Title search results
Showing 28981 - 29000 of 65004 items
The Pentester BluePrint: Starting a Career as an Ethical Hacker
By Phillip L. Wylie, Kim Crawley. 2021
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers…
readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bountiesDiscover why privacy is a counterproductive, if not obsolete, concept in this startling new book It's only a matter of…
time-- the modern notion of privacy is quickly evaporating because of technological advancement and social engagement. Whether we like it or not, all our actions and communications are going to be revealed for everyone to see. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity takes a controversial and insightful look at the concept of privacy and persuasively argues that preparing for a post-private future is better than exacerbating the painful transition by attempting to delay the inevitable. Security expert and author Ben Malisow systematically dismantles common notions of privacy and explains how: Most arguments in favor of increased privacy are wrong Privacy in our personal lives leaves us more susceptible to being bullied or blackmailed Governmental and military privacy leads to an imbalance of power between citizen and state Military supremacy based on privacy is an obsolete concept Perfect for anyone interested in the currently raging debates about governmental, institutional, corporate, and personal privacy, and the proper balance between the public and the private, Exposed also belongs on the shelves of security practitioners and policymakers everywhere.Recent Advances in Network Simulation: The OMNeT++ Environment and its Ecosystem (EAI/Springer Innovations in Communication and Computing)
By Antonio Virdis, Michael Kirsche. 2019
This book provides a comprehensive introduction to the OMNeT++ simulation environment and an overview of its ecosystem of ever-growing frameworks,…
which provide simulation models for diverse communication systems, protocols, and standards. The book covers the most recent advances of the three key points in the OMNeT++ environment: (1) The latest features that are being added to OMNeT++ itself, including improvements in the visualization options, in data processing, etc. (2) A comprehensive description of the current state of development and the work in progress of the main simulation frameworks, covering several aspects of communication such as vehicular, cellular, and sensor networks. (3) The latest advances and novel developments coming from a large research community. The presentation is guided through use cases and examples, always keeping in mind the practical and research purposes of the simulation process. Includes an introduction to the OMNeT++ simulation framework and its main features;Gives a comprehensive overview of ongoing research topics that exploits OMNeT++ as the simulation environment;Provides examples and uses cases focusing on the practical aspects of simulation.Big Data and Smart Digital Environment (Studies in Big Data #53)
By Yousef Farhaoui, Laila Moussaid. 2019
This book reviews the state of the art of big data analysis and smart city. It includes issues which pertain…
to signal processing, probability models, machine learning, data mining, database, data engineering, pattern recognition, visualisation, predictive analytics, data warehousing, data compression, computer programming, smart city, etc. Data is becoming an increasingly decisive resource in modern societies, economies, and governmental organizations. Data science inspires novel techniques and theories drawn from mathematics, statistics, information theory, computer science, and social science. Papers in this book were the outcome of research conducted in this field of study. The latter makes use of applications and techniques related to data analysis in general and big data and smart city in particular. The book appeals to advanced undergraduate and graduate students, postdoctoral researchers, lecturers and industrial researchers, as well as anyone interested in big data analysis and smart city.Model Validation and Uncertainty Quantification, Volume 3: Proceedings of the 38th IMAC, A Conference and Exposition on Structural Dynamics, 2020, the third…
volume of nine from the Conference brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on fundamental and applied aspects of Model Validation and Uncertainty Quantification, including papers on:Uncertainty Quantification in Material ModelsUncertainty Propagation in Structural DynamicsPractical Applications of MVUQAdvances in Model Validation & Uncertainty Quantification: Model UpdatingModel Validation & Uncertainty Quantification: Industrial ApplicationsControlling UncertaintyUncertainty in Early Stage DesignModeling of Musical InstrumentsOverview of Model Validation and UncertaintyComputational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers (Communications
