安娜的档案需要您的帮助! 许多人试图关停我们,但我们会奋起反击。
➡️ 如果您现在捐赠,您将获得 双倍 的快速下载次数。 有效期至本月底。 捐赠
✕

安娜的档案

📚 人类历史上最大的完全开放的图书馆。 📈 61,654,285 本图书、95,687,150 篇论文被永久保存。
AA 38TB
direct uploads
IA 304TB
scraped by AA
DuXiu 298TB
scraped by AA
Hathi 9TB
scraped by AA
Libgen.li 188TB
collab with AA
Z-Lib 77TB
collab with AA
Libgen.rs 82TB
mirrored by AA
Sci-Hub 90TB
mirrored by AA
⭐️ Our code and data are 100% open source. 了解更多……
✕ 近期下载:  
主页 主页 主页 主页
安娜的档案
主页
搜索
捐赠
🧬 SciDB
常问问题
账户
登录 / 注册
账户
公开资料
已下载文件
我的捐赠
Referrals
Explore
活动
代码浏览器
ISBN Visualization ↗
Community Projects ↗
Open data
数据集
种子
大语言模型数据
关注我们
联系邮箱
安娜的博客 ↗
Reddit ↗
Matrix ↗
Help out
改进元数据
志愿服务与悬赏
翻译 ↗
Development
安娜的软件 ↗
安全性
数字千年版权法(DCMA)/ 版权声明
镜像
annas-archive.li ↗
annas-archive.pm ↗
annas-archive.in ↗
SLUM [无关联] ↗
SLUM 2 [无关联] ↗
搜索搜索 捐赠 x2捐赠 x2
账户账户
搜索设置
排序
高级
增加特定搜索字段
内容
文件类型 open our viewer
更多……
访问方式
来源
语言
更多……
显示
Search settings
下载 期刊文章 数字借阅 元数据
结果集 1-50(总计 52+)
nexusstc/No Tech Hacking: A Guide To Social Engineering, Dumpster Diving, and Shoulder Surfing (This copy has a cover attached to book)/b779e431c688cab3924307868b3c780c.pdf
No Tech Hacking: A Guide To Social Engineering, Dumpster Diving, and Shoulder Surfing (This copy has a cover attached to book) Johnny Long, Jack Wiles, Scott Pinzon, Kevin D. Mitnick Syngress Media Incorporated, 1, FR, 2008
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the worlds information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isnt much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, youll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks.
更多信息……
英语 [en] · 中文 [zh] · PDF · 27.4MB · 2008 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167474.77
nexusstc/No Tech Hacking: A Guide To Social Engineering, Dumpster Diving, and Shoulder Surfing (This copy has a cover attached to book)/ee16c41b0b2da53522c96b370f579d94.pdf
No Tech Hacking: A Guide To Social Engineering, Dumpster Diving, and Shoulder Surfing (This copy has a cover attached to book) Johnny Long, Jack Wiles, Scott Pinzon, Kevin D. Mitnick Syngress Media Incorporated, 1, FR, 2008
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America. As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology. . Dumpster Diving Be a good sport and don't read the two "D” words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny). . Tailgating Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows. . Shoulder Surfing If you like having a screen on your laptop so you can see what you're working on, don't read this chapter. . Physical Security Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity? . Social Engineering with Jack Wiles Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security. . Google Hacking A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful. . P2P Hacking Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself. . People Watching Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye. . Kiosks What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash? . Vehicle Surveillance Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!
