|
Showing 1 - 10 of
10 matches in All Departments
This reference text establishes linkages between the user
industries and the providers of clean technologies and sustainable
materials for a rapid transformation of the small and medium-sized
enterprises (SMEs). The text covers several aspects of sustainable
applications including clean technologies, climate change and its
effects, sustainable buildings (smart cities), sustainability in
road construction, sustainable use of geosynthetic, innovative
materials, and sustainable construction practices. The text will be
useful for senior undergraduate students, graduate students, and
researchers in the fields of civil engineering and other
infrastructure-related professionals and planners. The book:
Discusses clean technologies and sustainable materials in depth
Covers concepts of sustainability in road construction, and water
retaining structures Examines environmental policies and practices
Discusses climate change and its effects in a comprehensive manner
Covers sustainable buildings including smart cities As this book
discusses concepts related to sustainable civil engineering
practices in a single volume, it will be an ideal reference text
for everyone aiming at developments of sustainable infrastructures.
Wo Tumse Kahenge Ki (They will tell you that) is a collection of
poems that will appeal to readers of every age and class. One of
the attractions of this collection is its diversity as various
forms and colours of life have been presented beautifully by the
poet in different sections of the book titled Chintan
(Contemplation), Bhaav (Spirit), Phuhaar (Shower), Ghazal and
Phuljhadiyan (Sparklers). The poet has not limited himself to any
one style or genre but has let poetry flow naturally and freely
like spring water. This is the reason why these poems exude pure
joy and are bound to be remembered by the reader for a long time.
The section titled "Chintan" presents poems of original thought,
where the poet has shown courage in the fearless presentation of
the truth. Through his powerful words, the poet challenges readers
to follow the path of strong-willed pursuit of truth, attacks
hypocrisy and human weaknesses. The poems presented in "Bhaav" and
"Phuhaar" sections touch the deepest realms of the human heart with
their simplicity and fill it with exultation. "Phuhaar" poems are a
treat to read and shower the reader with the tenderness that only
love poems can bring. Phuljhadiyan are short but provide sparkling
light.
Identify, exploit, and test web application security with ease Key
Features Get up to speed with Metasploit and discover how to use it
for pentesting Understand how to exploit and protect your web
environment effectively Learn how an exploit works and what causes
vulnerabilities Book DescriptionMetasploit has been a crucial
security tool for many years. However, there are only a few modules
that Metasploit has made available to the public for pentesting web
applications. In this book, you'll explore another aspect of the
framework - web applications - which is not commonly used. You'll
also discover how Metasploit, when used with its inbuilt GUI,
simplifies web application penetration testing. The book starts by
focusing on the Metasploit setup, along with covering the life
cycle of the penetration testing process. Then, you will explore
Metasploit terminology and the web GUI, which is available in the
Metasploit Community Edition. Next, the book will take you through
pentesting popular content management systems such as Drupal,
WordPress, and Joomla, which will also include studying the latest
CVEs and understanding the root cause of vulnerability in detail.
Later, you'll gain insights into the vulnerability assessment and
exploitation of technological platforms such as JBoss, Jenkins, and
Tomcat. Finally, you'll learn how to fuzz web applications to find
logical security vulnerabilities using third-party tools. By the
end of this book, you'll have a solid understanding of how to
exploit and validate vulnerabilities by working with various tools
and techniques. What you will learn Get up to speed with setting up
and installing the Metasploit framework Gain first-hand experience
of the Metasploit web interface Use Metasploit for web-application
reconnaissance Understand how to pentest various content management
systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become
well-versed with fuzzing web applications Write and automate
penetration testing reports Who this book is forThis book is for
web security analysts, bug bounty hunters, security professionals,
or any stakeholder in the security sector who wants to delve into
web application security testing. Professionals who are not experts
with command line tools or Kali Linux and prefer Metasploit's
graphical user interface (GUI) will also find this book useful. No
experience with Metasploit is required, but basic knowledge of
Linux and web application pentesting will be helpful.
Your one-stop guide to learning and implementing Red Team tactics
effectively Key Features Target a complex enterprise environment in
a Red Team activity Detect threats and respond to them with a
real-world cyber-attack simulation Explore advanced penetration
testing tools and techniques Book DescriptionRed Teaming is used to
enhance security by performing simulated attacks on an organization
in order to detect network and system vulnerabilities. Hands-On Red
Team Tactics starts with an overview of pentesting and Red Teaming,
before giving you an introduction to few of the latest pentesting
tools. We will then move on to exploring Metasploit and getting to
grips with Armitage. Once you have studied the fundamentals, you
will learn how to use Cobalt Strike and how to set up its team
server. The book introduces some common lesser known techniques for
pivoting and how to pivot over SSH, before using Cobalt Strike to
pivot. This comprehensive guide demonstrates advanced methods of
post-exploitation using Cobalt Strike and introduces you to Command
and Control (C2) servers and redirectors. All this will help you
achieve persistence using beacons and data exfiltration, and will
also give you the chance to run through the methodology to use Red
Team activity tools such as Empire during a Red Team activity on
Active Directory and Domain Controller. In addition to this, you
will explore maintaining persistent access, staying untraceable,
and getting reverse connections over different C2 covert channels.
By the end of this book, you will have learned about advanced
penetration testing tools, techniques to get reverse shells over
encrypted channels, and processes for post-exploitation. What you
will learn Get started with red team engagements using lesser-known
methods Explore intermediate and advanced levels of
post-exploitation techniques Get acquainted with all the tools and
frameworks included in the Metasploit framework Discover the art of
getting stealthy access to systems via Red Teaming Understand the
concept of redirectors to add further anonymity to your C2 Get to
grips with different uncommon techniques for data exfiltration Who
this book is forHands-On Red Team Tactics is for you if you are an
IT professional, pentester, security consultant, or ethical hacker
interested in the IT security domain and wants to go beyond
Penetration Testing. Prior knowledge of penetration testing is
beneficial.
Learn the art of designing, implementing, and managing Cisco's
networking solutions on datacenters, wirelessly, security and
mobility to set up an Enterprise network. About This Book *
Implement Cisco's networking solutions on datacenters and
wirelessly, Cloud, Security, and Mobility * Leverage Cisco IOS to
manage network infrastructures. * A practical guide that will show
how to troubleshoot common issues on the network. Who This Book Is
For This book is targeted at network designers and IT engineers who
are involved in designing, configuring, and operating enterprise
networks, and are in taking decisions to make the necessary network
changes to meet newer business needs such as evaluating new
technology choices, enterprise growth, and adding new services on
the network. The reader is expected to have a general understanding
of the fundamentals of networking, including the OSI stack and IP
addressing. What You Will Learn * Understand the network lifecycle
approach * Get to know what makes a good network design * Design
components and technology choices at various places in the network
(PINS) * Work on sample configurations for network devices in the
LAN/ WAN/ DC, and the wireless domain * Get familiar with the
configurations and best practices for securing the network *
Explore best practices for network operations In Detail Most
enterprises use Cisco networking equipment to design and implement
their networks. However, some networks outperform networks in other
enterprises in terms of performance and meeting new business
demands, because they were designed with a visionary approach. The
book starts by describing the various stages in the network
lifecycle and covers the plan, build, and operate phases. It covers
topics that will help network engineers capture requirements,
choose the right technology, design and implement the network, and
finally manage and operate the network. It divides the overall
network into its constituents depending upon functionality, and
describe the technologies used and the design considerations for
each functional area. The areas covered include the campus wired
network, wireless access network, WAN choices, datacenter
technologies, and security technologies. It also discusses the need
to identify business-critical applications on the network, and how
to prioritize these applications by deploying QoS on the network.
Each topic provides the technology choices, and the scenario,
involved in choosing each technology, and provides configuration
guidelines for configuring and implementing solutions in enterprise
networks. Style and approach A step-by-step practical guide that
ensures you implement Cisco solutions such as enterprise networks,
cloud, and data centers, on small-to-large organizations.
Though India has become a lucrative market for pharmaceuticals,
liberalization and Globalization has thrown up a variety of
challenges and opportunities. Pharmaceutical marketing Mix
Strategies aims to understand the practices being followed by the
major pharma companies in India. Building on an understanding of
the pharmaceutical marketing activities, the book defines the
pharmaceutical Marketing Mix Strategies.
Wo Tumse Kahenge Ki (They will tell you that) is a collection of
poems that will appeal to readers of every age and class. One of
the attractions of this collection is its diversity as various
forms and colours of life have been presented beautifully by the
poet in different sections of the book titled Chintan
(Contemplation), Bhaav (Spirit), Phuhaar (Shower), Ghazal and
Phuljhadiyan (Sparklers). The poet has not limited himself to any
one style or genre but has let poetry flow naturally and freely
like spring water. This is the reason why these poems exude pure
joy and are bound to be remembered by the reader for a long time.
The section titled "Chintan" presents poems of original thought,
where the poet has shown courage in the fearless presentation of
the truth. Through his powerful words, the poet challenges readers
to follow the path of strong-willed pursuit of truth, attacks
hypocrisy and human weaknesses. The poems presented in "Bhaav" and
"Phuhaar" sections touch the deepest realms of the human heart with
their simplicity and fill it with exultation. "Phuhaar" poems are a
treat to read and shower the reader with the tenderness that only
love poems can bring. Phuljhadiyan are short but provide sparkling
light.
|
You may like...
Higher
Michael Buble
CD
(1)
R459
Discovery Miles 4 590
|