|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
|
Smart and Innovative Trends in Next Generation Computing Technologies
- Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II
(Paperback, 1st ed. 2018)
Pushpak Bhattacharyya, Hanumat G. Sastry, Venkatadri Marriboyina, Rashmi Sharma
|
R3,184
Discovery Miles 31 840
|
Ships in 10 - 15 working days
|
|
The two-volume set CCIS 827 and 828 constitutes the thoroughly
refereed proceedings of the Third International Conference on Next
Generation Computing Technologies, NGCT 2017, held in Dehradun,
India, in October 2017. The 135 full papers presented were
carefully reviewed and selected from 948 submissions. There were
organized in topical sections named: Smart and Innovative Trends in
Communication Protocols and Standards; Smart and Innovative Trends
in Computational Intelligence and Data Science; Smart and
Innovative Trends in Image Processing and Machine Vision; Smart
Innovative Trends in Natural Language Processing for Indian
Languages; Smart Innovative Trends in Security and Privacy.
|
Smart and Innovative Trends in Next Generation Computing Technologies
- Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I
(Paperback, 1st ed. 2018)
Pushpak Bhattacharyya, Hanumat G. Sastry, Venkatadri Marriboyina, Rashmi Sharma
|
R3,641
Discovery Miles 36 410
|
Ships in 10 - 15 working days
|
|
The two-volume set CCIS 827 and 828 constitutes the thoroughly
refereed proceedings of the Third International Conference on Next
Generation Computing Technologies, NGCT 2017, held in Dehradun,
India, in October 2017. The 135 full papers presented were
carefully reviewed and selected from 948 submissions. There were
organized in topical sections named: Smart and Innovative Trends in
Communication Protocols and Standards; Smart and Innovative Trends
in Computational Intelligence and Data Science; Smart and
Innovative Trends in Image Processing and Machine Vision; Smart
Innovative Trends in Natural Language Processing for Indian
Languages; Smart Innovative Trends in Security and Privacy.
Web penetration testing by becoming an ethical hacker. Protect the
web by learning the tools, and the tricks of the web application
attacker. Key Features Builds on books and courses on penetration
testing for beginners Covers both attack and defense perspectives
Examines which tool to deploy to suit different applications and
situations Book DescriptionBecoming the Hacker will teach you how
to approach web penetration testing with an attacker's mindset.
While testing web applications for performance is common, the
ever-changing threat landscape makes security testing much more
difficult for the defender. There are many web application tools
that claim to provide a complete survey and defense against
potential threats, but they must be analyzed in line with the
security needs of each web application or service. We must
understand how an attacker approaches a web application and the
implications of breaching its defenses. Through the first part of
the book, Adrian Pruteanu walks you through commonly encountered
vulnerabilities and how to take advantage of them to achieve your
goal. The latter part of the book shifts gears and puts the newly
learned techniques into practice, going over scenarios where the
target may be a popular content management system or a
containerized application and its network. Becoming the Hacker is a
clear guide to web application security from an attacker's point of
view, from which both sides can benefit. What you will learn Study
the mindset of an attacker Adopt defensive strategies Classify and
plan for standard web application security threats Prepare to
combat standard system security problems Defend WordPress and
mobile applications Use security tools and plan for defense against
remote execution Who this book is forThe reader should have basic
security experience, for example, through running a network or
encountering security issues during application development. Formal
education in security is useful, but not required. This title is
suitable for people with at least two years of experience in
development, network management, or DevOps, or with an established
interest in security.
Detailed walkthroughs of how to discover, test, and document common
web application vulnerabilities. Key Features Learn how to test for
common bugs Discover tools and methods for hacking ethically
Practice working through pentesting engagements step-by-step Book
DescriptionBug bounties have quickly become a critical part of the
security economy. This book shows you how technical professionals
with an interest in security can begin productively-and
profitably-participating in bug bounty programs. You will learn
about SQli, NoSQLi, XSS, XXE, and other forms of code injection.
You'll see how to create CSRF PoC HTML snippets, how to discover
hidden content (and what to do with it once it's found), and how to
create the tools for automated pentesting workflows. Then, you'll
format all of this information within the context of a bug report
that will have the greatest chance of earning you cash. With
detailed walkthroughs that cover discovering, testing, and
reporting vulnerabilities, this book is ideal for aspiring security
professionals. You should come away from this work with the skills
you need to not only find the bugs you're looking for, but also the
best bug bounty programs to participate in, and how to grow your
skills moving forward in freelance security research. What you will
learn Choose what bug bounty programs to engage in Understand how
to minimize your legal liability and hunt for bugs ethically See
how to take notes that will make compiling your submission report
easier Know how to take an XSS vulnerability from discovery to
verification, and report submission Automate CSRF PoC generation
with Python Leverage Burp Suite for CSRF detection Use WP Scan and
other tools to find vulnerabilities in WordPress, Django, and Ruby
on Rails applications Write your report in a way that will earn you
the maximum amount of money Who this book is forThis book is
written for developers, hobbyists, pentesters, and anyone with an
interest (and a little experience) in web application security.
