Filter
(found 8373 products)
Book cover image
Develop blockchain application with step-by-step instructions, working example and helpful recommendations Key Features Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deployment of blockchain based applications Book DescriptionBlockchain technology is being welcomed as one of the most revolutionary and impactful ...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Develop blockchain application with step-by-step instructions, working example and helpful recommendations Key Features Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deployment of blockchain based applications Book DescriptionBlockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. Blockchain technology was first identified in the world's most popular digital currency, Bitcoin, but has now changed the outlook of several organizations and empowered them to use it even for storage and transfer of value. This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into the cybersecurity ecosystem. These chapters will also help you to write your first distributed application on Ethereum Blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with Blockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI-based identity, 2FA, and DNS security. You will learn how Blockchain plays a crucial role in transforming cybersecurity solutions. Toward the end of the book, you will also encounter some real-world deployment examples of Blockchain in security cases, and also understand the short-term challenges and future of cybersecurity with Blockchain. What you will learn Understand the cyberthreat landscape Learn about Ethereum and Hyperledger Blockchain Program Blockchain solutions Build Blockchain-based apps for 2FA, and DDoS protection Develop Blockchain-based PKI solutions and apps for storing DNS entries Challenges and the future of cybersecurity and Blockchain Who this book is forThe book is targeted towards security professionals, or any stakeholder dealing with cybersecurity who wants to understand the next-level of securing infrastructure using Blockchain. Basic understanding of Blockchain can be an added advantage.
https://magrudy-assets.storage.googleapis.com/9781788990189.jpg
47.240000 USD

Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

by Rajneesh Gupta
Paperback
Book cover image
Learn to evaluate and compare data encryption methods and attack cryptographic systems Key Features Explore popular and important cryptographic methods Compare cryptographic modes and understand their limitations Learn to perform attacks on cryptographic systems Book DescriptionCryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. ...
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
Learn to evaluate and compare data encryption methods and attack cryptographic systems Key Features Explore popular and important cryptographic methods Compare cryptographic modes and understand their limitations Learn to perform attacks on cryptographic systems Book DescriptionCryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this book, you will be able to deal with common errors in encryption. What you will learn Protect data with encryption and hashing Explore and compare various encryption methods Encrypt data using the Caesar Cipher technique Make hashes and crack them Learn how to use three NIST-recommended systems: AES, SHA, and RSA Understand common errors in encryption and exploit them Who this book is forHands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.
https://magrudy-assets.storage.googleapis.com/9781789534443.jpg
31.490000 USD

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

by Samuel Bowne
Paperback
Book cover image
The two-volume set LNCS 10735 and 10736 constitutes the thoroughly refereed proceedings of the 18th Pacific-Rim Conference on Multimedia, PCM 2017, held in Harbin, China, in September 2017. The 184 full papers presented were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections on: Best ...
Advances in Multimedia Information Processing - PCM 2017: 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part I
The two-volume set LNCS 10735 and 10736 constitutes the thoroughly refereed proceedings of the 18th Pacific-Rim Conference on Multimedia, PCM 2017, held in Harbin, China, in September 2017. The 184 full papers presented were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections on: Best Paper Candidate; Video Coding; Image Super-resolution, Debluring, and Dehazing; Person Identity and Emotion; Tracking and Action Recognition; Detection and Classification; Multimedia Signal Reconstruction and Recovery; Text and Line Detection/Recognition; Social Media; 3D and Panoramic Vision; Deep Learning for Signal Processing and Understanding; Large-Scale Multimedia Affective Computing; Sensor-enhanced Multimedia Systems; Content Analysis; Coding, Compression, Transmission, and Processing.
https://magrudy-assets.storage.googleapis.com/9783319773797.jpg
162.750000 USD

Advances in Multimedia Information Processing - PCM 2017: 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part I

