|
Books > Computing & IT > Computer hardware & operating systems > General
Learn how to pentest your hardware with the most common attract
techniques and patterns Key Features Explore various pentesting
tools and techniques to secure your hardware infrastructure Protect
your hardware by finding potential entry points like glitches Find
the best practices for securely designing your products Book
DescriptionIf you're looking for hands-on introduction to
pentesting that delivers, then Practical Hardware Pentesting is for
you. This book will help you plan attacks, hack your embedded
devices, and secure the hardware infrastructure. Throughout the
book, you will see how a specific device works, explore the
functional and security aspects, and learn how a system senses and
communicates with the outside world. You'll set up a lab from
scratch and then gradually work towards an advanced hardware
lab-but you'll still be able to follow along with a basic setup. As
you progress, you'll get to grips with the global architecture of
an embedded system and sniff on-board traffic, learn how to
identify and formalize threats to the embedded system, and
understand its relationship with its ecosystem. You'll discover how
to analyze your hardware and locate its possible system
vulnerabilities before going on to explore firmware dumping,
analysis, and exploitation. The reverse engineering chapter will
get you thinking from an attacker point of view; you'll understand
how devices are attacked, how they are compromised, and how you can
harden a device against the most common hardware attack vectors. By
the end of this book, you will be well-versed with security best
practices and understand how they can be implemented to secure your
hardware. What you will learn Perform an embedded system test and
identify security critical functionalities Locate critical security
components and buses and learn how to attack them Discover how to
dump and modify stored information Understand and exploit the
relationship between the firmware and hardware Identify and attack
the security functions supported by the functional blocks of the
device Develop an attack lab to support advanced device analysis
and attacks Who this book is forIf you're a researcher or a
security professional who wants a comprehensive introduction into
hardware security assessment, then this book is for you. Electrical
engineers who want to understand the vulnerabilities of their
devices and design them with security in mind will also find this
book useful. You won't need any prior knowledge with hardware
pentensting before you get started; everything you need is in the
chapters.
This undergraduate textbook first introduces basic electronic
circuitry before explaining more advanced elements such as the
Arithmetic Logic Unit, sequential circuits, and finally
microprocessors. In keeping with this integrated and graduated
approach, the authors then explain the relationship to first
assembly programming, then higher-level languages, and finally
computer organisation. Authors use the Raspberry Pi and ARM
microprocessors for their explanations The material has been
extensively class tested at TU Eindhoven by an experienced team of
lecturers and researchers. This is a modern, holistic treatment of
well-established topics, valuable for undergraduate students of
computer science and electronics engineering and for self-study.
The authors use the Raspberry Pi and ARM microprocessors for their
explanations.
Die Umstellung auf die Digitaltechnik kommt einer Revolution in der
Film- und TV-Produktion gleich, fur die neue Techniken eingesetzt
werden: Scene-linear Color Workflow, digitale Kameratechnik,
Digital Compositing, Depth- und Deep-Compositing, Stereo3D,
3D-Modelling und Rendering zur Verwendung in Live-Action-Footage
sowie Lidar-unterstutztes Matchmoving und Keying von
Greenscreen-Aufnahmen sind Kernthemen dieses Buchs, die zu neuen
Workflow-bezogenen Produktionsketten fuhren. Die Autoren erlautern
die Grundlagen dieser modernen Produktionsketten in Film, Fernsehen
und VFX fur professionelle Anwender.