Achieve the gold standard in penetration testing with Kali using
this masterpiece, now in its fourth edition Key Features Rely on
the most updated version of Kali to formulate your pentesting
strategies Test your corporate network against threats Explore new
cutting-edge wireless penetration tools and features Book
DescriptionKali Linux is a comprehensive penetration testing
platform with advanced tools to identify, detect, and exploit the
vulnerabilities uncovered in the target network environment. With
Kali Linux, you can apply the appropriate testing methodology with
defined business objectives and a scheduled test plan, resulting in
successful penetration testing project engagement. This fourth
edition of Kali Linux 2018: Assuring Security by Penetration
Testing starts with the installation of Kali Linux. You will be
able to create a full test environment to safely practice scanning,
vulnerability assessment, and exploitation. You'll explore the
essentials of penetration testing by collecting relevant data on
the target network with the use of several footprinting and
discovery tools. As you make your way through the chapters, you'll
focus on specific hosts and services via scanning and run
vulnerability scans to discover various risks and threats within
the target, which can then be exploited. In the concluding
chapters, you'll apply techniques to exploit target systems in
order to gain access and find a way to maintain that access. You'll
also discover techniques and tools for assessing and attacking
devices that are not physically connected to the network, including
wireless networks. By the end of this book, you will be able to use
NetHunter, the mobile version of Kali Linux, and write a detailed
report based on your findings. What you will learn Conduct the
initial stages of a penetration test and understand its scope
Perform reconnaissance and enumeration of target networks Obtain
and crack passwords Use Kali Linux NetHunter to conduct wireless
penetration testing Create proper penetration testing reports
Understand the PCI-DSS framework and tools used to carry out
segmentation scans and penetration testing Carry out wireless
auditing assessments and penetration testing Understand how a
social engineering attack such as phishing works Who this book is
forThis fourth edition of Kali Linux 2018: Assuring Security by
Penetration Testing is for pentesters, ethical hackers, and IT
security professionals with basic knowledge of Unix/Linux operating
systems. Prior knowledge of information security will help you
understand the concepts in this book
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage
security vulnerabilities of Ethereum Key Features Build end-to-end
decentralized Ethereum apps using Truffle, Web3, and Solidity
Explore various solution-based recipes to build smart contracts and
foolproof decentralized applications Develop decentralized
marketplaces from scratch, build wallets, and manage transactions
Book DescriptionEthereum and Blockchain will change the way
software is built for business transactions. Most industries have
been looking to leverage these new technologies to gain
efficiencies and create new business models and opportunities. The
Ethereum Cookbook covers various solutions such as setting up
Ethereum, writing smart contracts, and creating tokens, among
others. You'll learn about the security vulnerabilities, along with
other protocols of Ethereum. Once you have understood the basics,
you'll move on to exploring various design decisions and tips to
make your application scalable and secure. In addition to this,
you'll work with various Ethereum packages such as Truffle, Web3,
and Ganache. By the end of this book, you'll have comprehensively
grasped the Ethereum principles and ecosystem. What you will learn
Efficiently write smart contracts in Ethereum Build scalable
distributed applications and deploy them Use tools and frameworks
to develop, deploy, and test your application Use block explorers
such as Etherscan to find a specific transaction Create your own
tokens, initial coin offerings (ICOs), and games Understand various
security flaws in smart contracts in order to avoid them Who this
book is forThe Ethereum Cookbook is for you if you are a software
engineer, Blockchain developer, or research scientist who wants to
build smart contracts, develop decentralized applications, and
facilitate peer-to-peer transaction. It is assumed that you are
familiar with Blockchain concepts and have sound knowledge of
JavaScript.
|
PAM Mastery
(Hardcover)
Michael W Lucas
|
R1,028
R869
Discovery Miles 8 690
Save R159 (15%)
|
Ships in 10 - 15 working days
|
|
This book provides a broad overview of the many card systems and
solutions that are in practical use today. This new edition adds
content on RFIDs, embedded security, attacks and countermeasures,
security evaluation, javacards, banking or payment cards, identity
cards and passports, mobile systems security, and security
management. A step-by-step approach educates the reader in card
types, production, operating systems, commercial applications, new
technologies, security design, attacks, application development,
deployment and lifecycle management. By the end of the book the
reader should be able to play an educated role in a smart card
related project, even to programming a card application. This book
is designed as a textbook for graduate level students in computer
science. It is also as an invaluable post-graduate level reference
for professionals and researchers. This volume offers insight into
benefits and pitfalls of diverse industry, government, financial
and logistics aspects while providing a sufficient level of
technical detail to support technologists, information security
specialists, engineers and researchers.