By Manuel Graña, Suresh Balusamy, Alexander N. Dudin, A. Kaja Mohideen, N. K. Sreelaja, B. Malar. 2020
This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2019,…
which was held in Coimbatore, India, in December 2019. The 9 papers presented in this volume were carefully reviewed and selected from 38 submissions. They were organized in topical sections named: computational intelligence; cyber security; and computational models.Domain-Driven Laravel: Learn to Implement Domain-Driven Design Using Laravel
By Jesse Griffin. 2021
Map concepts and ideas in domain-driven design (DDD) and transpose them into clean, testable, and quality code that is effective…
alongside the Laravel framework. This book teaches you how to implement the concepts and patterns present in DDD in the real world as a complete web application. With these tactics and concepts in place, you'll engage in a variety of example applications, built from the ground up, and taken directly from real-world domains. Begin by reviewing foundational stepping stones (with small, manageable examples to show proof of concepts as well as illustrations to conceptualize the more complex topics) of both DDD and Laravel. Specifically, such topics as entities, value objects, developing an ubiquitous language, DTOs, and knowledge discovery. Next, you will dive into some more advanced topics of DDD and use these concepts as a guide to make customizations to the default Laravel installation, giving you an understanding of why these alterations are vital to the DDD and Laravel platform. Finally, you will cover the very powerful Eloquent ORM that comes stock with Laravel and understand how it can be utilized to represent entities, handle repositories, and support domain events. Although there is a basic coverage chapter and a setup tutorial for Laravel (along with a high level intro about the components used within it), Domain-Driven Laravel is best suited to readers who have been at least exposed to the framework and have had the opportunity to tinker around with it.What You'll Learn Utilize a blazing-fast rapid development pipeline built from DDD building blocks and facilitated with LaravelImplement value objects, repositories, entities, anti-corruption layers and others using Laravel as a web frameworkApply enhanced techniques for quick prototyping of complex requirements and quality results using an iterative and focused approach Create a base framework (Laravel) that can serve as a template to start off any projectGain insight on which details are important to a project’s success and how to acquire the necessary knowledge Who This Book Is ForIdeal for for frontend/backend web developers, devops engineers, Laravel framework lovers and PHP developers hoping to learn more about either Domain Driven Design or the possibilities with the Laravel framework. Those with a working knowledge of plain PHP can also gain value from reading this book.Advances in Computer, Communication and Computational Sciences: Proceedings of IC4S 2019 (Advances in Intelligent Systems and Computing #1158)
By Sanjiv K. Bhatia, Shailesh Tiwari, K. K. Mishra, Su Ruidan, Munesh Chandra Trivedi. 2021
This book discusses recent advances in computer and computational sciences from upcoming researchers and leading academics around the globe. It…
presents high-quality, peer-reviewed papers presented at the International Conference on Computer, Communication and Computational Sciences (IC4S 2019), which was held on 11—12 October 2019 in Bangkok. Covering a broad range of topics, including intelligent hardware and software design, advanced communications, intelligent computing techniques, intelligent image processing, the Web and informatics, it offers readers from the computer industry and academia key insights into how the advances in next-generation computer and communication technologies can be shaped into real-life applications.This book presents the theoretical and experimental investigations on antiferromagnetically coupled ferrimagnets and reveals new aspects of ferrimagnetic dynamics in…
terms of the role of angular momentum. The purpose of this book is to show readers that antiferromagnets/ferrimagnets are useful in spintronic devices in that (1) The nonadiabatic spintransfer torque in antiferromagnets acts as a staggered magnetic field, which can drive the magnetic domain walls, and (2) The Gilbert damping parameter α, the energy dissipation rate associated with the magnetic dynamics of ferrimagnets, is insensitive to temperature in contrast to the conventional understanding that the effective α of ferrimagnets diverges at the angular momentum compensation temperature. This book provides readers with a scientific platform of ferrimagnetic dynamics, which serves as a useful basis for realizing the next generation of spintronic devices.Technologies and Innovation: 6th International Conference, CITI 2020, Guayaquil, Ecuador, November 30 – December 3, 2020, Proceedings (Communications in Computer and Information Science #1309)