Learn Tuxedo by developing solutions in Python for real-world
problems Key Features Understand Tuxedo through a modern lens by
experimenting with Python code Boost your productivity by using
Python programming to perform common Tuxedo programming tasks
Manage real-world integration tasks with small Python programs Book
DescriptionDespite being developed in the 1980s, Oracle Tuxedo
still runs a significant part of critical infrastructure and is not
going away any time soon. Modernizing Oracle Tuxedo Applications
with Python will help you get to grips with the most important
Tuxedo concepts by writing Python code. The book starts with an
introduction to Oracle Tuxedo and guides you in installing its
latest version and Python bindings for Tuxedo on Linux. You'll then
learn how to build your first server and client, configure Tuxedo,
and start running an application. As you advance, you'll understand
load balancing and work with the BBL server, which is at the heart
of a Tuxedo application. This Tuxedo book will also cover Boolean
expressions and different ways to export Tuxedo buffers for storage
and transmission, before showing you how to implement servers and
clients and use the management information base to change the
configuration dynamically. Once you've learned how to configure
Tuxedo for transactions and control them in application code,
you'll discover how to use the store-and-forward functionality to
reach destinations and use an Oracle database from a Tuxedo
application. By the end of this Oracle Tuxedo book, you'll be able
to perform common Tuxedo programming tasks with Python and
integrate Tuxedo applications with other parts of modern
infrastructure. What you will learn Understand Oracle Tuxedo as a
microservice platform Develop Oracle Tuxedo applications using
Python 3 Perform administration tasks programmatically with Python
3 Extract Tuxedo statistics for monitoring application performance
Integrate Tuxedo into the modern software ecosystem Understand how
distributed transactions work in Tuxedo Who this book is forThis
book is for developers who are new to Tuxedo and are looking to
develop a new modern front-end or integrate Tuxedo in their
applications. The book will also help experienced Tuxedo, C or
COBOL developers to improve their productivity and QA engineers to
automate Tuxedo application tests. Beginner-level knowledge of
Python and Linux shell is required before getting started with this
book.
Emerging scientific and industrial applications in today's world
require significant computing power. Modern software tools are
available for such platforms but are relatively complex and require
the use of innovative programming models. One promising area in
modern software design is the development, analysis, and
implementation of algorithms and adaptive methods. These
advancements in programming are promising but lack relevant
research and understanding. Formal and Adaptive Methods for
Automation of Parallel Programs Construction: Emerging Research and
Opportunities is an essential reference source that solves the
problem of the development of efficient models, methods, and tools
for parallel programming automation based on the algebra of
algorithms, term rewriting, and auto-tuning paradigms. The results
of this book will help to further develop and improve existing
research on design, synthesis, and optimization of sequential and
parallel algorithms and programs. Featuring research on topics such
as auto-tuning methods, graphics processing, and algorithmic
language, this book is ideally designed for mathematicians,
software engineers, data scientists, researchers, academicians, and
students seeking coverage on developing tools for automated design
and parallel programs.
Build 12 robotics models using LEGO WeDo 2.0. This book features
models created especially to introduce LEGO enthusiasts to hardware
and software concepts while creating robots inspired by natural
wildlife. You'll learn the basics behind different mechanisms and
principals required to build walking robots. Simultaneously, make
your model "come to life" by incorporating powerful yet simple
programming techniques. For every model, go through all the phases
to explore each robot's functionality, solve problems using
creativity, identify issues, and propose solutions. The authors's
expertise working in education, mathematics, programming,
electronic, and robotics came together to produce this book. The
methodology used is designed to help you discover new knowledge,
that has been used historically in science. It relies on
observation, measurement, experimentation and formulation,
analysis, and modification of hypotheses. All activities are
carried out following the methodology created by the authors called
5 phases of educational robotics (5PER), which are: design,
construction, programming, testing and, finally, documenting and
sharing With Robotics Models Using LEGO WeDo 2.0 you'll create
solutions to specific, tangible problems while building fun and
engaging LEGO models and learning to program them to accomplish
basic tasks. What You'll Learn Create your own LEGO WeDo 2.0
inventions using the design principles in this book Understand the
mechanics behind animal motions by developing robotic prototypes
and how they interact with our environment through the use of
sensors and actuators Solve problems by using an iconographic
programming language for the implementation of algorithms Who This
Book Is For LEGO enthusiasts and students who want to prototype
solutions to challenges using mechanical and computer science
engineering. Teachers and parents of younger LEGO enthusiasts will
also find the book a helpful guide to introducing the world of
robotics in a dynamic and fun way.
Cryptographic applications, such as RSA algorithm, ElGamal
cryptography, elliptic curve cryptography, Rabin cryptosystem,
Diffie -Hellmann key exchange algorithm, and the Digital Signature
Standard, use modular exponentiation extensively. The performance
of all these applications strongly depends on the efficient
implementation of modular exponentiation and modular
multiplication. Since 1984, when Montgomery first introduced a
method to evaluate modular multiplications, many algorithmic
modifications have been done for improving the efficiency of
modular multiplication, but very less work has been done on the
modular exponentiation to improve the efficiency. This research
monograph addresses the question- how can the performance of
modular exponentiation, which is the crucial operation of many
public-key cryptographic techniques, be improved? The book focuses
on Energy Efficient Modular Exponentiations for Cryptographic
hardware. Spread across five chapters, this well-researched text
focuses in detail on the Bit Forwarding Techniques and the
corresponding hardware realizations. Readers will also discover
advanced performance improvement techniques based on high radix
multiplication and Cryptographic hardware based on multi-core
architectures.
Implement real-time data processing applications on the Raspberry
Pi. This book uniquely helps you work with data science concepts as
part of real-time applications using the Raspberry Pi as a
localized cloud. You'll start with a brief introduction to data
science followed by a dedicated look at the fundamental concepts of
Python programming. Here you'll install the software needed for
Python programming on the Pi, and then review the various data
types and modules available. The next steps are to set up your Pis
for gathering real-time data and incorporate the basic operations
of data science related to real-time applications. You'll then
combine all these new skills to work with machine learning concepts
that will enable your Raspberry Pi to learn from the data it
gathers. Case studies round out the book to give you an idea of the
range of domains where these concepts can be applied. By the end of
Data Science with the Raspberry Pi, you'll understand that many
applications are now dependent upon cloud computing. As Raspberry
Pis are cheap, it is easy to use a number of them closer to the
sensors gathering the data and restrict the analytics closer to the
edge. You'll find that not only is the Pi an easy entry point to
data science, it also provides an elegant solution to cloud
computing limitations through localized deployment. What You Will
Learn Interface the Raspberry Pi with sensors Set up the Raspberry
Pi as a localized cloud Tackle data science concepts with Python on
the Pi Who This Book Is For Data scientists who are looking to
implement real-time applications using the Raspberry Pi as an edge
device and localized cloud. Readers should have a basic knowledge
in mathematics, computers, and statistics. A working knowledge of
Python and the Raspberry Pi is an added advantage.
Get to grips with building reliable, scalable, and maintainable
database solutions for enterprises and production databases Key
Features Implement PostgreSQL 13 features to perform end-to-end
modern database management Design, manage, and build enterprise
database solutions using a unique recipe-based approach Solve
common and not-so-common challenges faced while working to achieve
optimal database performance Book DescriptionPostgreSQL has become
the most advanced open source database on the market. This book
follows a step-by-step approach, guiding you effectively in
deploying PostgreSQL in production environments. The book starts
with an introduction to PostgreSQL and its architecture. You'll
cover common and not-so-common challenges faced while designing and
managing the database. Next, the book focuses on backup and
recovery strategies to ensure your database is steady and achieves
optimal performance. Throughout the book, you'll address key
challenges such as maintaining reliability, data integrity, a
fault-tolerant environment, a robust feature set, extensibility,
consistency, and authentication. Moving ahead, you'll learn how to
manage a PostgreSQL cluster and explore replication features for
high availability. Later chapters will assist you in building a
secure PostgreSQL server, along with covering recipes for
encrypting data in motion and data at rest. Finally, you'll not
only discover how to tune your database for optimal performance but
also understand ways to monitor and manage maintenance activities,
before learning how to perform PostgreSQL upgrades during downtime.
By the end of this book, you'll be well-versed with the essential
PostgreSQL 13 features to build enterprise relational databases.
What you will learn Understand logical and physical backups in
Postgres Demonstrate the different types of replication methods
possible with PostgreSQL today Set up a high availability cluster
that provides seamless automatic failover for applications Secure a
PostgreSQL encryption through authentication, authorization, and
auditing Analyze the live and historic activity of a PostgreSQL
server Understand how to monitor critical services in Postgres 13
Manage maintenance activities and performance tuning of a
PostgreSQL cluster Who this book is forThis PostgreSQL book is for
database architects, database developers and administrators, or
anyone who wants to become well-versed with PostgreSQL 13 features
to plan, manage, and design efficient database solutions. Prior
experience with the PostgreSQL database and SQL language is
expected.
|
You may like...
Embedded Systems
D.P. Kothari, Shriram K. Vasudevan, …
Paperback
R1,053
Discovery Miles 10 530
|