|
|
Books > Computing & IT > Computer communications & networking > Network security
Security in Virtual Worlds, 3D Webs, and Immersive Environments:
Models for Development, Interaction, and Management brings together
the issues that managers, practitioners, and researchers must
consider when planning, implementing, working within, and managing
these promising virtual technologies for secure processes and
initiatives. This publication discusses the uses and potential of
these virtual technologies and examines secure policy formation and
practices that can be applied specifically to each.
IT Security Governance Innovations: Theory and Research provides
extraordinary research which highlights the main contributions and
characteristics of existing approaches, standards, best practices,
and new trends in IT Security Governance. With theoretical and
practical perspectives, the book aims to address IT Security
Governance implementation in corporate organizations. This
collection of works serves as a reference for CEOs and CIOs,
security managers, systems specialists, computer science students,
and much more.
 |
Coding Theory
(Hardcover)
Sudhakar Radhakrishnan, Muhammad Sarfraz
|
R3,093
Discovery Miles 30 930
|
Ships in 18 - 22 working days
|
|
|
One of the biggest buzzwords in the IT industry for the past few
years, virtualization has matured into a practical requirement for
many best-practice business scenarios, becoming an invaluable tool
for security professionals at companies of every size. In addition
to saving time and other resources, virtualization affords
unprecedented means for intrusion and malware detection,
prevention, recovery, and analysis. Taking a practical approach in
a growing market underserved by books, this hands-on title is the
first to combine in one place the most important and sought-after
uses of virtualization for enhanced security, including sandboxing,
disaster recovery and high availability, forensic analysis, and
honeypotting.
Already gaining buzz and traction in actual usage at an impressive
rate, Gartner research indicates that virtualization will be the
most significant trend in IT infrastructure and operations over the
next four years. A recent report by IT research firm IDC predicts
the virtualization services market will grow from $5.5 billion in
2006 to $11.7 billion in 2011. With this growth in adoption,
becoming increasingly common even for small and midsize businesses,
security is becoming a much more serious concern, both in terms of
how to secure virtualization and how virtualization can serve
critical security objectives.
Titles exist and are on the way to fill the need for securing
virtualization, but security professionals do not yet have a book
outlining the many security applications of virtualization that
will become increasingly important in their job requirements. This
book is the first to fill that need, covering tactics such as
isolating a virtual environment on the desktop for application
testing, creating virtualized storage solutions for immediate
disaster recovery and high availability across a network, migrating
physical systems to virtual systems for analysis, and creating
complete virtual systems to entice hackers and expose potential
threats to actual production systems.
About the Technologies
A sandbox is an isolated environment created to run and test
applications that might be a security risk. Recovering a
compromised system is as easy as restarting the virtual machine to
revert to the point before failure. Employing virtualization on
actual production systems, rather than just test environments,
yields similar benefits for disaster recovery and high
availability. While traditional disaster recovery methods require
time-consuming reinstallation of the operating system and
applications before restoring data, backing up to a virtual machine
makes the recovery process much easier, faster, and efficient. The
virtual machine can be restored to same physical machine or an
entirely different machine if the original machine has experienced
irreparable hardware failure. Decreased downtime translates into
higher availability of the system and increased productivity in the
enterprise.
Virtualization has been used for years in the field of forensic
analysis, but new tools, techniques, and automation capabilities
are making it an increasingly important tool. By means of
virtualization, an investigator can create an exact working copy of
a physical computer on another machine, including hidden or
encrypted partitions, without altering any data, allowing complete
access for analysis. The investigator can also take a live
?snapshot? to review or freeze the target computer at any point in
time, before an attacker has a chance to cover his tracks or
inflict further damage.
A honeypot is a system that looks and acts like a production
environment but is actually a monitored trap, deployed in a network
with enough interesting data to attract hackers, but created to log
their activity and keep them from causing damage to the actual
production environment. A honeypot exposes new threats, tools, and
techniques used by hackers before they can attack the real systems,
which security managers patch based on the information gathered.
Before virtualization became mainstream, setting up a machine or a
whole network (a honeynet) for research purposes only was
prohibitive in both cost and time management. Virtualization makes
this technique more viable as a realistic approach for companies
large and small.
