

Roman Zabicki has a BA in computer science from the University of Chicago. He’s worked in software full-time since 1999.
Meer over Roman ZabickiPractical Security
Simple Practices for Defending Your Systems
Samenvatting
'Computer security is a complex issue. But you don’t have to be an expert in all the esoteric details to prevent many common attacks. Attackers are opportunistic and won’t use a complex attack when a simple one will do. You can get a lot of benefit without too much complexity, by putting systems and processes in place that ensure you aren’t making the obvious mistakes. Secure your systems better, with simple (though not always easy) practices.
Plan to patch often to improve your security posture. Identify the most common software vulnerabilities, so you can avoid them when writing software. Discover cryptography — how it works, how easy it is to get wrong, and how to get it right. Configure your Windows computers securely. Defend your organization against phishing attacks with training and technical defenses.
Make simple changes to harden your system against attackers.
You don’t need any particular software to follow along with this book. Examples in the book describe security vulnerabilities and how to look for them. These examples will be more interesting if you have access to a code base you’ve worked on. Similarly, some examples describe network vulnerabilities and how to detect them. These will be more interesting with access to a network you support
Specificaties
Inhoudsopgave
Introduction
-Who Is This Book For?
-What’s in This Book
-Online Resources
Patching excerpt
-Upgrading Third-Party Libraries and Software
-Library Inventory
-Network Inventory
-Patching Windows
-Finding Published Vulnerabilities
-Testing Your Patches
-If Patching Hurts, Do It More Often
-A Practical Application of Fear
-What’s Next?
Vulnerabilities
-SQL Injection
-Cross-Site Scripting (XSS)
-Cross-Site Request Forgery (XSRF)
-Misconfiguration
-Suggested Reading
-What’s Next?
Cryptography excerpt
-Don’t Roll Your Own Crypto
-Don’t Use Low-Level Crypto Libraries
-Evaluating Crypto Libraries Without Being a Crypto Expert
-Password Storage
-Storing Passwords When You’re the Client
-Minimizing the Cost of Credential Loss
-Keeping Passwords Hard to Predict
-TLS Configuration
-What’s Next?
Windows
-Windows Users
-Login and Mimikatz
-Password Policy
-Active Directory: What Else Is It Good For?
-BitLocker
-What’s Next?
Phishing
-Types of Phishing Attacks
-Social Defense
-Don’t DIY
-DNS-Based Defense
-Authentication-Based Defense
-In-Application Defense
-Got Phished. Now What?
Wrapping Up
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht