Security is a major concern, in particular now that everything is moving to the cloud. A private cloud is a cloud computing platform built on your own hardware and software. The alternative is to deploy the services you need on a public cloud infrastructure provided by an external supplier such as Amazon Web Services, Rackspace Cloud, or HP Public Cloud. While a public cloud can afford greater flexibility, a private cloud gives you the advantage of greater control over the entire stack.
“VMware vCloud Security” focuses on some critical security risks, such as the application level firewall and firewall zone, virus and malware attacks on cloud virtual machines, and data security compliance on any VMware vCloud-based private cloud. Security administrators sometimes deploy its components incorrectly, or sometimes cannot see the broader picture and where the vCloud security products fit in. This book is focused on solving those problems using VMware vCloud and the vCloud Networking and Security product suite, which includes vCloud Networking and Security App, vShield Endpoint, and vCloud Networking and Security Data Security.
Ensuring the security and compliance of any applications, especially those that are business critical, is a crucial step in your journey to the cloud. You will be introduced to security roles in VMware vCloud Director, integration of LDAP Servers with vCloud, and security hardening of vCloud Director. We’ll then walk through a hypervisor-based firewall that protects applications in the virtual datacenter from network-based attacks. We’ll create access control policies based on logical constructs such as VMware vCenter Server containers and VMware vCloud Networking Download Now »
In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to break into your system or network helps you plug the loopholes before it’s too late and can save you countless hours and money. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution.
Discover a variety of popular tools of penetration testing, such as information gathering, vulnerability identification, exploitation, privilege escalation, and covering your tracks.
Packed with practical recipes, this useful guide begins by covering the installation of Kali Linux and setting up a virtual environment to perform your tests. You will then learn how to eavesdrop and intercept traffic on wireless networks, bypass intrusion detection systems, and attack web applications, as well as checking for open ports, performing data forensics, and much more. The book follows the logical approach of a penetration test from start to finish with many screenshots and illustrations that help to explain each tool in detail. The Kali Linux Cookbook will serve as an excellent source of information for the security professional and novice alike!
What you will learn from this book
- Install and setup Kali Linux on multiple platforms
- Customize Kali Linux to your individual needs Download Now »
Accumulo is a sorted and distributed key/value store designed to handle large amounts of data. Being highly robust and scalable, its performance makes it ideal for real-time data storage. Apache Accumulo is based on Google’s BigTable design and is built on top of Apache Hadoop, Zookeeper, and Thrift.
Apache Accumulo for Developers is your guide to building an Accumulo cluster both as a single-node and multi-node, on-site and in the cloud. Accumulo has been proven to be able to handle petabytes of data, with cell-level security, and real-time analyses so this is your step by step guide in taking full advantage of this power.
Apache Accumulo for Developers looks at the process of setting up three systems – Hadoop, ZooKeeper, and Accumulo – and configuring, monitoring, and securing them.
You will learn to connect Accumulo to both Hadoop and ZooKeeper. You will also learn how to monitor the cluster (single-node or multi-node) to find any performance bottlenecks, and then integrate to Amazon EC2, Google Cloud Platform, Rackspace, and Windows Azure. When integrating with these cloud platforms, we will focus on scripting as well.
You will also learn to troubleshoot clusters with monitoring tools, and use Accumulo cell-level security to secure your data.
What you will learn from this book
- Set up Hadoop, ZooKeeper, and Accumulo
- Monitor clusters – both performance and application logs Download Now »
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities.
Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications.
“Web Penetration Testing with Kali Linux” looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises.
You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls.
On the completion of this book, you will have the skills needed to use Kali Linux Download Now »
NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security measure.
SELinux System Administration covers the majority of SELinux features through a mix of real-life scenarios, descriptions, and examples. Everything an administrator needs to further tune SELinux to suit their needs are present in this book.
This book touches on various SELinux topics, guiding you through the configuration of SELinux contexts, definitions, and the assignment of SELinux roles, and finishes up with policy enhancements. All of SELinux’s configuration handles, be they conditional policies, constraints, policy types, or audit capabilities, are covered in this book with genuine examples that administrators might come across.
By the end, SELinux System Administration will have taught you how to configure your Linux system to be more secure, powered by a formidable mandatory access control.
What you will learn from this book
- Enable and disable features selectively or even enforce them to a granular level
- Interpret SELinux logging to make security-conscious decisions Download Now »
After the emergence of Cloud computing, most commercial applications either migrated or are the candidates to be migrated to the cloud. All big players in the market are providing their cloud services to consumers and Oracle offers the most complete range of SaaS, PaaS, and IaaS cloud services.
“Getting Started with Oracle Public Cloud” is a hands-on guide that provides you with a practical and informative coverage of Oracle Public Cloud Services, including the Transition Service, Java Cloud Service, Database Cloud Service, Storage Cloud Service, and Messaging Cloud Service.
In this book, you will start with the essential concepts of Cloud computing and Oracle Public Cloud, and Oracle Public Cloud services. You will then learn about Oracle Managed Cloud services and their component services. You will also learn about the Oracle Cloud Transition service in detail. Next, you will cover the various components of the Oracle Database Cloud service, how to use the Oracle Application Express application building tool, and the management and creation of the Oracle Database Cloud service. You will also learn the various operations that can be performed on the Oracle Database Cloud service and the security aspects of the Oracle Database Cloud service. The essential part of Oracle Public Cloud is its services; you will become a master of these. You will also be provided with the best practices to be followed for application development, deployment, and usage to achieve optimal performance and a secure environment for your consumer’s application and data. By following Getting Started with Oracle Public Cloud, you will get to grips with the strong fundamentals and be clued up with sufficient details Download Now »