* The first book to collect a comprehensive set of all
virtualization security tools and strategies in a single
volume
* Covers all major virtualization platforms, including market
leader VMware, Xen, and Microsoft's Hyper-V virtualization
platform, a new part of Windows Server 2008 releasing in June
2008
* Breadth of coverage appeals to a wide range of security
professionals, including administrators, researchers, consultants,
and forensic
"While Nokia is perhaps most recognized for its leadership in the
mobile phone market, they have successfully demonstrated their
knowledge of the Internet security appliance market and its
customers requirements."
--Chris Christiansen, Vice President, Internet Infrastructure and
Security Software, IDC.
Syngress has a long history of publishing market-leading books for
system administrators and security professionals on commercial
security products, particularly Firewall and Virtual Private
Network (VPN) appliances from Cisco, Check Point, Juniper,
SonicWall, and Nokia (see related titles for sales histories). The
Nokia Firewall, VPN, and IPSO Configuration Guide will be the only
book on the market covering the all-new Nokia Firewall/VPN
Appliance suite. Nokia Firewall/VPN appliances are designed to
protect and extend the network perimeter.
According to IDC research, Nokia Firewall/VPN Appliances hold the
#3 worldwide market-share position in this space behind Cisco and
Juniper/NetScreen. IDC estimated the total Firewall/VPN market at
$6 billion in 2007, and Nokia owns 6.6% of this market. Nokia's
primary customers for security appliances are Mid-size to Large
enterprises who need site-to-site connectivity and Mid-size to
Large enterprises who need remote access connectivity through
enterprise-deployed mobile devices. Nokia appliances for this
market are priced form $1,000 for the simplest devices (Nokia IP60)
up to $60,0000 for large enterprise- and service-provider class
devices (like the Nokia IP2450 released in Q4 2007). While the
feature set of such a broad product range obviously varies greatly,
all of the appliances run on the same operating system: Nokia IPSO
(IPSO refers to Ipsilon Networks, a company specializing in IP
switching acquired by Nokia in 1997. The definition of the acronym
has little to no meaning for customers.) As a result of this common
operating system across the product line, The Nokia Firewall, VPN,
and IPSO Configuration Guide will be an essential reference to
users of any of these products. Users manage the Nokia IPSO (which
is a Linux variant, specifically designed for these appliances)
through a Web interface called Nokia Network Voyager or via a
powerful Command Line Interface (CLI). Coverage within the book
becomes increasingly complex relative to the product line.
The Nokia Firewall, VPN, and IPSO Configuration Guide and companion
Web site will provide seasoned network administrators and security
professionals with the in-depth coverage and step-by-step
walkthroughs they require to properly secure their network
perimeters and ensure safe connectivity for remote users. The book
contains special chapters devoted to mastering the complex Nokia
IPSO command line, as well as tips and tricks for taking advantage
of the new "ease of use" features in the Nokia Network Voyager Web
interface. In addition, the companion Web site offers downloadable
video walkthroughs on various installation and troubleshooting tips
from the authors.
* Only book on the market covering Nokia Firewall/VPN appliances,
which hold 6.6% of a $6 billion market
* Companion website offers video walkthroughs on various
installation and troubleshooting tips from the authors
* Special chapters detail mastering the complex Nokia IPSO command
line, as well as tips and tricks for taking advantage of the new
"ease of use" features in the Nokia Network Voyager Web interface
One of the hottest topics in computer forensics today, electronic
discovery (e-discovery) is the process by which parties involved in
litigation respond to requests to produce electronically stored
information (ESI). According to the 2007 Socha-Gelbmann Electronic
Discovery Survey, it is now a $2 billion industry, a 60% increase
from 2004, projected to double by 2009. The core reason for the
explosion of e-discovery is sheer volume; evidence is digital and
75% of modern day lawsuits entail e-discovery.
