Nejnižší cena za posledních 60 dní: 1 111 Kč
Ceny a dostupnost se mohou měnit i několikrát za den. Zkontrolujte si aktuální údaje přímo v e-shopech. Všechny dostupné barvy a velikosti naleznete přímo v e-shopech.
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities.
You'll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you'll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. Learn how to: - Capture, manipulate, and replay packets- Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol- Discover and exploit vulnerabilities such asAttacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities. You'll start
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented
Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this updated edition, you'll dive into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that
David Knoke and Song Yang′s Social Network Analysis, Third Edition provides a concise introduction to the concepts and tools of social network analysis. The authors convey key material while at the same time minimizing technical complexities. The examples are simple: sets of 5 or 6 entities such
Preface.- Basic Concepts, Protocols and Terminology.- Starting Network Programming in Java.- Multithreading and Multiplexing.- File Handling.- Remote Method Invocation (RMI).- CORBA.- Java Database Connectivity.- Servlets.- JavaServer Pages (JSPs).- JavaBeans.- Multimedia.- Applets.- Appendix A -
The ego-net approach to social network analysis, which takes discrete individual actors and their contacts as its starting point, is one of the most widely used approaches in the field. This is the first textbook to take readers through each stage of ego-net research, from conception, through
Construct, analyze, and visualize networks with networkx, a Python language module. Network analysis is a powerful tool you can apply to a multitude of datasets and situations. Discover how to work with all kinds of networks, including social, product, temporal, spatial, and semantic networks
GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis,
A Director's Guide to Stanislavsky's Active Analysis describes Active Analysis, the innovative rehearsal method Stanislavsky formulated in his final years. By uniting 'mental analysis' and 'etudes', Active Analysis puts an end to the problem of mind-body dualism and formalized text memorization
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains
This Workbook accompanies The Musician's Guide to Theory and Analysis, Fourth Edition, and features hundreds of exercises students can complete on tear-out-and-turn-in
'The Illustrated Guide to Technical Analysis Signals and Phrases 'provides traders with illustrations of more than 275 key chart patterns along with their most important variations. An innovative and soon-to-be essential addition to every technical trader's reference library, it provides: An
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the
Essential study guides for the future linguist. Text Analysis and Representation is a general introduction to the methods and principles behind English linguistics study, suitable for students at advanced level and beyond. Written with input from the Cambridge Corpus, it looks at the way meaning is
Understanding Regression Analysis: An Introductory Guide by Larry D. Schroeder, David L. Sjoquist, and Paula E. Stephan presents the fundamentals of regression analysis, from its meaning to uses, in a concise, easy-to-read, and non-technical style. It illustrates how regression coefficients are
From the moment motion pictures were invented, fearless entrepreneurs, poverty row profiteers and money-grabbing grifters gave cinemagoers what they truly craved.... the sex, horror and cheap thrills that were too hot for Hollywood to handle. And so the exploitation industry was born. Nothing was
The guide to vector analysis that helps students study faster, learn better, and get top grades More than 40 million students have trusted Schaum's to help them study faster, learn better, and get top grades. Now Schaum's is better than ever-with a new look, a new format with hundreds of practice
Discourse analysis considers how language, both spoken and written, enacts social and cultural perspectives and identities. Assuming no prior knowledge of linguistics, An Introduction to Discourse Analysis examines the field and presents James Paul Gee's unique integrated approach which
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security
Incorporating the most important and cutting-edge developments in the field, this bestselling text introduces newcomers to the key theories and techniques of social network analysis and guides more experienced analysts in their own research. New to This Edition: A chapter on data collection,
This introduction to dimensional analysis covers the methods, history and formalisation of the field, and provides physics and engineering applications. Covering topics from mechanics, hydro- and electrodynamics to thermal and quantum physics, it illustrates the possibilities and limitations of
Driven by counter-terrorism efforts, marketing analysis and an explosion in online social networking in recent years, data mining has moved to the forefront of information science. This proposed Special Issue on Data Mining for Social Network Data will present a broad range of recent studies in
This standard illustrates how project management processes and business analysis processes are complementary activities, where the primary focus of project management processes is the project and the primary focus of business analysis processes is the product. This is a process-based standard,