Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
Tobi Baumann co-writes and directs this children's supernatural fantasy. Tom Thompson (Milo Parker) is a young boy who meets and befriends Hugo (voice of Bastian Pastewka), a slimey green ghost who haunts his family home. When Hugo is chased out of his favourite haunt by a recently reawakened ancient ice ghost, Tom enlists the help of Hetty Cuminseed (Anke Engelke), a notorious ghosthunter who has been fired from her job at the Ghosthunting Institute. Can the unlikely trio overcome the hostile spirit before it's too late?
"Once upon a time...there was the Weald. Much of the Weald was smoke and flame - a place of blast furnaces and molten iron - and the mine pits; still, deep, dark cooling pools, from which would come the hiss of steam when white hot iron was plunged in. And scattered throughout the Wealden forest there were those charcoal burners' enclosures - the hut and the kiln, the piles of cut limbs and branches, and the solitary, wrinkled charcoal burner. And when the charcoal burner died, as often as not his body rotted away in solitude and there was no-one to miss him, as the forest retook the enclosure - and the hut and the kiln subsided back into the ground. Sometimes bits of body were collected - no-one knew by whom. Someone dark. Someone with a book. Bits of body were fixed together - bits of this, that and the other. Higgledy piggledy wiggledy. A brain animated by a spark of fire from a bloomer - an ancient blast furnace; a clay chimney - or fluxed into awareness and motion by an organism usually associated with rot and decay - the body jerked into some sort of life..." Here begins the story of Link, a cryptid, a knitted-together Piltdown Man, whose pilgrimage takes him up the South Downs, staggering along the A27 and the M27, through Southampton, through Amesbury, past Porton Down, to Glastonbury, Dartmoor, the west of Cornwall and Brittany. Mike O'Leary has been a professional storyteller for 25 years and his post-fairy tale vividly knits together the knuckers, hags, wisht hounds and dragons of folklore with more contemporary concerns of roadkill, hitch-hiking, migration and abuse. The result is a very adult story that investigates the whole idea of story in our lives and in our search for meaning.
Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will end by building your own web applications servers, including WordPress and Joomla!. Systems from 2011 through 2017 are covered, including Windows 7, Windows 8, Windows 10, Windows Server 2012, and Windows Server 2016 as well as a range of Linux distributions, including Ubuntu, CentOS, Mint, and OpenSUSE. Key defensive techniques are integrated throughout and you will develop situational awareness of your network and build a complete defensive infrastructure, including log servers, network firewalls, web application firewalls, and intrusion detection systems.Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways. You will learn about Metasploit, browser attacks, privilege escalation, pass-the-hash attacks, malware, man-in-the-middle attacks, database attacks, and web application attacks. What You'll Learn Construct a testing laboratory to experiment with software and attack techniques Build realistic networks that include active directory, file servers, databases, web servers, and web applications such as WordPress and Joomla! Manage networks remotely with tools, including PowerShell, WMI, and WinRM Use offensive tools such as Metasploit, Mimikatz, Veil, Burp Suite, and John the Ripper Exploit networks starting from malware and initial intrusion to privilege escalation through password cracking and persistence mechanisms Defend networks by developing operational awareness using auditd and Sysmon to analyze logs, and deploying defensive tools such as the Snort intrusion detection system, IPFire firewalls, and ModSecurity web application firewalls Who This Book Is For This study guide is intended for everyone involved in or interested in cybersecurity operations (e.g., cybersecurity professionals, IT professionals, business professionals, and students)
The National Institute of Justice (NIJ) is the research, development and evaluation agency of the US Department of Justice. The NIJ is dedicated to improving knowledge and understanding of crime and justice issues through science. NIJ provides objective and independent knowledge and tools to reduce crime and promote justice, particularly at the state and local levels. Each year, the NIJ publishes and sponsors dozens of research and study documents detailing results, analyses and statistics that help to further the organization's mission. These documents relate to topics like biometrics, corrections technology, gun violence, digital forensics, human trafficking, electronic crime, terrorism, tribal justice and more. This document is one of these publications.
Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases. Key defensive techniques are integrated throughout the exposition. You will develop situational awareness of your network and will build a complete defensive infrastructure-including log servers, network firewalls, web application firewalls, and intrusion detection systems. Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways beginning with elementary attacks against browsers and culminating with a case study of the compromise of a defended e-commerce site. The author, who has coached his university's cyber defense team three times to the finals of the National Collegiate Cyber Defense Competition, provides a practical, hands-on approach to cyber security.
|
You may like...
|