A recent survey reports that U.S. companies face an average of 305
pending lawsuits internationally. For large U.S. companies ($1
billion or more in revenue)that number has soared to 556 on
average, with an average of 50 new disputes emerging each year for
nearly half of them. To properly manage the role of digital
information in an investigative or legal setting, an
enterprise--whether it is a Fortune 500 company, a small accounting
firm or a vast government agency--must develop an effective
electronic discovery program. Since the amendments to the Federal
Rules of Civil Procedure, which took effect in December 2006, it is
even more vital that the lifecycle of electronically stored
information be understood and properly managed to avoid risks and
costly mistakes.
This books holds the keys to success for systems administrators,
information security and other IT department personnel who are
charged with aiding the e-discovery process.
*Comprehensive resource for corporate technologists, records
managers, consultants, and legal team members to the e-discovery
process, with information unavailable anywhere else
*Offers a detailed understanding of key industry trends, especially
the Federal Rules of Civil Procedure, that are driving the adoption
of e-discovery programs
*Includes vital project management metrics to help monitor
workflow, gauge costs and speed the process
*Companion Website offers e-discovery tools, checklists, forms,
workflow examples, and other tools to be used when conducting
e-discovery strategy
The Newnes Know It All Series takes the best of what our authors
have written to create hard-working desk references that will be an
engineer's first port of call for key information, design
techniques and rules of thumb. Guaranteed not to gather dust on a
shelf
Communications engineers need to master a wide area of topics to
excel. The "Wireless Security Know It All" covers every angle
including Emerging Wireless Technologies and Security Issues,
Wireless LAN and MAN Security, as well as Wireless Personal Area
Networks.
A 360-degree view from our best-selling authors
Topics include Today s Wireless Technology, Security Definitions
and Concepts, and Wireless Handheld devices
The ultimate hard-working desk reference; all the essential
information, techniques and tricks of the trade in one volume"
Today all companies, U.S. federal agencies, and non-profit
organizations have valuable data on their servers that needs to be
secured. One of the challenges for IT experts is learning how to
use new products in a time-efficient manner, so that new
implementations can go quickly and smoothly. Learning how to set up
sophisticated products is time-consuming, and can be confusing.
GFI's LANguard Network Security Scanner reports vulnerabilities so
that they can be mitigated before unauthorized intruders can wreck
havoc on your network. To take advantage of the best things that
GFI's LANguard Network Security Scanner has to offer, you'll want
to configure it on your network so that it captures key events and
alerts you to potential vulnerabilities before they are exploited.
In this book Brien Posey has pinpointed the most important concepts
with examples and screenshots so that systems administrators and
security engineers can understand how to get the GFI security tools
working quickly and effectively. His straightforward, no nonsense
writing style is devoid of difficult to understand technical
jargon. His descriptive examples explain how GFI's security tools
enhance the security controls that are already built into your
server's operating system.
* Secure Your Network Master the various components that make up
the management console and prepare to use it for most tasks.
* Analyze Scan Results View detected vulnerabilities, save and
print results, query open ports, and filter your results.
* Install and Use the ReportPack Learn how to build custom reports
and schedule reports. See how filters allow you to control the
information that is processed when a reports is run.
* Perform a Hardware Inventory and Compile a Software Inventory Use
GFI to do your inventories and perform audits. See how to blacklist
and whitelist applications to make your reports more meaningful.
* Manage Patches Effectively See how to deploy a specific patch,
perform a scan comparison, uninstall a patch, and deploy custom
software.
* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for
users trying to install unauthorized software, copy sensitive data
onto removable media, or perform other actions to try and
circumvent your network's security.
* Create Protection Policies Control the level of device access
allowed on a system and create separate protection policies; one
for servers, one for workstations, and one for laptops. Learn how
to deploy agents.
* Regulate Specific Devices Master some of the advanced features of
GFI: locking device categories, blacklisting and whitelisting
devices, and using file type restrictions.
* Monitor Device Usage Keep tabs on your network by setting logging
options, setting alerting options, and generating end point
security reports.
* Use GFI EndPointSecurity to Lock Down Hardware
* Create Protection Policies to Control the Level of Device
Access
* Master Advanced Features of GFI: Locking Device Categories,
Blacklisting and Whitelisting Devices, Using File Type Restrictions
and More
Malware has gone mobile, and the security landscape is changing
quickly with emerging attacks on cell phones, PDAs, and other
mobile devices. This first book on the growing threat covers a wide
range of malware targeting operating systems like Symbian and new
devices like the iPhone. Examining code in past, current, and
future risks, protect your banking, auctioning, and other
activities performed on mobile devices.
