Sekurak's Book: Introduction to IT Security , volume 1 is a joint work of 18 authors-practitioners known in the IT security community in Poland.
The only such publication on the Polish market.
Who should be interested in Introduction to IT Security?
- IT employees and those who want to learn about current security recommendations
- People taking their first steps in the field of technical IT security
- IT managers interested in IT security
- People responsible for implementing security measures in organizations
- Pentesters who want to expand their knowledge to other areas related to IT security
- People responsible for monitoring IT security
- People curious about current trends in IT security
Contents:
1. On ethics in hacking (Gynvael Coldwind)
2. What every administrator should know about web application security (Michał Sajdak)
3. Android – system security and basics of penetration testing of mobile applications (Marek Rzepecki)
4. iOS – system security and basics of penetration testing of mobile applications (Marek Rzepecki)
5. Penetration testing (Marcin Piosek)
6. Introduction to Cyber Threat Intelligence (Bartosz Jerzman)
7. Threat modeling and application risk analysis (Łukasz Basa, Wiktor Sędkowski)
8. Introduction to the MITER ATT&CK® framework (Wojciech Lesicki)
9. Cryptology from a bird's eye view (Iwona Polak)
10. Introduction to the security of industrial control systems (ICS/OT) (Marcin Dudek)
11. Data security at rest - data encryption and deletion (Krzysztof Wosiński)
12. OSINT – introduction (Tomasz Turba)
13. Physical security - asset protection (Tomasz Dacka)
14. Modern fuzzing (Marek Zmysłowski)
15. Email authentication mechanisms – SPF, DKIM and DMARC (Grzegorz Trawiński)
16. Hashcat - a race against time as a function of forces and resources (Konrad Jędrzejczyk)
17. Introduction to Metasploit (Piotr Ptaszek)
18. PowerShell on the offensive (Paweł Maziarz)
Specification:
- Polish language
- ~942 pages, over 2 million characters, color printing
- 18 chapters by 18 authors (table of contents below)