![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Kismet is the industry standard for examining wireless network
traffic, and is used by over 250,000 security professionals,
wireless networking enthusiasts, and WarDriving hobbyists.
This book is a convenient, targeted, single-source guide to
integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike
longwinded "comprehensive resources" it doesn't waste time
re-hashing general information on the architectures and purposes of
ISA and Exchange for raw beginners. Instead, its pragmatic purpose
is to smooth the path of the busy administrator who is under
pressure to get the integration done quickly, and done right, the
first time. It features "break-out sessions" for issues that
require in-depth discussion, "tips and tricks" sections that hone
in on and demystify trouble spots, and "FAQs" alphabetized by topic
that act as a quick-reference for readers who just want a quick
answer to a specific question.
As the cliche reminds us, information is power. In this age of
computer systems and technology, an increasing majority of the
world's information is stored electronically. It makes sense then
that as an industry we rely on high-tech electronic protection
systems to guard that information. As a professional hacker, I get
paid to uncover weaknesses in those systems and exploit them.
Whether breaking into buildings or slipping past industrial-grade
firewalls, my goal has always been the same: extract the
informational secrets using any means necessary. After hundreds of
jobs, I discovered the secret to bypassing every conceivable
high-tech security system. This book reveals those secrets, and as
the title suggests, it has nothing to do with high technology. As
it turns out, the secret isn't much of a secret at all. Hackers
have known about these techniques for years. Presented in a light,
accessible style, you'll get to ride shotgun with the authors on
successful real-world break-ins as they share photos, videos and
stories that prove how vulnerable the high-tech world is to no-tech
attacks.
Advances in mobile computing, wireless communications, mobile positioning, and sensor technologies have given rise to a new class of context-aware mobile and ubiquitous applications. ""Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability: Adaptive Technologies and Applications"" provides thorough insights and significant research developments on mobile technologies and services. This significant reference book explains how users of such applications access intelligent and adaptable information services, maximizing convenience and minimizing intrusion.
The perfect book for multi-tasked IT managers responsible for
securing the latest version of SQL Server 2005.
With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design. Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.
In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Communications consolidates the recent research initiatives directed towards exploiting the advantages of blockchain technology for benefiting several areas of applications that vary from security and robustness to scalability and privacy-preserving and more. The chapters explore the current applications of blockchain for networking and communications, the future potentials of blockchain technology, and some not-yet-prospected areas of research and its application. This book is ideal for practitioners, stakeholders, researchers, academicians, and students interested in the concepts of blockchain technology and the potential and pitfalls of its application in different utilization domains.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society. Documents how computer hacking fits into various forms of cybercrime Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking Clarifies the subtle differences between ethical and malicious hacks Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives
As network science and technology continues to gain popularity, it becomes imperative to develop procedures to examine emergent network domains, as well as classical networks, to help ensure their overall optimization. Advanced Methods for Complex Network Analysis features the latest research on the algorithms and analysis measures being employed in the field of network science. Highlighting the application of graph models, advanced computation, and analytical procedures, this publication is a pivotal resource for students, faculty, industry practitioners, and business professionals interested in theoretical concepts and current developments in network domains.
A virtual evolution in IT shops large and small has begun. VMware s
ESX Server is the enterprise tool to free your infrastructure from
its physical limitations providing the great transformation into a
virtual environment--this book shows you how. Use Syngress proven
How to Cheat methodology to configure and build VMware s ESX Server
version 3. This clear, concise guide provides all the information
you need to become a virtual whiz
Fuzzing is often described as a "black box" software testing
technique. It works by automatically feeding a program multiple
input iterations in an attempt to trigger an internal error
indicative of a bug, and potentially crash it. Such program errors
and crashes are indicative of the existence of a security
vulnerability, which can later be researched and fixed.
In this book, we aim to describe how to make a computer bend to
your will by finding and exploiting vulnerabilities specifically in
Web applications. We will describe common security issues in Web
applications, tell you how to find them, describe how to exploit
them, and then tell you how to fix them. We will also cover how and
why some hackers (the bad guys) will try to exploit these
vulnerabilities to achieve their own end. We will also try to
explain how to detect if hackers are actively trying to exploit
vulnerabilities in your own Web applications.
Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear,
concise, and thorough path to migrate from previous versions of ISA
Server to ISA Server 2006. ISA Server 2006 is an incremental
upgrade from ISA Server 2004, this book provides all of the tips
and tricks to perform a successful migration, rather than rehash
all of the features which were rolled out in ISA Server 2004. Also,
learn to publish Exchange Server 2007 with ISA 2006 and to build a
DMZ.
Electronic discovery refers to a process in which electronic data
is sought, located, secured, and searched with the intent of using
it as evidence in a legal case. Computer forensics is the
application of computer investigation and analysis techniques to
perform an investigation to find out exactly what happened on a
computer and who was responsible. IDC estimates that the U.S.
market for computer forensics will be grow from $252 million in
2004 to $630 million by 2009. Business is strong outside the United
States, as well. By 2011, the estimated international market will
be $1.8 billion dollars. The Techno Forensics Conference has
increased in size by almost 50% in its second year; another example
of the rapid growth in the market.
System administration is about the design, running and maintenance
of human-computer systems. Examples of human-computer systems
include business enterprises, service institutions and any
extensive machinery that is operated by, or interacts with human
beings. System administration is often thought of as the
technological side of a system: the architecture, construction and
optimization of the collaborating parts, but it also occasionally
touches on softer factors such as user assistance (help desks),
ethical considerations in deploying a system, and the larger
implications of its design for others who come into contact with
it.
An all-star cast of authors analyze the top IT security threats for
2008 as selected by the editors and readers of Infosecurity
Magazine. This book, compiled from the Syngress Security Library,
is an essential reference for any IT professional managing
enterprise security. It serves as an early warning system, allowing
readers to assess vulnerabilities, design protection schemes and
plan for disaster recovery should an attack occur. Topics include
Botnets, Cross Site Scripting Attacks, Social Engineering, Physical
and Logical Convergence, Payment Card Industry (PCI) Data Security
Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
This book will teach the reader how to make the most of their
WRT54G series hardware. These handy little inexpensive devices can
be configured for a near endless amount of networking tasks. The
reader will learn about the WRT54G s hardware components, the
different third-party firmware available and the differences
between them, choosing the firmware that is right for you, and how
to install different third-party firmware distributions. Never
before has this hardware been documented in this amount of detail,
which includes a wide-array of photographs and complete listing of
all WRT54G models currently available, including the
WRTSL54GS.
Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be addressed, there needs to be adequate support and provision for related training and education in order to ensure that staff know what is expected of them and have the necessary skills to follow through. Cybersecurity Education for Awareness and Compliance explores frameworks and models for teaching cybersecurity literacy in order to deliver effective training and compliance to organizational staff so that they have a clear understanding of what security education is, the elements required to achieve it, and the means by which to link it to the wider goal of good security behavior. Split across four thematic sections (considering the needs of users, organizations, academia, and the profession, respectively), the chapters will collectively identify and address the multiple perspectives from which action is required. This book is ideally designed for IT consultants and specialist staff including chief information security officers, managers, trainers, and organizations.
|
You may like...
Rubber-Pad Forming Processes…
Maziar Ramezani, Zaidi Mohd Ripin
Hardcover
R4,052
Discovery Miles 40 520
The Mammals of India - a Natural History…
T C (Thomas Claverhill) 18 Jerdon
Hardcover
R1,206
Discovery Miles 12 060
Dynamics of Large Mammal Populations
Charles W. Fowler, Tim D. Smith
Hardcover
R1,694
Discovery Miles 16 940
The Mammals of South Africa; v.2
William Lutley 1863-1944 Sclater
Hardcover
R870
Discovery Miles 8 700
Introduction to Nonparametric Statistics…
Thomas W. MacFarland, Jan M. Yates
Hardcover
R3,131
Discovery Miles 31 310
|