* Visual Payloads
View attacks as visible to the end user, including notation of
variants.
* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging
threates.
* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their
variations.
* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and
payload strategies.
* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing
(SMishing) techniques.
* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile
device threats.
* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use
"MobileSandbox" to analyze mobile malware.
* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key
differences in mobile forensics.
* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious
code for analysis.
* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against
attacks, and remediate incidents.
* Understand the History and Threat Landscape of Rapidly Emerging
Mobile Attacks
* Analyze Mobile Device/Platform Vulnerabilities and Exploits
* Mitigate Current and Future Mobile Malware Threats
From transportation to healthcare, IoT has been heavily implemented
into practically every professional industry, making these systems
highly susceptible to security breaches. Because IoT connects not
just devices but also people and other entities, every component of
an IoT system remains vulnerable to attacks from hackers and other
unauthorized units. This clearly portrays the importance of
security and privacy in IoT, which should be strong enough to keep
the entire platform and stakeholders secure and smooth enough to
not disrupt the lucid flow of communication among IoT entities.
Applied Approach to Privacy and Security for the Internet of Things
is a collection of innovative research on the methods and applied
aspects of security in IoT-based systems by discussing core
concepts and studying real-life scenarios. While highlighting
topics including malware propagation, smart home vulnerabilities,
and bio-sensor safety, this book is ideally designed for security
analysts, software security engineers, researchers, computer
engineers, data scientists, security professionals, practitioners,
academicians, and students seeking current research on the various
aspects of privacy and security within IoT.
Technological innovations in the banking sector have provided
numerous benefits to customers and banks alike; however, the use of
e-banking increases vulnerability to system attacks and threats,
making effective security measures more vital than ever. Online
Banking Security Measures and Data Protection is an authoritative
reference source for the latest scholarly material on the
challenges presented by the implementation of e-banking in
contemporary financial systems. Presenting emerging techniques to
secure these systems against potential threats and highlighting
theoretical foundations and real-world case studies, this book is
ideally designed for professionals, practitioners, upper-level
students, and technology developers interested in the latest
developments in e-banking security.
Around the world, SCADA (supervisory control and data acquisition)
systems and other real-time process control networks run
mission-critical infrastructure--everything from the power grid to
water treatment, chemical manufacturing to transportation. These
networks are at increasing risk due to the move from proprietary
systems to more standard platforms and protocols and the
interconnection to other networks. Because there has been limited
attention paid to security, these systems are seen as largely
unsecured and very vulnerable to attack.
This book addresses currently undocumented security issues
affecting SCADA systems and overall critical infrastructure
protection. The respective co-authors are among the leading experts
in the world capable of addressing these related-but-independent
concerns of SCADA security. Headline-making threats and
countermeasures like malware, sidejacking, biometric applications,
emergency communications, security awareness llanning, personnel
& workplace preparedness and bomb threat planning will be
addressed in detail in this one of a kind book-of-books dealing
with the threats to critical infrastructure protection. They
collectivly have over a century of expertise in their respective
fields of infrastructure protection. Included among the
contributing authors are Paul Henry, VP of Technology Evangelism,
Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone
Technologies, Phil Drake, Telecommunications Director, The
Charlotte Observer, Patrice Bourgeois, Tenable Network Security,
Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb
Squad Commander, CMPD.
* Internationally known experts provide a detailed discussion of
the complexities of SCADA security and its impact on critical
infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA
and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat
planning, emergency communications, employee safety and much
more
* Companion Website featuring video interviews with subject matter
experts offer a "sit-down" with the leaders in the field
 |
Kismet Hacking
(Paperback)
Frank Thornton, Michael J. Schearer, Brad Haines
|
R1,154
Discovery Miles 11 540
|
Ships in 10 - 15 working days
|
|
|
Kismet is the industry standard for examining wireless network
traffic, and is used by over 250,000 security professionals,
wireless networking enthusiasts, and WarDriving hobbyists.
