, students, or professionals, who are frequently using smartphones, computers, laptops, and smart devices over the Internet. This book guides you to protect yourself from cyber threats while browsing the internet, watching videos over the Internet, using emails, and using social media apps such as WhatsApp, Facebook, Twitter, LinkedIn, or playing online games. Table of Contents 1. Email-related Cybercrimes 2. Financial Frauds and Cybercrime 3. Cybercrime in Social Media 4. Mobile Application-related Frauds 5. To Do List for Working Professionals and Small Businesses 6. Complaint Registration Procedure 7. References About the Authors Priyanka Tomar, is the Director of New Era System Pvt Ltd and has 18 years of experience in various IT fields, including Cyber Security and Cyber Forensics. She has been a guest faculty at CBI Academy, Ghaziabad since 2014 and is also an advisor to government and private organisations on cybersecurity-related issues, R&D projects, etc. She is a regular speaker and discussion panelist at cybersecurity events. She imparts customized Cyber Security Training on cyber security and cyber forensics such as darknet forensics, cryptocurrency forensics, cyber Intelligence & OSINT, Network Forensics, Protecting Critical Infrastructure, Website Security, Blockchain-based solutions, IoT & Smart Cities Solutions, etc. Blog Link: Cybersecurityaudits Sanjay Gautam joined CBI in 2002 and has experience in the investigation of anti-corruption cases and cyber crime cases, including crimes against women and children. He has provided technical assistance in various hi-profile cases. He has attended a number of INTERPOL's Train-the-Trainer workshops in India, Cyprus, and South Korea and was ranked 1st among various INTERPOL countries. He is a regular guest faculty for various Central Training Institutes. He was also invited by UNDP and INTERPOL to deliver a lecture at Kuala Lumpur, Malaysia. He has also attended INTERPOL’s Digital Forensics Experts Meeting in South Korea. He has been imparting training to a large number of police officers from CBI, State Police Forces, Judiciary, Security Agencies, CPOs, etc. from India, SAARC. LinkedIn Bio: Sanjay Gautam
Secure your applications and development environments with Docker and Kubernetes Key Features Introducing Container platforms (Docker, Kubernetes, Swarm, OpenShift Discover how to manage high availability with Docker Swarm and Kubernetes Learn how Docker can manage the security in images and containers Discover how Docker can be integrated into development workflows in applications Discover vulnerabilities in the Docker containers and images with practical examples to secure your container-based applications Discover tools for monitoring and administration Docker and Kubernetes applications Description Through this book, we will introduce the DevOps tools ecosystem and the main containers orchestration tools through an introduction to some platforms such as Kubernetes, Docker Swarm, and OpenShift. Among other topics, both good practices will be addressed when constructing the Docker images as well as best security practices to be applied at the level of the host in which those containers are executed, from Docker's own daemon to the rest of the components that make up its technological stack. We will review the topics such as static analysis of vulnerabilities on Docker images, the signing of images with Docker Content Trust and their subsequent publication in a Docker Registry will be addressed. Also, we will review the security state in Kubernetes. In the last section, we will review container management and administration open source tools for IT organizations that need to manage and monitor container-based applications, reviewing topics such as monitoring, administration, and networking in Docker. What will you learn Learn fundamental DevOps skills and tools, starting with the basic components and concepts of Docker. Learn about Docker as a platform for the deployment of containers and Docker images taking into account the security of applications. Learn about tools that allow us to audit the security of the machine where we execute Docker images, finding out how to secure your Docker host. Learn how to secure your Docker environment and discover vulnerabilities and threats in Docker images. Learn about creating and deploying containers in a security way with Docker and Kubernetes. Learn about monitoring and administration in Docker with tools such as cadvisor, sysdig, portainer, and Rancher. Who this book is for This book covers different techniques to help developers improve DevOps and container security skills and can be useful for people who are involved