Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


1. 

NFC mit Android und Arduino

NFC mit Android und Arduino

By: Tim Igoe; ;

Publisher: O'Reilly Verlag

Publication Date: 24-JUL-2014

Insert Date: 25-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Near Field Communications (NFC) ist eine Übertragungstechnik zum kontaktlosen Datenaustausch per Funktechnik über kurze Strecken. Praktisch jedes Android-Smartphone ist mit einem NFC-Modul ausgestattet. Das Buch erläutert den Einsatz dieser rasant wachsenden Technologie mit zahlreichen Anwendungsbeispielen, mit Beispiel-Code, Übungen und Schritt-für-Schritt-Projektanleitungen. Der Leser erfährt, wie eigene NFC-Anwendungen für das Android-Smartphone, für den Arduino und Embedded-Linux-Geräte erstellt werden....

2. 

Kali Linux CTF Blueprints

Kali Linux CTF Blueprints

By: Cameron Buchanan

Publisher: Packt Publishing

Publication Date: 24-JUL-2014

Insert Date: 25-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux Put the skills of the experts to the test with these tough and customisable pentesting projects Develop each challenge to suit your specific training, testing, or client engagement needs Hone your skills, from wireless attacks to social engineering, without the need to access live systems In Detail As attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools are in high demand....

3. 

Cyber Crime and Cyber Terrorism Investigator's Handbook

Cyber Crime and Cyber Terrorism Investigator's Handbook

By: Babak Akhgar; Andrew Staniforth; Francesca Bosco

Publisher: Syngress

Publication Date: 26-NOV-2014

Insert Date: 24-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator’s Handbook describes and...

4. 

Automation through Chef Opscode

Automation through Chef Opscode

By: Navin Sabharwal; Manak Wadhwa

Publisher: Apress

Publication Date: 20-JUL-2014

Insert Date: 22-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Automation through Chef Opscode provides an in-depth understanding of Chef, which is written in Ruby and Erlang for configuration management, cloud infrastructure management, system administration, and network management. Targeted at administrators, consultants, and architect, the book guides them through the advanced features of the tool which are necessary for infrastructure automation, devops automation, and reporting. The book presumes knowledge of Ruby and Erlang which are used as reference languages for creating recipes and cookbooks and as a refresher on them to help the reader...

5. 

Information Security Breaches: Avoidance and Treatment Based on ISO27001, 2nd Edition

Information Security Breaches: Avoidance and Treatment Based on ISO27001, 2nd Edition

By: Michael Krausz

Publisher: IT Governance Ltd

Publication Date: 27-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

What if you suffer an information security breach? Many titles explain how to reduce the risk of information security breaches. Nevertheless breaches do occur, even to organisations that have taken all reasonable precautions.  Information Security Breaches - Avoidance and treatment based on ISO27001:2013  helps you to manage this threat by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive When your organisation’s security is compromised, you cannot afford to waste time deciding how to resolve the issue. You must be ready to take prompt and...

6. 

Penetration Testing Services Procurement Guide

Penetration Testing Services Procurement Guide

By: CREST

Publisher: IT Governance Ltd

Publication Date: 15-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities.It presents a useful overview of the key concepts you will need to understand to conduct a well-managed penetration test, explaining what a penetration test is (and is not), outlining its strengths and limitations, and describing why an organisation would typically choose to employ an external provider of penetration testing services. ...

7. 

Procuring Penetration Testing Services

Procuring Penetration Testing Services

By: CREST

Publisher: IT Governance Ltd

Publication Date: 15-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat to key systems is ever increasing and the probability of a security weakness being accidentally exposed or maliciously exploited needs to be continually assessed – such as via a penetration test – to ensure that the level of risk is at an acceptable level to the business. A penetration test involves the use of a variety of manual and automated techniques to simulate an attack on an organisation’s information security arrangements –...

8. 

CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition

CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition

By: Julie Mehan

Publisher: IT Governance Ltd

Publication Date: 08-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Successful cyberattacks can damage your organisation, no matter who is behind them The goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same – but the outcomes can be equally devastating. Each can cause serious challenges for your organisation, ranging from information theft and disruption of normal operations to loss of reputation or credibility. Cyber security is much more than technology Many books on cybersecurity focus on technical responses to these threats. As important as this is, human fallibility and other...

9. 

IBM Distributed Virtual Switch 5000V Quickstart Guide

IBM Distributed Virtual Switch 5000V Quickstart Guide

By: David Cain; Per Ljungstrøm; Jason G. Neatherway; Sangam Racherla; Lutfi Rachman

Publisher: IBM Redbooks

Publication Date: 02-JUL-2014

Insert Date: 09-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

The IBM® Distributed Virtual Switch 5000V (DVS 5000V) is a software-based network switching solution that is designed for use with the virtualized network resources in a VMware enhanced data center. It works with VMware vSphere and ESXi 5.0 and beyond to provide an IBM Networking OS management plane and advanced Layer 2 features in the control and data planes. It provides a large-scale, secure, and dynamic integrated virtual and physical environment for efficient virtual machine (VM) networking that is aware of server virtualization events, such as VMotion and Distributed Resource Scheduler...

10. 