Unlike other wireless networking books that have been published in
recent years that geared towards Windows users, Kismet Hacking is
geared to those individuals that use the Linux operating system.
People who use Linux and want to use wireless tools need to use
Kismet. Now with the introduction of Kismet NewCore, they have a
book that will answer all their questions about using this great
tool. This book continues in the successful vein of books for
wireless users such as WarDriving: Drive, Detect Defend.
*Wardrive Running Kismet from the BackTrack Live CD
*Build and Integrate Drones with your Kismet Server
*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive
Citrix Presentation Server allows remote users to work off a
network server as if they weren't remote. That means: Incredibly
fast access to data and applications for users, no third party VPN
connection, and no latency issues. All of these features make
Citrix Presentation Server a great tool for increasing access and
productivity for remote users. Unfortunately, these same features
make Citrix just as dangerous to the network it's running on. By
definition, Citrix is granting remote users direct access to
corporate servers?..achieving this type of access is also the holy
grail for malicious hackers. To compromise a server running Citrix
Presentation Server, a hacker need not penetrate a heavily defended
corporate or government server. They can simply compromise the far
more vulnerable laptop, remote office, or home office of any
computer connected to that server by Citrix Presentation Server.
All of this makes Citrix Presentation Server a high-value target
for malicious hackers. And although it is a high-value target,
Citrix Presentation Servers and remote workstations are often
relatively easily hacked, because they are often times deployed by
overworked system administrators who haven't even configured the
most basic security features offered by Citrix. "The problem, in
other words, isn't a lack of options for securing Citrix instances;
the problem is that administrators aren't using them." (eWeek,
October 2007). In support of this assertion Security researcher
Petko D. Petkov, aka "pdp," said in an Oct. 4 posting that his
recent testing of Citrix gateways led him to "tons" of "wide-open"
Citrix instances, including 10 on government domains and four on
military domains.
* The most comprehensive book published for system administrators
providing step-by-step instructions for a secure Citrix
Presentation Server.
* Special chapter by Security researcher Petko D. Petkov'aka "pdp
detailing tactics used by malicious hackers to compromise Citrix
Presentation Servers.
* Companion Web site contains custom Citrix scripts for
administrators to install, configure, and troubleshoot Citrix
Presentation Server.
Network Security: Know It All explains the basics, describes the
protocols, and discusses advanced topics, by the best and brightest
experts in the field of network security.
Assembled from the works of leading researchers and practitioners,
this best-of-the-best collection of chapters on network security
and survivability is a valuable and handy resource. It consolidates
content from the field's leading experts while creating a
one-stop-shopping opportunity for readers to access the information
only otherwise available from disparate sources.
* Chapters contributed by recognized experts in the field cover
theory and practice of network security technology, allowing the
reader to develop a new level of knowledge and technical expertise.
* Up-to-date coverage of network security issues facilitates
learning and lets the reader remain current and fully informed from
multiple viewpoints.
* Presents methods of analysis and problem-solving techniques,
enhancing the reader's grasp of the material and ability to
implement practical solutions.
* Examples illustrate core security concepts for enhanced
comprehension
As the cliche reminds us, information is power. In this age of
computer systems and technology, an increasing majority of the
world's information is stored electronically. It makes sense then
that as an industry we rely on high-tech electronic protection
systems to guard that information. As a professional hacker, I get
paid to uncover weaknesses in those systems and exploit them.
Whether breaking into buildings or slipping past industrial-grade
firewalls, my goal has always been the same: extract the
informational secrets using any means necessary. After hundreds of
jobs, I discovered the secret to bypassing every conceivable
high-tech security system. This book reveals those secrets, and as
the title suggests, it has nothing to do with high technology. As
it turns out, the secret isn't much of a secret at all. Hackers
have known about these techniques for years. Presented in a light,
accessible style, you'll get to ride shotgun with the authors on
successful real-world break-ins as they share photos, videos and
stories that prove how vulnerable the high-tech world is to no-tech
attacks.