in software development and want to learn how Docker works from a security point of view. It is recommended that readers have the knowledge about UNIX commands and they work with commands terminal. Table of Contents 1. Getting started with DevOps 2. Container platforms 3. Managing Containers and Docker images 4. Getting started with Docker security 5. Docker host security 6. Docker images security 7. Auditing and analyzing vulnerabilities in Docker containers 8. Kubernetes security 9. Docker container networking 10. Docker container monitoring 11. Docker container administration About the Author José Manuel Ortega is a software engineer and security researcher with a special focus on new technologies, open source, security and testing. In recent years, he is interested in security development, especially with Python and security best practices with Docker and Kubernetes. Conferences and talks related with python, security and docker are available on his personal Your Blog links: http://jmortega.github.io/ Your LinkedIn Profile: https://www.linkedin.com/in/jmortega1/
Step-by-step guide to learning the role of E-commerce in our economy Key Features Hands-on with the concept of E-Commerce and E-Business. Understand the know-how of working of E-Commerce framework. Learn the type of E-Payment system and its mechanism. Understanding Brand building and Digital Marketing methods. Description Electronic Commerce (E-Commerce) is a new way of carrying out business transactions through electronic means in general and the Internet environment by supporting this industry in particular, has been proving its potential benefits and effective contribution to the socio-economic growth. As an essential part of the “Digital Economy”, E-Commerce plays a key role in opening the door to the 21st century, the new era of the knowledge-based economy. In this book, you will understand the basic concepts of E-Commerce and E-Business. The Internet has the broadcasting capability and is a mechanism for information dissemination and a medium for collaboration and interaction between individuals through computers irrespective of geographic locations. The motive of this book is to present an introduction to E-Commerce and E-Banking industry. What you will learn Understand the different models of E-Commerce. Get to know more about the various types of Electronic Payment Systems. Understand the security issues in Electronic Payment Systems. Get familiar with the concept of Electronic banking and Online publishing Who this book is for This book is for everyone interested in knowing more about E-Commerce. Existing professionals associated with the E-Commerce industry can use this book as a reference guide. Table of Contents 1 Describe the concept of E-commerce and E-business 2 Understand the E-commerce framework 3 Learn the various functions of E-commerce 4 Describe the models of E-commerce 5 Describe the concept of the Internet and its use in E-commerce 6 Define the various types of electronic payment systems 7 Understand the security issues in electronic payment system 8 Learn the concept of electronic banking and online publishing 9 Describe the methods of brand building in the market 10 Understand the role of digital marketing in brand building About the Authors Dr. Sudeshna Chakrabortyhas 15+yrs of experience in mostly all academic and industry-academia interface processes, including teaching UG, PG, and Ph.D. scholars. She had the remarkable role of exam dep. supervisor, academic and department placement coordinator and has published 10 patents and filed two others. She has published papers in 50 national and international journals and conferences with remarkable citation. She was a key note speaker at SEAHF, Session Chair at ICCIKE -19, International Conference on Computational Intelligence & Knowledge Economy Held at Amity University, Dubai. Plus, she is an editorial member of NOVA, IJREM IJASRW, Research AAP CRC Francis NTaylor, and a professional member of IEEE, Chair IETA, and IEI. LinkedIn Profile:https://www.linkedin.com/in/dr-sudeshna-758a70176 Facebook Profile:https://m.facebook.com/Dr.sudesna.chakraborty Priyanka Tyagi is an assistant professor at Lingaya’s Lalita Devi Institute of Management and Sciences, IP University. She is pursuing her P.hd (Computer Science), from Lingaya’s Vidyapeeth (Deemed to be University). She completed her M.Tech. (Computer Science) from Banasthali Vidyapeeth, Rajasthan, with 77.2% in July 2009 and completed her B.E. (Computer Science) from Hindu College of Engineering, Sonipat, with an aggregate of 70.2% in 2006. LinkedIn Profile: https://www.linkedin.com/in/priyanka-tyagi-15885315a/ Blog links: https://twitter.com/home?lang=en