更多信息……
英语 [en] · 中文 [zh] · PDF · 22.6MB · 2008 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 167460.11
duxiu/initial_release/_40270621.zip
模式识别 英文版 第4版 (希)西奥多里德斯等著, (希)Sergios Theodoridis, (希)Konstantinos Koutroumbas著, Eodoridis Th, Utroumbas Ko 机械工业出版社, 2009, 2009
<p>This book considers classical and current theory and practice, of supervised, unsupervised and semi-supervised pattern recognition, to build a complete background for professionals and students of engineering. The authors, leading experts in the field of pattern recognition, have provided an up-to-date, self-contained volume encapsulating this wide spectrum of information. The very latest methods are incorporated in this edition: semi-supervised learning, combining clustering algorithms, and relevance feedback. </p> <p>· Thoroughly developed to include many more worked examples to give greater understanding of the various methods and techniques</p> <p>· Many more diagrams included--now in two color--to provide greater insight through visual presentation</p> <ul> </ul> <p>· Matlab code of the most common methods are given at the end of each chapter.</p> <ul> </ul> <ul> </ul> <p>· More Matlab code is available, together with an accompanying manual, via this site </p> <ul> </ul> <p>· Latest hot topics included to further the reference value of the text including non-linear dimensionality reduction techniques, relevance feedback, semi-supervised learning, spectral clustering, combining clustering algorithms.</p> <p>· An accompanying book with Matlab code of the most common methods and algorithms in the book, together with a descriptive summary, and solved examples including real-life data sets in imaging, and audio recognition. The companion book will be available separately or at a special packaged price (ISBN: 9780123744869). </p><br><br><li>Thoroughly developed to include many more worked examples to give greater understanding of the various methods and techniques <li>Many more diagrams included--now in two color--to provide greater insight through visual presentation <li>Matlab code of the most common methods are given at the end of each chapter <li>An accompanying book with Matlab code of the most common methods and algorithms in the book, together with a descriptive summary and solved examples, and including real-life data sets in imaging and audio recognition. The companion book is available separately or at a special packaged price (Book ISBN: 9780123744869. Package ISBN: 9780123744913) <li>Latest hot topics included to further the reference value of the text including non-linear dimensionality reduction techniques, relevance feedback, semi-supervised learning, spectral clustering, combining clustering algorithms <li>Solutions manual, powerpoint slides, and additional resources are available to faculty using the text for their course. Register at www.textbooks.elsevier.com and search on "Theodoridis" to access resources for instructor. </li>
更多信息……
英语 [en] · 中文 [zh] · PDF · 176.5MB · 2009 · 📗 未知类型的图书 · 🚀/duxiu/zlibzh · Save
base score: 11068.0, final score: 167460.02
upload/motw_shc_2025_10/shc/No Tech Hacking_ A Guide to Social Enginee - Johnny Long.pdf
No Tech Hacking: A Guide To Social Engineering, Dumpster Diving, and Shoulder Surfing (This copy has a cover attached to book) Johnny Long, Jack Wiles, Scott Pinzon, Kevin D. Mitnick Syngress Media Incorporated, 1, FR, 2008
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks. As you browse this book, you'll hear old familiar terms like "dumpster diving", "social engineering", and "shoulder surfing". Some of these terms have drifted into obscurity to the point of becoming industry folklore; the tactics of the pre-dawn information age. But make no mistake; these and other old-school tactics work with amazing effectiveness today. In fact, there's a very good chance that someone in your organization will fall victim to one or more of these attacks this year. Will they be ready? . Dumpster Diving Be a good sport and don't read the two "D" words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny). . Tailgating Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows. . Shoulder Surfing If you like having a screen on your laptop so you can see what you're working on, don't read this chapter. . Physical Security Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity? . Social Engineering with Jack Wiles Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security. . Google Hacking A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful. . P2P Hacking Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself. . People Watching Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye. . Kiosks What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash? . Vehicle Surveillance Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all! About the Author Johnny Long is a Christian by grace, a professional hacker by trade, a pirate by blood, a ninja in training, a security researcher and author. He can be found lurking at his website (http://johnny.ihackstuff.com). He is the founder of Hackers For Charity(http://ihackcharities.org), an organization that provides hackers with job experience while leveraging their skills for charities that need those skills. Kevin Mitnick (Technical Editor) is the most famous computer hacker in the world. Since his first arrest in 1981, at age 17, he has spent nearly half his adult life either in prison or as a fugitive. He has been the subject of three books and his alleged 1982 hack into NORAD inspired the movie War Games. Since his plea-bargain release in 2000, he says he has reformed and is devoting his talents to helping computer security.
更多信息……
英语 [en] · 中文 [zh] · PDF · 22.5MB · 2008 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 167459.73
upload/bibliotik/N/No Tech Hacking - Johnny Long.epub
No Tech Hacking: A Guide To Social Engineering, Dumpster Diving, and Shoulder Surfing (This copy has a cover attached to book) Johnny Long, Jack Wiles, Scott Pinzon, Kevin D. Mitnick Syngress Media Incorporated, 1, FR, 2008
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America. As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology. . Dumpster Diving Be a good sport and don't read the two "D” words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny). . Tailgating Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows. . Shoulder Surfing If you like having a screen on your laptop so you can see what you're working on, don't read this chapter. . Physical Security Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity? . Social Engineering with Jack Wiles Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security. . Google Hacking A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful. . P2P Hacking Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself. . People Watching Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye. . Kiosks What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash? . Vehicle Surveillance Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!