By Rafael Valencia-García, Néstor Vera-Lucio, Martha Bucaram-Leverone, Javier Del Cioppo-Morstadt, Gema Alcaraz-Marmol. 2020
This book constitutes the proceedings of the 6th International Conference on Technologies and Innovation, CITI 2020, held in Guayaquil, Ecuador,…
in November-December 2020.The 16 full papers presented in this volume were carefully reviewed and selected from 41 submissions. They are organized in topical sections named: semantic technologies and machine learning; ICT for agronomy and environment; mobile and collaborative technologies.Graph Theory and Its Applications (Textbooks in Mathematics)
By Mark Anderson, Jonathan L. Gross, Jay Yellen. 2018
Graph Theory and Its Applications, Third Edition is the latest edition of the international, bestselling textbook for undergraduate courses in graph…
theory, yet it is expansive enough to be used for graduate courses as well. The textbook takes a comprehensive, accessible approach to graph theory, integrating careful exposition of classical developments with emerging methods, models, and practical needs. The authors’ unparalleled treatment is an ideal text for a two-semester course and a variety of one-semester classes, from an introductory one-semester course to courses slanted toward classical graph theory, operations research, data structures and algorithms, or algebra and topology. Features of the Third Edition Expanded coverage on several topics (e.g., applications of graph coloring and tree-decompositions) Provides better coverage of algorithms and algebraic and topological graph theory than any other text Incorporates several levels of carefully designed exercises that promote student retention and develop and sharpen problem-solving skills Includes supplementary exercises to develop problem-solving skills, solutions and hints, and a detailed appendix, which reviews the textbook’s topics About the Authors Jonathan L. Gross is a professor of computer science at Columbia University. His research interests include topology and graph theory. Jay Yellen is a professor of mathematics at Rollins College. His current areas of research include graph theory, combinatorics, and algorithms. Mark Anderson is also a mathematics professor at Rollins College. His research interest in graph theory centers on the topological or algebraic side.Serious Games: Joint International Conference, JCSG 2020, Stoke-on-Trent, UK, November 19–20, 2020, Proceedings (Lecture Notes in Computer Science #12434)
By Minhua Ma, Tim Marsh, Stefan Göbel, Jannicke Baalsrud Hauge, Bobbie Fletcher. 2020
This book constitutes the refereed proceedings of the 6th Joint International Conference on Serious Games, JCSG 2020, held in Stoke-on-Trent,…
UK, in November 2020. The 19 full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers offer a wide range in the use of serious games in several fields like learning, simulation, training, health, well-being, management, assessment or marketing and much more.Oracle Database Transactions and Locking Revealed: Building High Performance Through Concurrency
By Darl Kuhn, Thomas Kyte. 2021
Access much-needed information for building scalable, high-concurrency applications and deploying them against the Oracle Database. This new edition is updated…
to be current with Oracle Database 19. It includes a new chapter with troubleshooting recipes to help you quickly diagnose and resolve locking problems that are urgent and block production.Good transaction design is an important facet of highly-concurrent applications that are run by hundreds, even thousands, of users who are executing transactions at the same time. Transaction design, in turn, relies on a good understanding of how the database engine manages the locking of resources to prevent access conflicts and data loss that might otherwise result from concurrent access to data in the database. This book provides a solid and accurate explanation of how locking and concurrency are dealt with by Oracle Database. You will learn how the Oracle Database architecture accommodates user transactions, and how you can write code to mesh with the way in which Oracle Database is designed to operate.Oracle Database Transactions and Locking Revealed covers in detail the various lock types, and also different locking schemes such as pessimistic and optimistic locking. Then you will learn about transaction isolation and multi-version concurrency, and how the various lock types support Oracle Database’s transactional features. You will learn tips for transaction design, as well as some bad practices and habits to