Learn how to build an end-to-end Web application security testing framework Description Hands-on Penetration Testing for Web Applications offers readers with knowledge and skillset to identify, exploit and control the security vulnerabilities present in commercial web applications including online banking, mobile payments and e-commerce applications. We begin with exposure to modern application vulnerabilities present in web applications. You will learn and gradually practice the core concepts of penetration testing and OWASP Top Ten vulnerabilities including injection, broken authentication and access control, security misconfigurations and cross-site scripting (XSS). What you will learn Complete overview of concepts of web penetration testing. Learn to secure against OWASP TOP 10 web vulnerabilities. Discover security flaws in your web application using most popular tools like nmap and wireshark. Learn to respond modern automated cyber attacks with the help of expert-led tips and tricks. Who this book is for This book is for Penetration Testers, ethical hackers, and web application developers. People who are new to security testing will also find this book useful. Basic knowledge of HTML, JavaScript would be an added advantage. Table of Contents 1. Why Application Security? 2. Modern application Vulnerabilities 3. Web Pentesting Methodology 4. Testing Authentication 5. Testing Session Management 6. Testing Secure Channels 7. Testing Secure Access Control 8. Sensitive Data and Information disclosure 9. Testing Secure Data validation 10. Attacking Application Users: Other Techniques 11. Attacking Application Users: Other Techniques 12. Automating Custom Attacks 13. Pentesting Tools 14. Static Code Analysis 15. Mitigations and Core Defense Mechanisms
Learn to secure your personal data & reclaim your online privacy! Key Features Understand your cyber risk exposure by calculating your Privacy Score™ Improve your Privacy Score with easy-to-follow recommendations Different recommendations for different levels of expertise – YOUR choice! An ‘interactive’ book with inline QR code references for further learning! Instantly applicable recommendations that show immediate results! Gamification of recommended actions to incentivize best practice behaviors Quantifiable* improvement by the end of the book! Description This book intends to be a comprehensive step-by-step guide on how to take control of all your digital footprints on the internet. You will begin with a quick analysis that will calculate your current Privacy Score. The aim of this book is to improve this Privacy Score by the end of the book. By the end of this book, you will have ensured that the information being leaked by your phone, your desktop, your browser, and your internet connection is minimal-to-none. All your online accounts for email, social networks, banking, shopping, etc. will be made secure and (almost) impervious to attackers. You will have complete control over all of your personal information that is available in public view. Your personal information belongs to you and you alone. It should never ever be available for anyone else to see without your knowledge and without your explicit permission. What will you learn -How to safeguard your privacy online -How to secure your personal data & keep it private -How to prevent your devices from leaking your private info -How to prevent various websites & services from ‘spying’ on you -How to ‘lock down’ your social media profiles -How to identify threats to your privacy and what counter-measures to take Who this book is for Anyone who values their digital security and privacy and wishes to ‘lock down’ their personal data will find this book useful. Corporate IT departments can use this as a reference book to design data security practices and training modules for employees. Table of Contents 1. Prologue 2. Internet and Privacy 3. Android Devices 4. Apple iPhones 5. Smartphone Apps 6. Smart Devices & IoT 7. Desktops – Operating Systems 8. Desktops – Software Applications 9. Desktops – Browsers 10. Services - Email 11. Software-as-a-Service (SaaS) 12. Networks: Connectivity, & Internet 13. Operational Security (OPSEC) 14. Epilogue 15. Bonus Chapter: Useful Tips and Tricks About the Author Rohit Srivastwa is a well-known Security Evangelist with extensive experience in Cyber Security, Enterprise Security, Secure Digital Transformation, and Cyber warfare. He founded India's first-ever hackers’ conference and community named “ClubHack”. .” A serial entrepreneur, his most recent startup was acquired by QuickHeal Technology Ltd in 2016. His LinkedIn Profile: https://linkedin.com/in/rohit11