Iran Open Source (IOS)
2.63K subscribers
6.69K photos
147 videos
1.69K files
1.16K links
کانال IOS:
💎 امنیت سایبری، امنیت اطلاعات، امنیت شبکه
💎 دوره‌های تخصصی شبکه، امنیت و دیتاسنتر
💎 مجازی‌سازی، پردازش ابری و ذخیره سازی
💎 معرفی کتاب
💎 اخبار IT، امنیت، هک و نفوذ

🌀 مدیر کانال: میثم ناظمی
@Meysam_Nazemi

🌀 مدیر تبلیغات: @MoNaITCU
Download Telegram
💎 لینک گروه الماس
@Diamond_Security 💎
#Securing_the_Perimeter
@iranopensource🐧
Iran Open Source (IOS)
💎 لینک گروه الماس @Diamond_Security 💎 #Securing_the_Perimeter @iranopensource🐧
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software by Michael Schwartz & Maciej Machulak #Securing #Perimeter #AccessManagement #IAM
------------------------
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.
The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, effective access control is the best investment you can make. Financially, it’s more valuable to prevent than to detect a security breach. That’s why Identity and Access Management (IAM) is a critical component of an organization’s security infrastructure. In the past, IAM software has been available only from large enterprise software vendors. Commercial IAM offerings are bundled as “suites” because IAM is not just one component. It’s a number of components working together, including web, authentication, authorization, cryptographic, and persistence services.
Securing the Perimeter documents a recipe to take advantage of open standards to build an enterprise-class IAM service using free open source software. This recipe can be adapted to meet the needs of both small and large organizations. While not a comprehensive guide for every application, this book provides the key concepts and patterns to help administrators and developers leverage a central security infrastructure.
Cloud IAM service providers would have you believe that managing an IAM is too hard. Anything unfamiliar is hard, but with the right road map, it can be mastered. You may find SaaS identity solutions too rigid or too expensive. Or perhaps you don’t like the idea of a third party holding the credentials of your users—the keys to your kingdom. Open source IAM provides an alternative. Take control of your IAM infrastructure if digital services are key to your organization’s success.
What You’ll Learn
Understand why you should deploy a centralized authentication and policy management infrastructure
Use the SAML or Open ID Standards for web or single sign-on, and OAuth for API Access Management
Synchronize data from existing identity repositories such as Active Directory
Deploy two-factor authentication services
Who This Book Is For
Security architects (CISO, CSO), system engineers/administrators, and software developers
------------------------————————————
2018 | PDF | 383 pages | 10.6 MB
-----------------------------——————————-

@iranopensource🐧
💎 لینک گروه الماس
@Diamond_Security 💎
#Securing_SQL_Server
@iranopensource🐧
Iran Open Source (IOS)
💎 لینک گروه الماس @Diamond_Security 💎 #Securing_SQL_Server @iranopensource🐧
Securing SQL Server DBAs Defending the Database 2nd Edition by Peter A. Carter #Securing #SQL #DBA #DB #programming #security
----------------------------
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The multi-layered approach in this book helps ensure that a single breach does not lead to loss or compromise of confidential, or business sensitive data.
Database professionals in today’s world deal increasingly with repeated data attacks against high-profile organizations and sensitive data. It is more important than ever to keep your company’s data secure. Securing SQL Server demonstrates how developers, administrators and architects can all play their part in the protection of their company’s SQL Server enterprise.
This book not only provides a comprehensive guide to implementing the security model in SQL Server, including coverage of technologies such as Always Encrypted, Dynamic Data Masking, and Row Level Security, but also looks at common forms of attack against databases, such as SQL Injection and backup theft, with clear, concise examples of how to implement countermeasures against these specific scenarios. Most importantly, this book gives practical advice and engaging examples of how to defend your data, and ultimately your job, against attack and compromise.
What You'll Learn
Perform threat analysis
Implement access level control and data encryption
Avoid non-reputability by implementing comprehensive auditing
Use security metadata to ensure your security policies are enforced
Mitigate the risk of credentials being stolen
Put countermeasures in place against common forms of attack
------------------------------------------------——-
2019 | PDF | 354 pages | 10.3 MB
--------------------------------------------———-

@iranopensource🐧
💎 گروه امنیت الماس
@Diamond_Security 💎
#securing_VoIP_networks
@iranopensource🐧
💎 گروه امنیت الماس
@Diamond_Security 💎
#Securing_SQL_Server
@iranopensource🐧