As you browse this book, you'll hear old familiar terms like
"dumpster diving," "social engineering," and "shoulder surfing."
Some of these terms have drifted into obscurity to the point of
becoming industry folklore; the tactics of the pre-dawn information
age. But make no mistake; these and other old-school tactics work
with amazing effectiveness today. In fact, there's a very good
chance that someone in your organization will fall victim to one or
more of these attacks this year. Will they be ready?
-Dumpster Diving
Be a good sport and don't read the two "D" words written in big
boldletters above, and act surprised when I tell you hackers can
accomplish this without relying on a single bit of technology
(punny).
-Tailgating
Hackers and ninja both like wearing black, and they do share the
ability to slip inside a building and blend with the shadows.
-Shoulder Surfing
If you like having a screen on your laptop so you can see what
you're working on, don't read this chapter.
-Physical Security
Locks are serious business and lock technicians are true engineers,
most backed with years of hands-on experience. But what happens
when you take the age-old respected profession of the locksmith and
sprinkle it with hacker ingenuity?
-Social Engineering with Jack Wiles
Jack has trained hundreds of federal agents, corporate attorneys,
CEOs and internal auditors on computer crime and security-related
topics. His unforgettable presentations are filled with three
decades of personal "war stories" from the trenches of Information
Security and Physical Security.
-Google Hacking
A hacker doesn't even need his own computer to do the necessary
research. If he can make it to a public library, Kinko's or
Internet cafe, he can use Google to process all that data into
something useful.
-P2P Hacking
Let's assume a guy has no budget, no commercial hacking software,
no support from organized crime and no fancy gear. With all those
restrictions, is this guy still a threat to you? Have a look at
this chapter and judge for yourself.
-People Watching
Skilled people watchers can learn a whole lot in just a few quick
glances. In this chapter we'll take a look at a few examples of the
types of things that draws a no-tech hacker's eye.
-Kiosks
Whathappens when a kiosk is more than a kiosk? What happens when
the kiosk holds airline passenger information? What if the kiosk
holds confidential patient information? What if the kiosk holds
cash?
-Vehicle Surveillance
Most people don't realize that some of the most thrilling vehicular
espionage happens when the cars aren't moving at all!
Offering a structured approach to handling and recovering from a
catastrophic data loss, this book will help both technical and
non-technical professionals put effective processes in place to
secure their business-critical information and provide a roadmap of
the appropriate recovery and notification steps when calamity
strikes.
*Addresses a very topical subject of great concern to security,
general IT and business management
*Provides a step-by-step approach to managing the consequences of
and recovering from the loss of sensitive data.
*Gathers in a single place all information about this critical
issue, including legal, public relations and regulatory issues
With the prevalence of cyber crime and cyber warfare, software
developers must be vigilant in creating systems which are
impervious to cyber attacks. Thus, security issues are an integral
part of every phase of software development and an essential
component of software design. Security-Aware Systems Applications
and Software Development Methods facilitates the promotion and
understanding of the technical as well as managerial issues related
to secure software systems and their development practices. This
book, targeted toward researchers, software engineers, and field
experts, outlines cutting-edge industry solutions in software
engineering and security research to help overcome contemporary
challenges.
In recent years, the surge of blockchain technology has been rising
due to is proven reliability in ensuring secure and effective
transactions, even between untrusted parties. Its application is
broad and covers public and private domains varying from
traditional communication networks to more modern networks like the
internet of things and the internet of energy crossing fog and edge
computing, among others. As technology matures and its standard use
cases are established, there is a need to gather recent research
that can shed light on several aspects and facts on the use of
blockchain technology in different fields of interest. Enabling
Blockchain Technology for Secure Networking and Communications
consolidates the recent research initiatives directed towards
exploiting the advantages of blockchain technology for benefiting
several areas of applications that vary from security and
robustness to scalability and privacy-preserving and more. The
chapters explore the current applications of blockchain for
networking and communications, the future potentials of blockchain
technology, and some not-yet-prospected areas of research and its
application. This book is ideal for practitioners, stakeholders,
researchers, academicians, and students interested in the concepts
of blockchain technology and the potential and pitfalls of its
application in different utilization domains.
