What you don't know can hurt you. If you know there is a problem and deliberately ignore it, that's irresponsible and dereliction of due diligence.
About the Book
Mark Twain is credited with the saying "It Ain’t What You Don’t Know That Gets You Into Trouble. It’s What You Know for Sure That Just Ain’t So." The more sure you are that your networks and information systems are locked down and comply with your security policies; that they are actually enforced by your nextgen firewalls, fancy URL filtering proxy servers, and SIEM dashboards, the more likely it is, that just ain't so. Shadow IT has a way of taking security policies that you know are Right, and making them Irrelevant because you can't even detect (or are not looking for) that shadow IT is bypassing your security policies and objectives.
A blog will accompany the book https://shadowit.weebly.com/ for information between updates to the book if you are interested.
Read the book for free: send me an email at email@example.com and describe your suspicion of how Shadow IT is being used in your organization and I'll send you a coupon for the book. Example: Have you shut off the WiFi at home for "family time" or "quiet study/reading time"? So the kids are now using cellular data or the neighbors' WiFi instead, what do they care about your WiFi, and do you really want your kids to be so stupid and compliant they won't think of it?
- 0.1 How to Use / Read This Book
1. Shadow IT: An Introduction
- 1.1 What You Know For Sure That Ain't So
- 1.2 Applicability
- 1.3 Types of Shadow IT
- 1.4 Hire Competent People
- 1.5 Whitelist your security
- 1.6 Training, education and "good security practices" are still necessary
- 1.7 End of Scolding
- 1.8 No Secrets Here
- 1.9 Summary and Looking Forward: The Need for Leadership With Vision
2. Local Tunnels
- 2.1 What is it, and what's the danger?
- 2.2 How does it work?
- 2.3 How to detect and stop
- 2.4 The Irony of Security Education
- 2.5 Observation
3. Zero Knowledge services
- 3.1 What is it, how does it work, and what's the danger?
- 3.2 How Is This Different from File Sharing in the Clouds?
- 3.3 How to detect and stop
4. Use of Nonstandard Service Ports
- 4.1 What is it, how does it work, and what's the danger?
- 4.2 How to Detect and Stop
- 4.3 Similarity to Anti-Censorship Strategies
5. SSL VPNs
- 5.1 What is it, how does it work, and what's the danger?
- 5.2 How to detect and stop
- 5.3 Observation
- 5.4 (Web) Application Proxies
6. Misused Online Conferencing Tools
- 6.1 What is it, how does it work, and what's the danger?
- 6.2 How to detect and stop
- 6.3 Examples of Browser Plugin Based and Application Based Conferencing Services
7. Encrypted File Transfer in Browser
- 7.1 What is it, how does it work, and what's the danger?
- 7.2 How to detect and stop
8. Cloud Services
- 8.1 Almost anyone with a credit card can start a cloud based server
- 8.2 How to detect and stop
- 8.3 Observation
9. File Sync Danger
- 9.1 What is it
- 9.2 How to detect and stop
- 9.3 Observation
10. Portable Apps
- 10.1 What is it, how does it work, and what's the danger?
- 10.2 How to detect and stop
- 10.3 Observation
11. Desktop Virtualization
- 11.1 What is it
- 11.2 How to block
- 11.3 Observation
- 11.4 Observation 2
12. Desktop Virtualization and TOR
- 12.1 What is it, how does it work, and what's the danger?
- 12.2 How to detect and stop
13. Unblocked TOR Access
- 13.1 Unblocked TOR access
- 13.2 How to detect and stop
- 13.3 Many Networks Do Not Block TOR
- 13.4 Observation
14. Anti-Censorship Services
- 14.1 What is it, how does it work, and what's the danger?
- 14.2 How to detect and stop
15. QUIC! Encrypted UDP Transport
- 15.1 What is it, how does it work, and what's the danger?
- 15.2 How to Block
- 15.3 Observation
- 15.4 Observation 2
Electronic Frontier Foundation
Defending your civil liberties in a digital world.https://www.eff.org/
Based in San Francisco, EFF is a donor-supported membership organization working to protect fundamental rights regardless of technology.
