OpenSSL Cookbook

OpenSSL Cookbook
Author: Ivan Ristic
Publisher: Feisty Duck
Total Pages: 62
Release: 2013-10-03
Genre: Computers
ISBN: 1907117059

Download OpenSSL Cookbook Book in PDF, Epub and Kindle

A guide to the most frequently used OpenSSL features and commands, written by Ivan Ristic. Comprehensive coverage of OpenSSL installation, configuration, and key and certificate management Includes SSL/TLS Deployment Best Practices, a design and deployment guide Written by a well-known practitioner in the field and the author of SSL Labs and the SSL/TLS configuration assessment tool Available in a variety of digital formats (PDF, EPUB, Mobi/Kindle); no DRM Continuously updated OpenSSL Cookbook is built around one chapter from Bulletproof SSL/TLS and PKI, a larger work that provides complete coverage of SSL/TLS and PKI topics. To download your free copy in various formats, visit feistyduck.com/books/openssl-cookbook/

Linux Security Cookbook

Linux Security Cookbook
Author: Daniel J. Barrett
Publisher: "O'Reilly Media, Inc."
Total Pages: 335
Release: 2003-06-02
Genre: Computers
ISBN: 1449366767

Download Linux Security Cookbook Book in PDF, Epub and Kindle

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.

Bulletproof SSL and TLS

Bulletproof SSL and TLS
Author: Ivan Ristic
Publisher: Feisty Duck
Total Pages: 528
Release: 2014
Genre: Computers
ISBN: 1907117040

Download Bulletproof SSL and TLS Book in PDF, Epub and Kindle

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you’ll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done: - Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital version - For IT security professionals, help to understand the risks - For system administrators, help to deploy systems securely - For developers, help to design and implement secure web applications - Practical and concise, with added depth when details are relevant - Introduction to cryptography and the latest TLS protocol version - Discussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilities - Coverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and Heartbleed - Thorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinning - Guide to using OpenSSL to generate keys and certificates and to create and run a private certification authority - Guide to using OpenSSL to test servers for vulnerabilities - Practical advice for secure server configuration using Apache httpd, IIS, Java, Nginx, Microsoft Windows, and Tomcat This book is available in paperback and a variety of digital formats without DRM.

Secure Programming Cookbook for C and C++

Secure Programming Cookbook for C and C++
Author: John Viega
Publisher: "O'Reilly Media, Inc."
Total Pages: 792
Release: 2003-07-14
Genre: Computers
ISBN: 0596552181

Download Secure Programming Cookbook for C and C++ Book in PDF, Epub and Kindle

Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult. Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code. It contains a wealth of solutions to problems faced by those who care about the security of their applications. It covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering. The rich set of code samples provided in the book's more than 200 recipes will help programmers secure the C and C++ programs they write for both Unix® (including Linux®) and Windows® environments. Readers will learn: How to avoid common programming errors, such as buffer overflows, race conditions, and format string problems How to properly SSL-enable applications How to create secure channels for client-server communication without SSL How to integrate Public Key Infrastructure (PKI) into applications Best practices for using cryptography properly Techniques and strategies for properly validating input to programs How to launch programs securely How to use file access mechanisms properly Techniques for protecting applications from reverse engineering The book's web site supplements the book by providing a place to post new recipes, including those written in additional languages like Perl, Java, and Python. Monthly prizes will reward the best recipes submitted by readers. Secure Programming Cookbook for C and C++ is destined to become an essential part of any developer's library, a code companion developers will turn to again and again as they seek to protect their systems from attackers and reduce the risks they face in today's dangerous world.

Modsecurity Handbook

Modsecurity Handbook
Author: Ivan Ristic
Publisher: Feisty Duck
Total Pages: 365
Release: 2010
Genre: Computers
ISBN: 1907117024

Download Modsecurity Handbook Book in PDF, Epub and Kindle

"ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristić, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. ... The official ModSecurity Reference Manual is included in the second part of the book."--Back cover.

Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Author: Ivan Ristic
Publisher: Feisty Duck
Total Pages: 512
Release: 2022-01-10
Genre: Computers
ISBN: 9781907117091

Download Bulletproof TLS and PKI, Second Edition: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications Book in PDF, Epub and Kindle

Bulletproof TLS and PKI is a complete guide to using TLS encryption and PKI to deploy secure servers and web applications. Written by Ivan Ristic, author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you'll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done: Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital version For IT professionals, help to understand security risks For system administrators, help to deploy systems securely For developers, help to secure web applications Practical and concise, with added depth as needed Introduction to cryptography and the Internet threat model Coverage of TLS 1.3 as well as earlier protocol versions Discussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilities Coverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and Heartbleed Thorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinning Guide to using OpenSSL to generate keys and certificates and to create and run a private certification authority Guide to using OpenSSL to test servers for vulnerabilities This book is also available in a variety of digital formats directly from the publisher. Visit us at www.feistyduck.com.

Linux Cookbook

Linux Cookbook
Author: Carla Schroder
Publisher: "O'Reilly Media, Inc."
Total Pages: 544
Release: 2021-08-13
Genre: Computers
ISBN: 1492087114

Download Linux Cookbook Book in PDF, Epub and Kindle

This handy cookbook teaches new-to-intermediate Linux users the essential skills necessary to manage a Linux system, using both graphical and command-line tools. Whether you run Linux in embedded, desktop, server, or cloud or virtual environments, the fundamental skills are the same. This book aims to get you up and running quickly, with copy-paste examples. Carla Schroder provides recipes that cover specific problems, with discussions that explain how each recipe works, as well as references for additional study. You'll learn how to: Use systemd, the new comprehensive service manager Build simple or complex firewalls with firewalld Set up secure network connections for Linux systems and mobile devices Rescue nonbooting systems Reset lost passwords on Linux and Windows Use dnsmasq to simplify managing your LAN name services Manage users and groups and control access to files Probe your computer hardware and monitor hardware health Manage the GRUB bootloader and multiboot Linux and Windows Keep accurate time across your network with the newest tools Build an internet router/firewall on Raspberry Pi Manage filesystems and partitioning

Machine Learning with Amazon SageMaker Cookbook

Machine Learning with Amazon SageMaker Cookbook
Author: Joshua Arvin Lat
Publisher: Packt Publishing Ltd
Total Pages: 763
Release: 2021-10-29
Genre: Computers
ISBN: 1800566123

Download Machine Learning with Amazon SageMaker Cookbook Book in PDF, Epub and Kindle

A step-by-step solution-based guide to preparing building, training, and deploying high-quality machine learning models with Amazon SageMaker Key FeaturesPerform ML experiments with built-in and custom algorithms in SageMakerExplore proven solutions when working with TensorFlow, PyTorch, Hugging Face Transformers, and scikit-learnUse the different features and capabilities of SageMaker to automate relevant ML processesBook Description Amazon SageMaker is a fully managed machine learning (ML) service that helps data scientists and ML practitioners manage ML experiments. In this book, you'll use the different capabilities and features of Amazon SageMaker to solve relevant data science and ML problems. This step-by-step guide features 80 proven recipes designed to give you the hands-on machine learning experience needed to contribute to real-world experiments and projects. You'll cover the algorithms and techniques that are commonly used when training and deploying NLP, time series forecasting, and computer vision models to solve ML problems. You'll explore various solutions for working with deep learning libraries and frameworks such as TensorFlow, PyTorch, and Hugging Face Transformers in Amazon SageMaker. You'll also learn how to use SageMaker Clarify, SageMaker Model Monitor, SageMaker Debugger, and SageMaker Experiments to debug, manage, and monitor multiple ML experiments and deployments. Moreover, you'll have a better understanding of how SageMaker Feature Store, Autopilot, and Pipelines can meet the specific needs of data science teams. By the end of this book, you'll be able to combine the different solutions you've learned as building blocks to solve real-world ML problems. What you will learnTrain and deploy NLP, time series forecasting, and computer vision models to solve different business problemsPush the limits of customization in SageMaker using custom container imagesUse AutoML capabilities with SageMaker Autopilot to create high-quality modelsWork with effective data analysis and preparation techniquesExplore solutions for debugging and managing ML experiments and deploymentsDeal with bias detection and ML explainability requirements using SageMaker ClarifyAutomate intermediate and complex deployments and workflows using a variety of solutionsWho this book is for This book is for developers, data scientists, and machine learning practitioners interested in using Amazon SageMaker to build, analyze, and deploy machine learning models with 80 step-by-step recipes. All you need is an AWS account to get things running. Prior knowledge of AWS, machine learning, and the Python programming language will help you to grasp the concepts covered in this book more effectively.