Paperback
Book cover image
This book constitutes the proceedings of the 17th International Conference on Unconventional Computation and Natural Computation, UCNC 2018, held in Fontainebleau, France, in June 2018. The 15 full papers presented were carefully reviewed and selected from 22 submissions. The paper cover topics such as hypercomputation; chaos and dynamical systems based ...
Unconventional Computation and Natural Computation: 17th International Conference, UCNC 2018, Fontainebleau, France, June 25-29, 2018, Proceedings
This book constitutes the proceedings of the 17th International Conference on Unconventional Computation and Natural Computation, UCNC 2018, held in Fontainebleau, France, in June 2018. The 15 full papers presented were carefully reviewed and selected from 22 submissions. The paper cover topics such as hypercomputation; chaos and dynamical systems based computing; granular, fuzzy and rough computing; mechanical computing; cellular, evolutionary, molecular, neural, and quantum computing; membrane computing; amorphous computing, swarm intelligence; artificial immune systems; physics of computation; chemical computation; evolving hardware; the computational nature of self-assembly, developmental processes, bacterial communication, and brain processes.
https://magrudy-assets.storage.googleapis.com/9783319924342.jpg
73.490000 USD

Unconventional Computation and Natural Computation: 17th International Conference, UCNC 2018, Fontainebleau, France, June 25-29, 2018, Proceedings

Paperback
Book cover image
This book constitutes the proceedings of the 14th International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in July 2018. The total of 1171 papers and 160 posters included in the ...
Engineering Psychology and Cognitive Ergonomics: 15th International Conference, EPCE 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings
This book constitutes the proceedings of the 14th International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in July 2018. The total of 1171 papers and 160 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4346 submissions. EPCE 2018 includes a total of 57 papers; they were organized in topical sections named: mental workload and human error; situation awareness, training and team working; psychophysiological measures and assessment; interaction, cognition and emotion; and cognition in aviation and space.
https://magrudy-assets.storage.googleapis.com/9783319911212.jpg
125.990000 USD

Engineering Psychology and Cognitive Ergonomics: 15th International Conference, EPCE 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings

Paperback
Book cover image
This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers ...
Information Security Theory and Practice: 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings
This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.
https://magrudy-assets.storage.googleapis.com/9783319935232.jpg
62.990000 USD

Information Security Theory and Practice: 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings

Paperback
Book cover image
This book constitutes the proceedings of the 16th International Conference on Smart Homes and Health Telematics, ICOST 2018, held in Singapore, Singapore, in July 2018. The theme of this year volume is Designing a better Future: Urban Assisted Living , focusing on quality of life of dependent people not only ...
Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living: 16th International Conference, ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedings
This book constitutes the proceedings of the 16th International Conference on Smart Homes and Health Telematics, ICOST 2018, held in Singapore, Singapore, in July 2018. The theme of this year volume is Designing a better Future: Urban Assisted Living , focusing on quality of life of dependent people not only in their homes, but also in outdoor living environment to improve mobility and social interaction in the city. The 21 regular papers and 11 short papers included in this volume focus on research in the design, development, deployment and evaluation of smart urban environments, assistive technologies, chronic disease management, coaching and health telematics systems.
https://magrudy-assets.storage.googleapis.com/9783319945224.jpg
83.990000 USD

Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living: 16th International Conference, ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedings

Paperback
Book cover image
This book constitutes the proceedings of the 13th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2018, held in June 2018 in Chennai, India. The 24 full papers presented in this volume were carefully reviewed and selected from 96 papers. The contributions are organized in topical ...
Designing for a Digital and Globalized World: 13th International Conference, DESRIST 2018, Chennai, India, June 3-6, 2018, Proceedings
This book constitutes the proceedings of the 13th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2018, held in June 2018 in Chennai, India. The 24 full papers presented in this volume were carefully reviewed and selected from 96 papers. The contributions are organized in topical sections named: HCI and Design, Design Foundations, Design Foundations, Design in Healthcare, Advances in Data Science and Analytics, ICT for Development, Designing Cybersecurity, and Design Applications.
https://magrudy-assets.storage.googleapis.com/9783319917993.jpg
83.990000 USD

Designing for a Digital and Globalized World: 13th International Conference, DESRIST 2018, Chennai, India, June 3-6, 2018, Proceedings

Paperback
Book cover image
This book constitutes the thoroughly refereed proceedings of the 6th International Conference on Data Management Technologies and Applications, DATA 2017, held in Madrid, Spain, in July 2017. The 13 revised full papers were carefully reviewed and selected from 66 submissions. The papers deal with the following topics: databases, big data, ...
Data Management Technologies and Applications: 6th International Conference, DATA 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Papers
This book constitutes the thoroughly refereed proceedings of the 6th International Conference on Data Management Technologies and Applications, DATA 2017, held in Madrid, Spain, in July 2017. The 13 revised full papers were carefully reviewed and selected from 66 submissions. The papers deal with the following topics: databases, big data, data mining, data management, data security, and other aspects of information systems and technology involving advanced applications of data.
https://magrudy-assets.storage.googleapis.com/9783319948089.jpg
89.240000 USD