更多信息……
英语 [en] · 中文 [zh] · EPUB · 9.0MB · 2008 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 167459.5
upload/duxiu_main/v/rar/渗透测试实践指南:必知必会的工具与方法(样章).pdf
渗透测试实践指南:必知必会的工具与方法(样章).pdf 渗透测试实践指南:必知必会的工具与方法(样章).pdf 北京:机械工业出版社, Elsevier Ltd., Waltham, MA, 2010
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is required. It shows how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. With a simple and clean explanation of how to effectively utilize these tools – as well as the introduction to a four-step methodology for conducting a penetration test or hack – the book provides students with the know-how required to jump start their careers and gain a better understanding of offensive security. The book is organized into 7 chapters that cover hacking tools such as Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. PowerPoint slides are available for use in class. This book is an ideal reference for security consultants, beginning InfoSec professionals, and students. Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.
更多信息……
英语 [en] · 中文 [zh] · PDF · 34.7MB · 2010 · 📘 非小说类图书 · 🚀/duxiu/lgli/upload/zlib · Save
base score: 11068.0, final score: 167459.19
ia/configuringcisco00elli.pdf
Configuring Cisco Voice over Ip (Syngress) Elliot Lewis, Syngress Media, Matt Campisi, Elliott Lewis Syngress Media,U.S., 1 edition, March 1, 2000
<br> With increasing competition and worldwide deregulation opening up new opportunities for Internet Service Providers (ISPs), it's estimated that the worldwide voice over Internet Protocol (VoIP) long-distance services market will be worth $9.4 billion by 2002. ISPs can turn their existing data infrastructure and subscriber bases to offer domestic and international long-distance phone calls and real-time fax transmissions. <p><i>Configuring Cisco Voice Over IP</i> covers this and a range of possibilities for this rapidly growing technology. The book is organized around the configuration of all of Cisco's core VoIP products, including the voice/fax feature card, integrated access system, voice manager, and the voice-enabled Cisco 2600 and 3600 series. Anyone responsible for the actual installation, configuration, and troubleshooting of a Cisco VoIP device will find this book invaluable. As with all Syngress Media books, online chapter updates will be published three to six months after publication.</p>
更多信息……
英语 [en] · PDF · 20.8MB · 2000 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17477.295
nexusstc/Managing Active Directory for Windows 2000 Server/5ee4a570fc490954ebcf067a6e4c4dc8.epub
Managing Active directory for Windows 2000 Server / [Melissa Craft Syngress, Syngress Media Syngress Media Inc, 1 edition, January 1, 2000
Windows 2000's Active Directory provides a single uniform interface to all of the network's resources, including printers, documents, e-mail addresses, databases, and users. It also manages naming, querying, registration, and resolution needs. This book introduces readers to all of Active Directory's capabilities.
更多信息……
英语 [en] · EPUB · 6.4MB · 2000 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17476.504
lgli/A:\scidir\9781597490894.pdf
Classic Lego Mindstorms Projects and Software Tools: Award-Winning Designs from Master Builders Kevin Clague, Mario Ferrari, Miguel Agullo, Guilio Ferrari, Doug Carlson Syngress Publishing, Pap/Cdr edition, August 1, 2006
This Book/DVD kit meets the growing demand from Lego Mindstorms fans for additional projects that can be built from their existing Lego Mindstorms kits. Over 40 new projects will appeal to that dedicated segment of the Lego audience that are committed to the RIS 1.x and 2.x standards.The book contains seven complete "Master" projects that illustrate how great design, planning, mechanical engineering skills, and programming can create stunning and award winning projects.The DVD contains instruction for over 40 projects in Adobe PDF form, a full suite of Lego software tools, and RCX/NQC code files. The projects range from the simple to the sophisticate, and are perfect for self-learning. \* Complete new set of projects for the RIS 1.x and 2.x \* This Book and DVD package delivers a complete kit, perfect for team projects as well as those individual building \* packed full with award winning designs that will inspire any Mindstorms fan
更多信息……
英语 [en] · PDF · 47.6MB · 2006 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17476.504
nexusstc/Classic Lego Mindstorms Projects and Software Tools: Award-Winning Designs from Master Builders/a8af29ff419811a65f3cf86f868806eb.pdf
Classic Lego Mindstorms Projects and Software Tools: Award-Winning Designs from Master Builders Kevin Clague, