|
|
Books > Computing & IT > Computer hardware & operating systems > General
Learn how to pentest your hardware with the most common attract
techniques and patterns Key Features Explore various pentesting
tools and techniques to secure your hardware infrastructure Protect
your hardware by finding potential entry points like glitches Find
the best practices for securely designing your products Book
DescriptionIf you're looking for hands-on introduction to
pentesting that delivers, then Practical Hardware Pentesting is for
you. This book will help you plan attacks, hack your embedded
devices, and secure the hardware infrastructure. Throughout the
book, you will see how a specific device works, explore the
functional and security aspects, and learn how a system senses and
communicates with the outside world. You'll set up a lab from
scratch and then gradually work towards an advanced hardware
lab-but you'll still be able to follow along with a basic setup. As
you progress, you'll get to grips with the global architecture of
an embedded system and sniff on-board traffic, learn how to
identify and formalize threats to the embedded system, and
understand its relationship with its ecosystem. You'll discover how
to analyze your hardware and locate its possible system
vulnerabilities before going on to explore firmware dumping,
analysis, and exploitation. The reverse engineering chapter will
get you thinking from an attacker point of view; you'll understand
how devices are attacked, how they are compromised, and how you can
harden a device against the most common hardware attack vectors. By
the end of this book, you will be well-versed with security best
practices and understand how they can be implemented to secure your
hardware. What you will learn Perform an embedded system test and
identify security critical functionalities Locate critical security
components and buses and learn how to attack them Discover how to
dump and modify stored information Understand and exploit the
relationship between the firmware and hardware Identify and attack
the security functions supported by the functional blocks of the
device Develop an attack lab to support advanced device analysis
and attacks Who this book is forIf you're a researcher or a
security professional who wants a comprehensive introduction into
hardware security assessment, then this book is for you. Electrical
engineers who want to understand the vulnerabilities of their
devices and design them with security in mind will also find this
book useful. You won't need any prior knowledge with hardware
pentensting before you get started; everything you need is in the
chapters.
Discover how to use the LEGO MINDSTORMS Inventor kit and boost your
confidence in robotics Key Features Gain confidence in building
robots using creative designs Learn advanced robotic features and
find out how to integrate them to build a robot Work with the block
coding language used in robotics software in a practical way Book
DescriptionLEGO MINDSTORMS Robot Inventor is the latest addition to
the LEGO MINDSTORMS theme. It features unique designs that you can
use to build robots, and also enable you to perform activities
using the robot inventor application. You'll begin by exploring the
history of LEGO MINDSTORMS, and then delve into various elements of
the Inventor kit. Moving on, you'll start working on different
projects which will prepare you to build a variety of smart robots.
The first robotic project involves designing a claw to grab
objects, and helps you to explore how a smart robot is used in
everyday life and in industry. The second project revolves around
building a working guitar that can be played and modified to meet
the needs of the user. As you advance, you'll explore the concept
of biomimicry as you discover how to build a scorpion robot. In
addition to this, you'll also work on a classic robotic challenge
by building a sumobot. Throughout the book, you'll come across a
variety of projects that will provide you with hands-on experience
in building creative robots, such as building a Dragster, Egg
Decorator, and Plankton from Spongebob Squarepants. By the end of
this LEGO book, you'll have got to grips with the concepts behind
building a robot, and also found creative ways to integrate them
using the application based on your creative insights and ideas.
What you will learn Discover how the Robot Inventor kit works, and
explore its parts and the elements inside them Delve into the block
coding language used to build robots Find out how to create
interactive robots with the help of sensors Understand the
importance of real-world robots in today's landscape Recognize
different ways to build new ideas based on existing solutions
Design basic to advanced level robots using the Robot Inventor kit
Who this book is forThis book is for robot enthusiasts, LEGO
lovers, hobbyists, educators, students, and anyone looking to learn
about the new LEGO Robot Inventor kit. This book is designed to go
beyond the basic build through to intermediate and advanced builds,
and enables you to add your personal flair to the builds and codes.