Data Management Technologies and Applications: 6th International Conference, DATA 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Papers

Paperback
Book cover image
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. Key Features Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis ...
Wireshark 2 Quick Start Guide: Secure your network through protocol analysis
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies. Key Features Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis over your network in an event of network failure or a security breach Book DescriptionWireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, etc. - it lets you see what's going on in your network at a granular level. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies. This book will start from the basics of setting up your Wireshark environment and will walk you through the fundamentals of networking and packet analysis. As you make your way through the chapters, you will discover different ways to analyse network traffic through creation and usage of filters and statistical features. You will look at network security packet analysis, command-line utilities, and other advanced tools that will come in handy when working with day-to-day network operations. By the end of this book, you have enough skill with Wireshark 2 to overcome real-world network challenges. What you will learn Learn how TCP/IP works Install Wireshark and understand its GUI Creation and Usage of Filters to ease analysis process Understand the usual and unusual behaviour of Protocols Troubleshoot network anomalies quickly with help of Wireshark Use Wireshark as a diagnostic tool for network security analysis to identify source of malware Decrypting wireless traffic Resolve latencies and bottleneck issues in the network Who this book is forIf you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. No prior knowledge of Wireshark is needed.
https://magrudy-assets.storage.googleapis.com/9781789342789.jpg
31.490000 USD

Wireshark 2 Quick Start Guide: Secure your network through protocol analysis

by Charit Mishra
Paperback
Book cover image
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 116 submissions. They ...
Web Services - ICWS 2018: 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 116 submissions. They are organized in topical sections such as Web Services, RESTful web services, Web Services Description Langugage, Universal Description Discovery and Integration, Service discovery and interfaces, Domain-specific security and privacy architectures, Location bases services, Sercurity Services and Markup languages.
https://magrudy-assets.storage.googleapis.com/9783319942889.jpg
104.990000 USD

Web Services - ICWS 2018: 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings

Paperback
Book cover image
This book constitutes the proceedings of the International Conference on Edge Computing, EDGE 2018, held in Seattle, WA, USA, in June 2018. The 9 full papers and 3 short paper presented in this volume were carefully reviewed and selected from 29 submissions. The contributions are organized in topical sections named: ...
Edge Computing - EDGE 2018: Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
This book constitutes the proceedings of the International Conference on Edge Computing, EDGE 2018, held in Seattle, WA, USA, in June 2018. The 9 full papers and 3 short paper presented in this volume were carefully reviewed and selected from 29 submissions. The contributions are organized in topical sections named: Research Track; Application and Industry Track; and Short Paper Track. They deal with the latest fundamental advances in the state of the art and practice of edge computing.
https://magrudy-assets.storage.googleapis.com/9783319943398.jpg
62.990000 USD

Edge Computing - EDGE 2018: Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings

Paperback
Book cover image
The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal elements inside and outside organizations gain access to information that can cause financial and reputational damage. Criminals also target individuals daily with personal devices like smartphones ...
Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution
The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal elements inside and outside organizations gain access to information that can cause financial and reputational damage. Criminals also target individuals daily with personal devices like smartphones and home security systems who are often unaware of the dangers and the privacy threats around them. The Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution is a critical scholarly resource that creates awareness of the severity of cyber information threats on personal, business, governmental, and societal levels. The book explores topics such as social engineering in information security, threats to cloud computing, and cybersecurity resilience during the time of the Fourth Industrial Revolution. As a source that builds on available literature and expertise in the field of information technology and security, this publication proves useful for academicians, educationalists, policy makers, government officials, students, researchers, and business leaders and managers.
https://magrudy-assets.storage.googleapis.com/9781522547631.jpg
362.250000 USD

Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution

Hardback
Book cover image
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications ...
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.
https://magrudy-assets.storage.googleapis.com/9783319936376.jpg
125.990000 USD

Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings

Paperback
Book cover image
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections ...
Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.
https://magrudy-assets.storage.googleapis.com/9789811086564.jpg
157.490000 USD

Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I

Paperback
Book cover image
Incident response and digital forensics require a balancing act to get right, but both are essential when an information security incident occurs. In this practical guide, the relationship between incident response and digital forensics is explored and you will learn how to undertake each and balance them to meet the ...
Hands-on Incident Response and Digital Forensics
Incident response and digital forensics require a balancing act to get right, but both are essential when an information security incident occurs. In this practical guide, the relationship between incident response and digital forensics is explored and you will learn how to undertake each and balance them to meet the needs of an organisation in the event of an information security incident. Best practice tips and real-life examples are included throughout.
https://magrudy-assets.storage.googleapis.com/9781780174204.jpg
44.090000 USD

Hands-on Incident Response and Digital Forensics

by Mike Sheward
Paperback
Book cover image
Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only ...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN-savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization's cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You'll Learn Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls Who This Book Is For New and intermediate security management professionals, auditors, and information technology staff looking to build an effective vulnerability management program and defend against asset based cyberattacks
https://magrudy-assets.storage.googleapis.com/9781484236260.jpg
39.23 USD

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

by Morey J. Haber, Brad Hibbert
Paperback
Book cover image
This book contains more than 25 hands-on recipes that will equip you to build a PKI and roll out remote access capabilities via Microsoft DirectAccess and VPN. This book also contains tips and tricks for increasing the security footprint of your Windows Server infrastructure. Key Features Identify and mitigate security ...
Windows Server 2016 Security, Certificates, and Remote Access Cookbook: Recipe-based guide for security, networking and PKI in Windows Server 2016
This book contains more than 25 hands-on recipes that will equip you to build a PKI and roll out remote access capabilities via Microsoft DirectAccess and VPN. This book also contains tips and tricks for increasing the security footprint of your Windows Server infrastructure. Key Features Identify and mitigate security risks in your Windows Server 2016 infrastructure Learn how to build a PKI and use it to issue certificates within your network In-depth information for setting up Microsoft DirectAccess Book Description Windows Server 2016 is an operating system designed to run on today's highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the security of their systems one step further. You will learn tips for configuring proper networking, especially on multi-homed systems, and tricks for locking down access to your servers. Then you will move onto one of the hottest security topics of the year - certificates. You will learn how to build your own PKI, or how to better administer one that you already have. You will publish templates, issue certificates, and even configure autoenrollment in your network. When we say networking we don't only mean inside the LAN. To deal safely with mobile devices, you will learn about the capabilities of Windows Server 2016 for connecting these assets securely back into the corporate network, with information about DirectAccess and VPN. The material in the book has been selected from the content of Packt's Windows Server 2016 Cookbook by Jordan Krause to provide a specific focus on these key Windows Server tasks. What you will learn Implement solid networking and security practices into your Windows Server environment Design your own PKI and start issuing certificates today Connect your remote laptops back to the corporate network using Microsoft's own remote access technologies, including DirectAccess Learn to use commands that will help you with monitoring network traffic. Build and explore your first Server Core instance today! Who this book is forIf you are a Windows Server administrator interested in learning the key security and networking functions available in Windows Server 2016, keep this book close at hand. If you are a server administrator setting up certificate services for the first time you will also benefit from the step-by-step instructions on implementation of a PKI.
https://magrudy-assets.storage.googleapis.com/9781789137675.jpg
31.490000 USD

Windows Server 2016 Security, Certificates, and Remote Access Cookbook: Recipe-based guide for security, networking and PKI in Windows Server 2016

by Jordan Krause
Paperback
Book cover image
Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning ...
Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. What you will learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN Who this book is forIf you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you.
https://magrudy-assets.storage.googleapis.com/9781788839235.jpg
41.990000 USD

Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus

by Ajay Singh Chauhan
Paperback
Book cover image
Understand malware analysis and its practical implementation Key Features Explore the key concepts of malware analysis and memory forensics using real-world examples Learn the art of detecting, analyzing, and investigating malware threats Understand adversary tactics and techniques Book DescriptionMalware analysis and memory forensics are powerful analysis and investigation techniques used ...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Understand malware analysis and its practical implementation Key Features Explore the key concepts of malware analysis and memory forensics using real-world examples Learn the art of detecting, analyzing, and investigating malware threats Understand adversary tactics and techniques Book DescriptionMalware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches. This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents. What you will learn Create a safe and isolated lab environment for malware analysis Extract the metadata associated with malware Determine malware's interaction with the system Perform code analysis using IDA Pro and x64dbg Reverse-engineer various malware functionalities Reverse engineer and decode common encoding/encryption algorithms Perform different code injection and hooking techniques Investigate and hunt malware using memory forensics Who this book is forThis book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you'll be able to get most out of this book.
https://magrudy-assets.storage.googleapis.com/9781788392501.jpg
52.490000 USD

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

by Monnappa K A
Paperback
Book cover image
This book constitutes the proceedings of the 4th International Conference onHuman Aspects of IT for the Aged Population, ITAP 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in July 2018.The total of 1171 papers and 160 posters included in ...
Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation: 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I
This book constitutes the proceedings of the 4th International Conference onHuman Aspects of IT for the Aged Population, ITAP 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in July 2018.The total of 1171 papers and 160 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4346 submissions. ITAP 2018 includes a total of 84 papers. They were organized in topical sections as follows: Part I: aging and technology acceptance; aging and interaction; intergenerational communication and social participation. Part II: health care technologies and services for the elderly; intelligent environments for aging; and games and entertainment for the elderly.
https://magrudy-assets.storage.googleapis.com/9783319920337.jpg
115.490000 USD

Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation: 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part I

Paperback
Book cover image
This book constitutes the proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2018, held in Tianjin, China, in June 2018. The 59 full papers and 18 short papers presented in this book were carefully reviewed and selected from 197 submissions. The papers cover various topics ...
Wireless Algorithms, Systems, and Applications: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings
This book constitutes the proceedings of the 13th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2018, held in Tianjin, China, in June 2018. The 59 full papers and 18 short papers presented in this book were carefully reviewed and selected from 197 submissions. The papers cover various topics such as cognitive radio networks; wireless sensor networks; cyber-physical systems; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobile cloud computing; topology control and coverage; security and privacy; underwater and underground networks; vehicular networks; internet of things; information processing and data management; programmable service interfaces; energy-efficient algorithms; system and protocol design; operating system and middle-ware support; and experimental test-beds, models and case studies.
https://magrudy-assets.storage.googleapis.com/9783319942674.jpg
136.490000 USD

Wireless Algorithms, Systems, and Applications: 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings

Paperback
Book cover image
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of ...
Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001. The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.
https://magrudy-assets.storage.googleapis.com/9781771885775.jpg
162.10 USD

Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard

by Heru Susanto, Mohammad Nabil Almunawar
Hardback
Book cover image
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a broad range ...
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a broad range of topics, including methods for human training; novel cyber-physical and process-control systems; social, economic, and behavioral aspects of cyberspace; issues concerning the cybersecurity index; security metrics for enterprises; and risk evaluation. Based on the AHFE 2018 International Conference on Human Factors in Cybersecurity, held on July 21-25, 2018, in Orlando, Florida, USA, the book not only presents innovative cybersecurity technologies, but also discusses emerging threats, current gaps in the available systems, and future challenges that can be successfully overcome with the help of human factors research.
https://magrudy-assets.storage.googleapis.com/9783319947815.jpg
209.990000 USD

Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA

Paperback
Book cover image
This book constitutes the proceedings of the 4th International Conference onHuman Aspects of IT for the Aged Population, ITAP 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in July 2018. The total of 1171 papers and 160 posters included ...
Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment: 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II
This book constitutes the proceedings of the 4th International Conference onHuman Aspects of IT for the Aged Population, ITAP 2018, held as part of the 20th International Conference, HCI International 2018, which took place in Las Vegas, Nevada, in July 2018. The total of 1171 papers and 160 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4346 submissions. ITAP 2018 includes a total of 84 papers. They were organized in topical sections as follows: Part I: aging and technology acceptance; aging and interaction; intergenerational communication and social participation. Part II: health care technologies and services for the elderly; intelligent environments for aging; and games and entertainment for the elderly.
https://magrudy-assets.storage.googleapis.com/9783319920368.jpg
104.990000 USD

Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment: 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part II

Paperback
Book cover image
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Image Analysis and Recognition, ICIAR 2018, held in Povoa de Varzim, Portugal, in June 2018. The 91 full papers presented together with 15 short papers were carefully reviewed and selected from 179 submissions. The papers are organized ...
Image Analysis and Recognition: 15th International Conference, ICIAR 2018, Povoa de Varzim, Portugal, June 27-29, 2018, Proceedings
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Image Analysis and Recognition, ICIAR 2018, held in Povoa de Varzim, Portugal, in June 2018. The 91 full papers presented together with 15 short papers were carefully reviewed and selected from 179 submissions. The papers are organized in the following topical sections: Enhancement, Restoration and Reconstruction, Image Segmentation, Detection, Classication and Recognition, Indexing and Retrieval, Computer Vision, Activity Recognition, Traffic and Surveillance, Applications, Biomedical Image Analysis, Diagnosis and Screening of Ophthalmic Diseases, and Challenge on Breast Cancer Histology Images.
https://magrudy-assets.storage.googleapis.com/9783319929996.jpg
146.990000 USD