avoid. Coverage is also given to redo and undo, and their role in concurrency. The book is loaded with insightful code examples that drive home each concept. This is an important book that anyone developing highly-concurrent applications will want to have handy on their shelf.What You Will LearnAvoid application lockups due to conflicts over accessing the same resourceUnderstand how Oracle prevents one application from overwriting another’s modificationsCreate transaction designs that mesh with how Oracle Database is designedBuild high-throughput applications supporting thousands of concurrent usersDesign applications to take full advantage of Oracle’s powerful database engineGain a fundamental knowledge of Oracle’s transaction and locking architectureDevelop techniques to quickly diagnose and resolve common locking issuesWho This Book Is ForOracle developers and database administrators faced with troubleshooting and solving deadlocks, locking contention, and similar problems that are encountered in high-concurrency environments; and application developers wanting to design their applications to excel at multi-user concurrency by taking full advantage of Oracle Database’s multi-versioning and concurrency supportLinux Containers and Virtualization: A Kernel Perspective
By Shashank Mohan Jain. 2020
Get a novel perspective on Linux containers and understand the world of virtualization. This book takes you down the rabbit…
hole to discover what lies below the API. You’ll go on a journey of virtualization and see how containers are realized in the Linux world. Linux Containers and Virtualization details the data structures within the Linux kernel which make up Linux containers. You will start with the fundamentals of virtualization including how different resources such as memory, CPU, network, and storage are virtualized. Then you will move on to hypervisors and virtualization using the Kernel virtual Machine (KVM) and Quick Emulator (QEMU). Next, you will learn about Linux namespace, cgroups, and layered file systems, which are the essential building blocks of Linux containers. The explanation traverses the Linux kernel codebase to show how these are realized in the Linux kernel. In the final chapter, you will code your own container by applying the concepts learnt in the previous chapters. On completion of the book, you will have the knowledge to start coding a Linux container. What You Will Learn Understand the basics of virtualizationDiscover how the Linux kernel supports virtualization See how the evolution of the Linux kernel and CPUs led to the creation of containerization technologiesDevelop the ability to create your own container framework Who This Book Is For Developers working on virtualized software deployment and containers. Architects designing platforms based on a container runtime as well as DevOps professionals who want to get a microscopic view on how containers and virtualization work would find the book useful.Jewish Exiles’ Psychological Interpretations of Nazism
By Avihu Zakai. 2020
This book examines works of four German-Jewish scholars who, in their places of exile, sought to probe the pathology of…
the Nazi mind: Wilhelm Reich’s The Mass Psychology of Fascism (1933), Erich Fromm’s Escape from Freedom (1941), Siegfried Kracauer’s From Caligari to Hitler: A Psychological History of the German Film (1947), and Erich Neumann’s Depth Psychology and a New Ethic (1949). While scholars have examined these authors’ individual legacies, no comparative analysis of their shared concerns has yet been undertaken, nor have the content and form of their psychological inquiries into Nazism been seriously and systematically analyzed. Yet, the sense of urgency in their works calls for attention. They all took up their pens to counter Nazi barbarism, believing, like the English jurist and judge Sir William Blackstone, who wrote in 1753 - scribere est agere ("to write is to act").Building Secure Firmware: Armoring the Foundation of the Platform
By Vincent Zimmer, Jiewen Yao. 2020
Use this book to build secure firmware.As operating systems and hypervisors have become successively more hardened, malware has moved further…