IBM HiperSockets Implementation Guide

IBM HiperSockets Implementation Guide

By: Mike Ebbers; Micky Reichenberg; Alexandra Winter

Publisher: IBM Redbooks

Publication Date: 10-JUN-2014

Insert Date: 02-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

This IBM® Redbooks® publication provides information about the IBM System z® HiperSockets™ function. It offers a broad description of the architecture, functions, and operating systems support. This publication will help you plan and implement HiperSockets. It provides information about the definitions needed to configure HiperSockets for the supported operating systems. This book is intended for system programmers, network planners, and systems engineers who want to plan and install HiperSockets. A solid background in network and Transmission Control Protocol/Internet Protocol (TCP/IP) is...

11. 

Ethernet, 3rd Edition

Ethernet, 3rd Edition

By: Jörg Rech

Publisher: dpunkt

Publication Date: 30-JUN-2014

Insert Date: 29-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Standardwerk- praktisch verwertbare Infos – von der Verkabelung bis zur Konfiguration- vollständige Beschreibung der Ethernet-Technik- berücksichtigt neueste Entwicklungen der Ethernet-Technologie ...

12. 

Programming MapReduce with Scalding

Programming MapReduce with Scalding

By: Antonios Chalkiopoulos

Publisher: Packt Publishing

Publication Date: 25-JUN-2014

Insert Date: 27-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

A practical guide to designing, testing, and implementing complex MapReduce applications in Scala Develop MapReduce applications using a functional development language in a lightweight, high-performance, and testable way Recognize the Scalding capabilities to communicate with external data stores and perform machine learning operations Full of illustrations and diagrams, practical examples, and tips for deeper understanding of MapReduce application development In Detail Programming MapReduce with Scalding is a practical guide to setting up a development environment and...

13. 

Take Control of Your Apple Wi-Fi Network

Take Control of Your Apple Wi-Fi Network

By: 

Publisher: TidBITS Publishing, Inc.

Publication Date: 21-JUN-2014

Insert Date: 27-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Take Control of Your Apple Wi-Fi Network: Get help with Apple 802.11ac and 802.11n networking!Although setting up a simple Wi-Fi network with Apple gear is no longer an especially geeky endeavor, making an existing network work optimally still takes effort, given the numerous possible options and places where problems can crop up.Wi-Fi wizard Glenn Fleishman helps you create a fast, reliable, and secure Apple Wi-Fi network using 802.11ac or 802.11n AirPort Extreme, AirPort Express, and Time Capsule base stations. You'll find plenty of practical directions for working with Apple's AirPort...

14. 

Game Theory Applications in Network Design

Game Theory Applications in Network Design

By: Sungwook Kim

Publisher: IGI Global

Publication Date: 31-MAY-2014

Insert Date: 27-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

The use of game theoretic techniques is playing an increasingly important role in the network design domain. Understanding the background, concepts, and principles in using game theory approaches is necessary for engineers in network design. Game Theory Applications in Network Design provides the basic idea of game theory and the fundamental understanding of game theoretic interactions among network entities. The material in this book also covers recent advances and open issues, offering game theoretic solutions for specific network design issues. This publication will benefit students,...

15. 

Extending Puppet

Extending Puppet

By: Alessandro Franceschi

Publisher: Packt Publishing

Publication Date: 24-JUN-2014

Insert Date: 26-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Design, manage, and deploy your Puppet architecture with the help of real-world scenarios Plan, test, and execute your Puppet deployments Write reusable and maintainable Puppet code Handle challenges that might arise in upcoming versions of Puppet Explore the Puppet ecosystem in-depth, through a hands-on, example driven approach In Detail Puppet has changed the way we manage our systems, but Puppet itself is changing and evolving, as are the ways in which we use it. A clear, updated, practical, and focused view of the current state of the technology and the...

16. 

Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing

By: Robert W. Beggs

Publisher: Packt Publishing

Publication Date: 24-JUN-2014

Insert Date: 26-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers Conduct realistic and effective security tests on your network Demonstrate how key data systems are stealthily exploited, and learn how to identify attacks against your own systems Use hands-on techniques to take advantage of Kali Linux, the open source framework of security tools In Detail Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security—from selecting the most effective...

17. 

Building Virtual Pentesting Labs for Advanced Penetration Testing

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Publisher: Packt Publishing

Publication Date: 20-JUN-2014

Insert Date: 24-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Build intricate virtual architecture to practice any penetration testing technique virtually Build and enhance your existing pentesting methods and skills Get a solid methodology and approach to testing Step-by-step tutorial helping you build complex virtual architecture In Detail A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or network from the outside world and internal threats. With the increase of advanced hackers and threats to our virtual world, pentesting is an...

18. 

Network Topology in Command and Control

Network Topology in Command and Control

By: T. J. Grant; R. H. P. Janssen; H. Monsuur

Publisher: IGI Global

Publication Date: 31-MAY-2014

Insert Date: 22-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining...

19. 

Sharing Network Resources

Sharing Network Resources

By: Abhay Parekh; Jean Walrand

Publisher: Morgan & Claypool Publishers

Publication Date: 01-APR-2014

Insert Date: 20-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the...

20. 

Software Defined Networks

Software Defined Networks

By: Paul Goransson; Chuck Black

Publisher: Morgan Kaufmann

Publication Date: 05-JUN-2014

Insert Date: 18-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Software Defined Networks discusses the historical networking environment that gave rise to SDN, as well as the latest advances in SDN technology. The book gives you the state of the art knowledge needed for successful deployment of an SDN, including: How to explain to the non-technical business decision makers in your organization the potential benefits, as well as the risks, in shifting parts of a network to the SDN model How to make intelligent decisions about when to integrate SDN technologies in a network How to decide if your organization should be developing its own SDN...