Image Analysis and Recognition: 15th International Conference, ICIAR 2018, Povoa de Varzim, Portugal, June 27-29, 2018, Proceedings

Paperback
Book cover image
The three-volume set LNCS 10860, 10861 + 10862 constitutes the proceedings of the 18th International Conference on Computational Science, ICCS 2018, held in Wuxi, China, in June 2018. The total of 155 full and 66 short papers presented in this book set was carefully reviewed and selected from 404 submissions. ...
Computational Science - ICCS 2018: 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part I
The three-volume set LNCS 10860, 10861 + 10862 constitutes the proceedings of the 18th International Conference on Computational Science, ICCS 2018, held in Wuxi, China, in June 2018. The total of 155 full and 66 short papers presented in this book set was carefully reviewed and selected from 404 submissions. The papers were organized in topical sections named: Part I: ICCS Main Track Part II: Track of Advances in High-Performance Computational Earth Sciences: Applications and Frameworks; Track of Agent-Based Simulations, Adaptive Algorithms and Solvers; Track of Applications of Matrix Methods in Artificial Intelligence and Machine Learning; Track of Architecture, Languages, Compilation and Hardware Support for Emerging ManYcore Systems; Track of Biomedical and Bioinformatics Challenges for Computer Science; Track of Computational Finance and Business Intelligence; Track of Computational Optimization, Modelling and Simulation; Track of Data, Modeling, and Computation in IoT and Smart Systems; Track of Data-Driven Computational Sciences; Track of Mathematical-Methods-and-Algorithms for Extreme Scale; Track of Multiscale Modelling and Simulation Part III: Track of Simulations of Flow and Transport: Modeling, Algorithms and Computation; Track of Solving Problems with Uncertainties; Track of Teaching Computational Science; Poster Papers
https://magrudy-assets.storage.googleapis.com/9783319936970.jpg
125.990000 USD

Computational Science - ICCS 2018: 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part I

Paperback
Book cover image
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability ...
Hacking For Dummies
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There s no such thing as being too safe and this resourceful guide helps ensure you re protected.
https://magrudy-assets.storage.googleapis.com/9781119485476.jpg
31.490000 USD

Hacking For Dummies

by Kevin Beaver
Paperback
Book cover image
From Russia's tampering with the US election to the WannaCry hack that temporarily crippled the NHS, cyber has become the weapon of choice for democracies, dictators, and terrorists. Cheap to acquire, easily deniable, and used for a variety of malicious purposes - from crippling infrastructure to sowing discord and doubt ...
The Perfect Weapon: war, sabotage, and fear in the cyber age
From Russia's tampering with the US election to the WannaCry hack that temporarily crippled the NHS, cyber has become the weapon of choice for democracies, dictators, and terrorists. Cheap to acquire, easily deniable, and used for a variety of malicious purposes - from crippling infrastructure to sowing discord and doubt - cyberweapons are re-writing the rules of warfare. In less than a decade, they have displaced terrorism and nuclear missiles as the biggest immediate threat to international security and to democracy. Here, New York Times correspondent David E. Sanger takes us from the White House Situation Room to the dens of Chinese government hackers and the boardrooms of Silicon Valley, piecing together a remarkable picture of a world now coming face-to-face with the most sophisticated - and arguably most dangerous - weapon ever invented. The Perfect Weapon is the dramatic story of a new era of constant sabotage, misinformation, and fear, in which everyone is a target.
https://magrudy-assets.storage.googleapis.com/9781911617723.jpg
25.58 USD

The Perfect Weapon: war, sabotage, and fear in the cyber age

by David Sanger
Paperback
Book cover image
This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring ...
Advanced Monitoring in P2P Botnets: A Dual Perspective
This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.
https://magrudy-assets.storage.googleapis.com/9789811090493.jpg
73.490000 USD

Advanced Monitoring in P2P Botnets: A Dual Perspective

by Shankar Karuppayah
Paperback
Page 1 of 40