down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today’s antivirus scanning technology, it represents an interesting target for attackers.As platforms are universally network-connected and can contain multiple devices with firmware, and a global supply chain feeds into platform firmware, assurance is critical for consumers, IT enterprises, and governments. This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement. This book covers the secure implementation of various aspects of firmware, including standards-based firmware—such as support of the Trusted Computing Group (TCG), Desktop Management Task Force (DMTF), and Unified Extensible Firmware Interface (UEFI) specifications—and also provides code samples and use cases. Beyond the standards, alternate firmware implementations such as ARM Trusted Firmware and other device firmware implementations (such as platform roots of trust), are covered. What You Will Learn Get an overview of proactive security development for firmware, including firmware threat modelingUnderstand the details of architecture, including protection, detection, recovery, integrity measurement, and access controlBe familiar with best practices for secure firmware development, including trusted execution environments, cryptography, and language-based defensesKnow the techniques used for security validation and maintenanceWho This Book Is ForGiven the complexity of modern platform boot requirements and the threat landscape, this book is relevant for readers spanning from IT decision makers to developers building firmwareThe LEGO Arduino Cookbook: Expanding the Realm of MINDSTORMS EV3 Invention
By Grady Koch. 2020
Push into new fields of technology using LEGO and Arduino with the projects in this Cookbook. MINDSTORMS EV3 inventions don’t…
have to be confined to LEGO factory-made sensors. Incorporate a wide range of sensors, displays, LED arrays, actuators, and even a smartphone into your creations. Add amazing capabilities to your LEGOs by building things such as a metal detector, long-range lidar, audio spectrum analyzer, weather station, and a smartphone. Step-by-step instructions bring these new devices to life. You’ll work with the reliable and inexpensive Arduino UNO to take your projects even further and make them truly smart. Learn to set up and program your Arduino UNO. Then learn data communications protocols (I2C, SPI, and PWM) to link sensors to the Arduino. A variety of data communications techniques are also demonstrated on passing data between the Arduino and the MINDSTORMS EV3 Intelligent Brick. Equipped with these new tools, LEGO inventors can build vast new capabilities into their designs. What You'll LearnInterface new sensors, devices, and communications with LEGO Mindstorms EV3Work with communication protocols of pulse width modulation (PWM), I2c, and SPIConvert pulse width modulation to analog voltage with resistor and capacitor componentsWho This Book Is ForTech savvy fans of LEGO projects and hardware hackers. Also coaches or students involved in a school science/technology project or design competition.Scientism: Science, Ethics and Religion (Routledge Revivals Ser.)
By Mikael Stenmark. 2002
This title was first published in 20/11/2001: The intellectual and practical successes of science have led some scientists to think…
that there are no real limits to the competence of scienece, and no limits to what can be achieved in the name of science. This view (and similar views) have been called Scientism. In this book, scientists' views about science and its relationship to knowledge, ethics and religion are subjected to critical scrutiny. A number of natural scientists have advocated Scientism in one form or another - Francis Crick, Richard Dawkins, Carl Sagan, and Edward O. Wilson - and their impact inside and outside the sciences is considered. Clarifying what Scientism is, this book proceeds to evaluate its key claims, expounded in questions such as: is it the case that science can tell us everything there is to know about reality? Can science tell us how we morally ought to live and what the meaning of life is? Can science in fact be our new religion? Ought we become "science believers"? The author addresses these and similar issues, concluding that Scientism is not really science but disguised materialism or naturalism; its advocates fail to see this, not being sufficiently aware that their arguments presuppose the previous acceptance of certain extra-scientific or philosophical beliefsPaul Ricoeur and Contemporary Moral Thought
By John Wall; William Schweiker; W. David Hall. 2002
This book explores and proposes new avenues for contemporary moral thought. It defines and assesses the significance of the writings…
of French philosopher Paul Ricoeur for ethics. The book also explores what matters most to persons and how best to sustain just communities.Hacken für Dummies (Für Dummies)
By Kevin Beaver. 2021
Um einen Hacker zu überlisten, müssen Sie sich in dessen Denkweise hineinversetzen. Deshalb lernen Sie mit diesem Buch, wie ein…
Bösewicht zu denken. Der Fachmann für IT-Sicherheit Kevin Beaver teilt mit Ihnen sein Wissen über Penetrationstests und typische Schwachstellen in IT-Systemen. Er zeigt Ihnen, wo Ihre Systeme verwundbar sein könnten, sodass Sie im Rennen um die IT-Sicherheit die Nase vorn behalten. Denn nur wenn Sie die Schwachstellen in Ihren Systemen kennen, können Sie sich richtig dagegen schützen und die Hacker kommen bei Ihnen nicht zum Zug!