Kali Linux Network Scanning Cookbook

Kali Linux Network Scanning Cookbook
Author: Justin Hutchens
Publisher: Packt Publishing Ltd
Total Pages: 710
Release: 2014-08-21
Genre: Computers
ISBN: 1783982152

Download Kali Linux Network Scanning Cookbook Book in PDF, Epub and Kindle

Kali Linux Network Scanning Cookbook is intended for information security professionals and casual security enthusiasts alike. It will provide the foundational principles for the novice reader but will also introduce scripting techniques and in-depth analysis for the more advanced audience. Whether you are brand new to Kali Linux or a seasoned veteran, this book will aid in both understanding and ultimately mastering many of the most powerful and useful scanning techniques in the industry. It is assumed that the reader has some basic security testing experience.

The Modern Cryptography Cookbook

The Modern Cryptography Cookbook
Author: Anish Nath
Publisher: Anish Nath
Total Pages: 240
Release: 2018-08-10
Genre: Computers
ISBN: 1718104715

Download The Modern Cryptography Cookbook Book in PDF, Epub and Kindle

Learning cryptography and security is fun instead of saying it hard or Complex. This book have concepts, examples of Cryptography principle followed with Applied Cryptography. Chapters presented in this book are independent and can be read in any order. Most of the example utilizes openssl. In Summary you are going to learn and explore below topics URL Encode Decode, Base64 Encode Decode, ASCII string to hex, Convert ASCII to Hex, PEM Formats, Cryptography Algorithms, Symmetric Key cryptography, Authenticated encryption, Types of Asymmetric Key Algorithms, Quantum Breakable Algorithms, Quantum Secure Algorithms, Cryptography Algorithms, Symmetric Key cryptography, Block ciphers Modes of Operation, Authenticated encryption (both encryption and message integrity)Quantum Breakable AlgorithmsQuantum Secure AlgorithmsAES (Encryption/Decryption), DES (Encryption/Decryption), 3DES (Encryption/Decryption)BlowFish(Encryption/Decryption), RC4 (Encryption/Decryption)Assymtetric Key Cryptography, RSA (Encryption/Decryption), DSA (Keygen,Sign File,Verify Sig), PKI, TLS v1.3, ECDSA Key exchange, Diffie-Hellman, Message Digests, MAC (Message Authentication Codes), HMAC Generate HMAC, Secure Password Hashing bcrypt password hash PBKDF2 (PBE Encryption/Decryption)scrypt password hash Crypt hash functions and limitation, MD5 password generate Generate password for /etc/passwordCipher SuiteManaging Certificates.(Self Sign/rootCA, create ecc,rsa,dsa certificates)SMIMEGPG (Sign/verify/store,create Authentication Key )GnuPG for SSH authenticationHardening Modern Certificates & TLS ConfigurationNginx Secure Configuration ()Apache Secure ConfigurationHAProxy Secure ConfigurationAWS ELB Secure ConfigurationTesting HTTPS Services, Openssl HTTPS Testing, SSH Key Gen, Java Keytool/Keystore IPtables