|
Personal Analytics and Privacy. An Individual and Collective Perspective
- First International Workshop, PAP 2017, Held in Conjunction with ECML PKDD 2017, Skopje, Macedonia, September 18, 2017, Revised Selected Papers
(Paperback, 1st ed. 2017)
Riccardo Guidotti, Anna Monreale, Dino Pedreschi, Serge Abiteboul
|
R2,071
Discovery Miles 20 710
|
Ships in 10 - 15 working days
|
|
This book constitutes the thoroughly refereed post-conference
proceedings of the First International Workshop on Personal
Analytics and Privacy, PAP 2017, held in Skopje, Macedonia, in
September 2017. The 14 papers presented together with 2 invited
talks in this volume were carefully reviewed and selected for
inclusion in this book and handle topics such as personal
analytics, personal data mining and privacy in the context where
real individual data are used for developing a data-driven service,
for realizing a social study aimed at understanding nowadays
society, and for publication purposes.
Get more from your network by securing its infrastructure and
increasing its effectiveness Key Features Learn to choose the best
network scanning toolset for your system Implement different
concepts of network scanning such as port scanning and OS detection
Adapt a practical approach to securing your network Book
DescriptionNetwork scanning is the process of assessing a network
to identify an active host network; same methods can be used by an
attacker or network administrator for security assessment. This
procedure plays a vital role in risk assessment programs or while
preparing a security plan for your organization. Practical Network
Scanning starts with the concept of network scanning and how
organizations can benefit from it. Then, going forward, we delve
into the different scanning steps, such as service detection,
firewall detection, TCP/IP port detection, and OS detection. We
also implement these concepts using a few of the most prominent
tools on the market, such as Nessus and Nmap. In the concluding
chapters, we prepare a complete vulnerability assessment plan for
your organization. By the end of this book, you will have hands-on
experience in performing network scanning using different tools and
in choosing the best tools for your system. What you will learn
Achieve an effective security posture to design security
architectures Learn vital security aspects before moving to the
Cloud Launch secure applications with Web Application Security and
SQL Injection Explore the basics of threat detection/response/
mitigation with important use cases Learn all about integration
principles for PKI and tips to secure it Design a WAN
infrastructure and ensure security over a public WAN Who this book
is forIf you are a security professional who is responsible for
securing an organization's infrastructure, then this book is for
you.
Improve information security by learning Social Engineering. Key
Features Learn to implement information security using social
engineering Get hands-on experience of using different tools such
as Kali Linux, the Social Engineering toolkit and so on Practical
approach towards learning social engineering, for IT security Book
DescriptionThis book will provide you with a holistic understanding
of social engineering. It will help you to avoid and combat social
engineering attacks by giving you a detailed insight into how a
social engineer operates. Learn Social Engineering starts by giving
you a grounding in the different types of social engineering
attacks,and the damages they cause. It then sets up the lab
environment to use different toolS and then perform social
engineering steps such as information gathering. The book covers
topics from baiting, phishing, and spear phishing, to pretexting
and scareware. By the end of the book, you will be in a position to
protect yourself and your systems from social engineering threats
and attacks. All in all, the book covers social engineering from A
to Z , along with excerpts from many world wide known security
experts. What you will learn Learn to implement information
security using social engineering Learn social engineering for IT
security Understand the role of social media in social engineering
Get acquainted with Practical Human hacking skills Learn to think
like a social engineer Learn to beat a social engineer Who this
book is forThis book targets security professionals, security
analysts, penetration testers, or any stakeholder working with
information security who wants to learn how to use social
engineering techniques. Prior knowledge of Kali Linux is an added
advantage
This edited collection provides a series of accounts of workers'
local experiences that reflect the ubiquity of work's
digitalisation. Precarious gig economy workers ride bikes and drive
taxis in China and Britain; call centre workers in India experience
invasive tracking; warehouse workers discover that hidden data has
been used for layoffs; and academic researchers see their labour
obscured by a 'data foam' that does not benefit them. These cases
are couched in historical accounts of identity and selfhood
experiments seen in the Hawthorne experiments and the lineage of
automation. This book will appeal to scholars in the Sociology of
Work and Digital Labour Studies and anyone interested in learning
about monitoring and surveillance, automation, the gig economy and
the quantified self in the workplace.
|
|