Computer & Internet

Abusing the Internet of Things

A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you're part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You'll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker's tactics.

Network Graph Analysis and Visualization with Gephi

Gephi is an interactive visualization and exploration platform for all kinds of networks and complex systems. Social media data has helped to drive network visualization to new levels of relevance and importance. However, there is far more to network visualization than just social media data. For analyzing and visualizing network graphs, you need to have an excellent platform, and you need to know ways to use your data effectively.

Cyber Security

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

Pattern and Security Requirements

Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards

MATLAB Recipes for Earth Sciences, 4th Edition

MATLAB is used for a wide range of applications in geosciences, such as image processing in remote sensing, the generation and processing of digital elevation models and the analysis of time series. This book introduces methods of data analysis in geosciences using MATLAB, such as basic statistics for univariate, bivariate and multivariate datasets, time-series analysis, signal processing, the analysis of spatial and directional data and image analysis. The revised and updated Fourth Edition includes sixteen new sections and most chapters have greatly been expanded so that they now include a step by step discussion of all methods before demonstrating the methods with MATLAB functions.

Learn Active Directory Management in a Month of Lunches

At the heart of your Windows network is Active Directory, the control center for administration, security, and other core management functions. If you're new to Active Directory administration or if you find yourself unexpectedly thrust into that role - you'll need to get up to speed fast.

Programming for Musicians and Digital Artists

Programming for Musicians and Digital Artists: Creating Music with ChucK offers a complete introduction to programming in the open source music language ChucK. In it, you'll learn the basics of digital sound creation and manipulation while you discover the ChucK language. As you move example-by-example through this easy-to-follow book, you'll create meaningful and rewarding digital compositions and "instruments" that make sound and music in direct response to program logic, scores, gestures, and other systems connected via MIDI or the network.

Wireshark Essentials

This book introduces the Wireshark network analyzer to IT professionals across multiple disciplines. It starts off with the installation of Wireshark, before gradually taking you through your first packet capture, identifying and filtering out just the packets of interest, and saving them to a new file for later analysis. The subsequent chapters will build on this foundation by covering essential topics on the application of the right Wireshark features for analysis, network protocols essentials, troubleshooting, and analyzing performance issues. Finally, the book focuses on packet analysis for security tasks, command-line utilities, and tools that manage trace files.

Hack and HHVM

How can you take advantage of the HipHop Virtual Machine (HHVM) and the Hack programming language, two new technologies that Facebook developed to run their web servers? With this practical guide, Owen Yamauchi a member of Facebook's core Hack and HHVM teams—shows you how to get started with these battle-tested open-source tools.

The Antivirus Hacker's Handbook

The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software.

Gephi Cookbook

Gephi is an open source, user-friendly network visualization and analysis tool that provides numerous powerful features, making it easy for novices to get to grips with graph analysis quickly. This book is your one-stop guide to learning Gephi's interactive networking and visualization, alongside the graph theory concepts that drive them. Each recipe walks you through a task and explains why and how it works. Starting with installing Gephi, you will learn how to begin analyzing a graph using Gephi's various features.

Chef Infrastructure Automation Cookbook, 2nd Edition

Chef is a configuration management tool that lets you automate your more cumbersome IT infrastructure processes and control a large network of computers (and virtual machines) from one master server, making for a smoother network without the usual hassle. Are you a system engineer or administrator who has a fundamental understanding of information management systems and infrastructures? Maybe you've already previously played around with Chef? Either way this book has everything you need to get the most out of every aspect of Chef.

 

1 2 3 4 5 Last