white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Forwarded from CyberSecBastion
👍5
Forwarded from CyberSecBastion
60 Methods For Cloud Attacks.pdf
3.2 MB
60 Methods For Cloud Attacks PDF Guide
🔥2
Web Security: Learning HTTP Security Headers, Liran Tal, 2023

18 Lessons, 8 Quizzes, 30 Code Snippets, and 19 Illustrations to help you learn

Takeaway Skills
(+) Secure web applications using HTTP security headers
(+) Understand Content Security Policy
(+) Setup Node.js web applications securely
(+) Learn how to test and monitor for security headers and vulnerable JavaScript libraries
(+) Roadmap for future web controls

For each HTTP security header that can enhance your web application security, you'll learn what is the overall risk of not implementing it, and what does a proposed solution help with. Finally, you'll learn how to implement and configure the security header with Helmet, a popular and well-maintained Node.js package on npm.

#book #web #AppSec
👍51
Web Security Learning HTTP Security Headers (Liran Tal).pdf
5.3 MB
Web Security: Learning HTTP Security Headers, Liran Tal, 2023
🔥7
API Security in Action, Neil Madden, 2020

APIs control data sharing in every service, server, data store, and web client. Modern data-centric designs—including microservices and cloud-native applications—demand a comprehensive, multi-layered approach to security for both private and public-facing APIs.

API Security in Action teaches you how to create secure APIs for any situation. By following this hands-on guide you’ll build a social network API while mastering techniques for flexible multi-user security, cloud key management, and lightweight cryptography. When you’re done, you’ll be able to create APIs that stand up to complex threat models and hostile environments.

What’s inside
• Authentication
• Authorization
• Audit logging
• Rate limiting
• Encryption

#book #AppSec
👍2🔥2
API Security in Action (Neil Madden).pdf
10.4 MB
API Security in Action, Neil Madden, 2020
🔥61
Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion, Dario Cabianca, Apress, 2023

You will waste no time when you use this study companion. It lets you dive in and learn how GCP differs from other public cloud providers (AWS and Microsoft Azure). You will understand GCP's unique ability to allow virtual private clouds (VPCs) that span across multiple regions. You will know how to leverage GCP as a competitive advantage in the IT engineering community. Key concepts covered on the exam are called out and applied in each chapter of this book, giving you both practice and reinforcement, a far more effective learning tool than rote learning or similar approaches typically enlisted in exam preparation.
What You Will Learn:
(+) Architect and design a virtual private cloud
(+) Implement a virtual private cloud
(+) Configure network services
(+) Implement hybrid connectivity
(+) Implement network security
(+) Manage network operations
(+) Optimize network resources
#book #SecDevOps
👍5
Google_Cloud_Platform_GCP_Professional_Cloud_Network_Engineer_Certification.pdf
51.8 MB
Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion, Dario Cabianca, Apress, 2023
👍3
Основы современной криптографи, Баричев С.Г., Серов Р.Е., 2006

Интересная книга по основам криптографии времен моего обучения в универе. Хоть годков и накапало, инфа в своем большинстве там актуальная и по сей день

В первой главе рассказывается история криптографии, основные понятия и определения, требования к криптосистемам, а также краткие сведения о криптоанализе. Далее рассматриваются традиционные симметричные и асимметричные криптосистемы, включая Криптосистемы Эль-Гамаля, Диффи-Хеллмана, Ривеста-Шамира-Адлемана, Меркля-Хеллмана и Хора-Ривеста, а также криптосистемы, основанные на эллиптических кривых. В последних главах рассматриваются электронные подписи и управление криптографическими ключами. В систематизированном виде рассмотрены вопросы создания симметричных и асимметричных криптографических систем защиты информации. Описаны алгоритмы электронных цифровых подписей, системы управления криптографическими ключами, имитозащита информации.

#book #crypto
👍5