Get up to speed with various penetration testing techniques and
resolve security threats of varying complexity Key Features Enhance
your penetration testing skills to tackle security threats Learn to
gather information, find vulnerabilities, and exploit enterprise
defenses Navigate secured systems with the most up-to-date version
of Kali Linux (2019.1) and Metasploit (5.0.0) Book
DescriptionSending information via the internet is not entirely
private, as evidenced by the rise in hacking, malware attacks, and
security threats. With the help of this book, you'll learn crucial
penetration testing techniques to help you evaluate enterprise
defenses. You'll start by understanding each stage of pentesting
and deploying target virtual machines, including Linux and Windows.
Next, the book will guide you through performing intermediate
penetration testing in a controlled environment. With the help of
practical use cases, you'll also be able to implement your learning
in real-world scenarios. By studying everything from setting up
your lab, information gathering and password attacks, through to
social engineering and post exploitation, you'll be able to
successfully overcome security threats. The book will even help you
leverage the best tools, such as Kali Linux, Metasploit, Burp
Suite, and other open source pentesting tools to perform these
techniques. Toward the later chapters, you'll focus on best
practices to quickly resolve security threats. By the end of this
book, you'll be well versed with various penetration testing
techniques so as to be able to tackle security threats effectively
What you will learn Perform entry-level penetration tests by
learning various concepts and techniques Understand both common and
not-so-common vulnerabilities from an attacker's perspective Get
familiar with intermediate attack methods that can be used in
real-world scenarios Understand how vulnerabilities are created by
developers and how to fix some of them at source code level Become
well versed with basic tools for ethical hacking purposes Exploit
known vulnerable services with tools such as Metasploit Who this
book is forIf you're just getting started with penetration testing
and want to explore various security domains, this book is for you.
Security professionals, network engineers, and amateur ethical
hackers will also find this book useful. Prior knowledge of
penetration testing and ethical hacking is not necessary.
Learn how to deploy and monitor databases in the cloud, manipulate
documents, visualize data, and build applications running on
MongoDB using Node.js Key Features Learn the fundamentals of NoSQL
databases with MongoDB Create, manage, and optimize a MongoDB
database in the cloud using Atlas Use a real-world dataset to gain
practical experience of handling big data Book DescriptionMongoDB
is one of the most popular database technologies for handling large
collections of data. This book will help MongoDB beginners develop
the knowledge and skills to create databases and process data
efficiently. Unlike other MongoDB books, MongoDB Fundamentals dives
into cloud computing from the very start - showing you how to get
started with Atlas in the first chapter. You will discover how to
modify existing data, add new data into a database, and handle
complex queries by creating aggregation pipelines. As you progress,
you'll learn about the MongoDB replication architecture and
configure a simple cluster. You will also get to grips with user
authentication, as well as techniques for backing up and restoring
data. Finally, you'll perform data visualization using MongoDB
Charts. You will work on realistic projects that are presented as
bitesize exercises and activities, allowing you to challenge
yourself in an enjoyable and attainable way. Many of these
mini-projects are based around a movie database case study, while
the last chapter acts as a final project where you will use MongoDB
to solve a real-world problem based on a bike-sharing app. By the
end of this book, you'll have the skills and confidence to process
large volumes of data and tackle your own projects using MongoDB.
What you will learn Set up and use MongoDB Atlas on the cloud
Insert, update, delete, and retrieve data from MongoDB Build
aggregation pipelines to perform complex queries Optimize queries
using indexes Monitor databases and manage user authorization
Improve scalability and performance with sharding clusters
Replicate clusters, back up your database, and restore data Create
data-driven charts and reports from real-time data Who this book is
forThis book is designed for people who are new to MongoDB. It is
suitable for developers, database administrators, system
administrators, and cloud architects who are looking to use MongoDB
for smooth data processing in the cloud. Although not necessary,
basic knowledge of a general programming language and experience
with other databases will help you grasp the topics covered more
easily.