This book provides an in-depth exploration of the phenomenon of
hacking from a multidisciplinary perspective that addresses the
social and technological aspects of this unique activity as well as
its impact. What defines the social world of hackers? How do
individuals utilize hacking techniques against corporations,
governments, and the general public? And what motivates them to do
so? This book traces the origins of hacking from the 1950s to today
and provides an in-depth exploration of the ways in which hackers
define themselves, the application of malicious and ethical hacking
techniques, and how hackers' activities are directly tied to the
evolution of the technologies we use every day. Rather than
presenting an overly technical discussion of the phenomenon of
hacking, this work examines the culture of hackers and the
technologies they exploit in an easy-to-understand format.
Additionally, the book documents how hacking can be applied to
engage in various forms of cybercrime, ranging from the creation of
malicious software to the theft of sensitive information and
fraud-acts that can have devastating effects upon our modern
information society. Documents how computer hacking fits into
various forms of cybercrime Describes the subculture of computer
hackers and explains how this social world plays an integral role
in the business of hacking Clarifies the subtle differences between
ethical and malicious hacks Focuses on the non-technical aspects of
computer hacking to enable the reader to better understand the
actors and their motives
A virtual evolution in IT shops large and small has begun. VMware s
ESX Server is the enterprise tool to free your infrastructure from
its physical limitations providing the great transformation into a
virtual environment--this book shows you how. Use Syngress proven
How to Cheat methodology to configure and build VMware s ESX Server
version 3. This clear, concise guide provides all the information
you need to become a virtual whiz
This book will detail the default and custom installation of VMware
s ESX server as well as basic and advanced virtual machine
configurations. It will then walk the reader through post
installation configurations including installation and
configuration of VirtualCenter. From here, readers will learn to
efficiently create and deploy virtual machine templates. Best
practices for securing and backing up your virtual environment are
also provided. The book concludes with a series of handy,
time-saving command and configuration for: bash shell keystrokes,
Linux commands, configuration files, common/proc files, VMware ESX
commands, and troubleshooting.
Reap the Benefits of Server Virtualization
Realize improved ROI, ensure efficient mergers and acquisitions,
and reduce compliance risk exposure through server virtualization
and consolidation.
Build a Virtual Machine
Create a Gold Master and use your VMlibrary to leverage the power
and flexibility of VMware.
Manage Your Virtual Infrastructure
Use VMware tools to partition physical servers and manage virtual
machines.
Set Up Scripted Installation
See how a scripted installation method can be a fast and efficient
way to provision ESX hosts.
Master ESX Native Tools
Use tools like Esxtop to diagnose performance issues and vmkfstools
to import and export
Install and Use VMware Scripting APIs
Develop programs to help automate and ease administration even with
a limited background in scripting or programming.
Learn the Fundamentals of a VM Backup
VMware ESX ships with three scripts that work together to create a
backup and restore system: vmsnap.pl, vmsnap_all.pl, and
vmres.pl.
Extend a Cloned Windows VM s Root Partition
Use Microsoft s Sysprep utility to extend a newly deployed virtual
machine s root partition from the original clone size to a larger
size."
Fuzzing is often described as a "black box" software testing
technique. It works by automatically feeding a program multiple
input iterations in an attempt to trigger an internal error
indicative of a bug, and potentially crash it. Such program errors
and crashes are indicative of the existence of a security
vulnerability, which can later be researched and fixed.
Fuzz testing is now making a transition from a hacker-grown tool to
a commercial-grade product. There are many different types of
applications that can be fuzzed, many different ways they can be
fuzzed, and a variety of different problems that can be uncovered.
There are also problems that arise during fuzzing; when is enough
enough? These issues and many others are fully explored.
-Learn How Fuzzing Finds Vulnerabilities
Eliminate buffer overflows, format strings and other potential
flaws
-Find Coverage of Available Fuzzing Tools
Complete coverage of open source and commercial tools and their
uses
-Build Your Own Fuzzer
Automate the process of vulnerability research by building your own
tools
-Understand How Fuzzing Works within the Development Process
Learn how fuzzing serves as a quality assurance tool for your own
and third-party software
|
|