The Leanpub 45-day 100% Happiness Guarantee
Within 45 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers), EPUB (for phones and tablets) and MOBI (for Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
C++ Best PracticesJason Turner
Level up your C++, get the tools working for you, eliminate common problems, and move on to more exciting things!
Digital-First EventsJoep Piscaer and Jana Boruta
The only resource you will ever need to launch your digital events program.
C++20 is the next big C++ standard after C++11. As C++11 did it, C++20 changes the way we program modern C++. This change is, in particular, due to the big four of C++20: ranges, coroutines, concepts, and modules.
The book is almost daily updated. These incremental updates ease my interaction with the proofreaders.
Sockets and PipesType Classes
Sockets and Pipes is not an introduction to Haskell; it is an introduction to writing software in Haskell. Using a handful of everyday Haskell libraries, this book walks through reading the HTTP specification and implementing it to create a web server.
Atomic KotlinBruce Eckel and Svetlana Isakova
For both beginning and experienced programmers! From the author of the multi-award-winning Thinking in C++ and Thinking in Java together with a member of the Kotlin language team comes a book that breaks the concepts into small, easy-to-digest "atoms," along with exercises supported by hints and solutions directly inside IntelliJ IDEA!
Algebra-Driven DesignSandy Maguire
A how-to field guide on building leak-free abstractions and algebraically designing real-world applications.
Introducing EventStormingAlberto Brandolini
The deepest tutorial and explanation about EventStorming, straight from the inventor.
node-opcua by exampleEtienne Rossignon
Get the best out of node-opcua through a set of documented examples by the author himself that will allow you to create stunning OPCUA Servers or Clients.
Ansible for DevOpsJeff Geerling
Ansible is a simple, but powerful, server and configuration management tool. Learn to use Ansible effectively, whether you manage one server—or thousands.
Cloud StrategyGregor Hohpe
“Strategy is the difference between making a wish and making it come true.” A successful migration to the cloud can transform your organization, but it shouldn’t be driven by wishes. This book tells you how to develop a sound strategy guided by frameworks and decision models without being overly abstract nor getting lost in product details.
Software Architecture for Developers: Volumes 1 & 2 - Technical leadership and communication
2 Books"Software Architecture for Developers" is a practical and pragmatic guide to modern, lightweight software architecture, specifically aimed at developers. You'll learn:The essence of software architecture.Why the software architecture role should include coding, coaching and collaboration.The things that you really need to think about before...
Django for Beginners/APIs/Professionals
CCIE Service Provider Ultimate Study Bundle
2 BooksPiotr Jablonski, Lukasz Bromirski, and Nick Russo have joined forces to deliver the only CCIE Service Provider training resource you'll ever need. This bundle contains a detailed and challenging collection of workbook labs, plus an extensively detailed technical reference guide. All of us have earned the CCIE Service Provider certification...
Cisco CCNA 200-301 Complet
4 BooksCe lot comprend les quatre volumes du guide préparation à l'examen de certification Cisco CCNA 200-301.
Linux Administration Complet
4 BooksCe lot comprend les quatre volumes du Guide Linux Administration :Linux Administration, Volume 1, Administration fondamentale : Guide pratique de préparation aux examens de certification LPIC 1, Linux Essentials, RHCSA et LFCS. Administration fondamentale. Introduction à Linux. Le Shell. Traitement du texte. Arborescence de fichiers. Sécurité...
Modern Management Made Easy
3 BooksRead all three Modern Management Made Easy books. Learn to manage yourself, lead and serve others, and lead the organization.
3 BooksBuy every PowerShell book from Adam Bertram at a 20% discount!
2 BooksDocker and Kubernetes are taking the world by storm! These books will get you up-to-speed fast! Docker Deep Dive is over 400 pages long, and covers all objectives on the Docker Certified Associate exam.The Kubernetes Book includes everything you need to get up and running with Kubernetes!
CCDE Practical Studies (All labs)
3 BooksCCDE lab
All the Books of The Medical Futurist
6 BooksWe put together the most popular books from The Medical Futurist to provide a clear picture about the major trends shaping the future of medicine and healthcare. Digital health technologies, artificial intelligence, the future of 20 medical specialties, big pharma, data privacy, digital health investments and how technology giants such as Amazon...