Discover powerful ways to effectively solve real-world machine
learning problems using key libraries including scikit-learn,
TensorFlow, and PyTorch Key Features Learn and implement machine
learning algorithms in a variety of real-life scenarios Cover a
range of tasks catering to supervised, unsupervised and
reinforcement learning techniques Find easy-to-follow code
solutions for tackling common and not-so-common challenges Book
DescriptionThis eagerly anticipated second edition of the popular
Python Machine Learning Cookbook will enable you to adopt a fresh
approach to dealing with real-world machine learning and deep
learning tasks. With the help of over 100 recipes, you will learn
to build powerful machine learning applications using modern
libraries from the Python ecosystem. The book will also guide you
on how to implement various machine learning algorithms for
classification, clustering, and recommendation engines, using a
recipe-based approach. With emphasis on practical solutions,
dedicated sections in the book will help you to apply supervised
and unsupervised learning techniques to real-world problems. Toward
the concluding chapters, you will get to grips with recipes that
teach you advanced techniques including reinforcement learning,
deep neural networks, and automated machine learning. By the end of
this book, you will be equipped with the skills you need to apply
machine learning techniques and leverage the full capabilities of
the Python ecosystem through real-world examples. What you will
learn Use predictive modeling and apply it to real-world problems
Explore data visualization techniques to interact with your data
Learn how to build a recommendation engine Understand how to
interact with text data and build models to analyze it Work with
speech data and recognize spoken words using Hidden Markov Models
Get well versed with reinforcement learning, automated ML, and
transfer learning Work with image data and build systems for image
recognition and biometric face recognition Use deep neural networks
to build an optical character recognition system Who this book is
forThis book is for data scientists, machine learning developers,
deep learning enthusiasts and Python programmers who want to solve
real-world challenges using machine-learning techniques and
algorithms. If you are facing challenges at work and want
ready-to-use code solutions to cover key tasks in machine learning
and the deep learning domain, then this book is what you need.
Familiarity with Python programming and machine learning concepts
will be useful.
Gain proficiency in monitoring infrastructure along with focusing
on cloud backup and recovery Key Features Explore the 3-2-1 rule of
backups in Veeam to keep your data safe Gain in-depth knowledge of
NAS backups and Scale-Out Repositories to use in your virtual
environment Discover Veeam's monitoring and reporting utility -
Veeam ONE - along with Linux and Window's proxy Book
DescriptionVeeam is one of the leading modern data protection
solutions, and mastering this technology can help you to protect
your virtual environments effectively. This book guides you through
implementing modern data protection solutions for your cloud and
virtual infrastructure with Veeam. You will even gain in-depth
knowledge of advanced concepts such as DataLabs, cloud backup and
recovery, Instant VM Recovery, and Veeam ONE. This book starts by
taking you through Veeam essentials, including installation, best
practices, and optimizations for Veeam Backup & Replication.
You'll get to grips with the 3-2-1 rule to safeguard data along
with understanding how to set up a backup server, proxies,
repositories, and more. Later chapters go on to cover a powerful
feature of Veeam 10 - NAS backup. As you progress, you'll learn
about scale-out Repositories and best practices for creating them.
In the concluding chapters, you'll explore the new proxy option
available in both Linux and Windows. Finally, you'll discover
advanced topics such as DataLabs, cloud backup and recovery,
Instant VM Recovery, and Veeam ONE. By the end of this book, you
will be equipped with the skills you need to implement Veeam Backup
& Replication for your environment and disaster recovery. What
you will learn Discover the advanced concepts of Veeam Backup &
Replication 10 Master application optimizations based on Veeam best
practices Understand how to configure NAS backups and work with
repositories and proxies Explore different ways to protect your
backups, including object immutability and cloud backup and
recovery Discover how DataLabs works Understand how Instant VM
Recovery allows you to restore virtual machines Become well versed
in Veeam ONE for monitoring and reporting on your environment Who
this book is forThis Veeam backup book is for IT professionals who
have intermediate to advanced-level knowledge of virtualization as
well as backups and backup applications. Anyone who needs a
reference guide for learning the advanced features of Veeam Backup
& Replication and how they are used, including best practices
and optimizations, will also find this book useful.
|
|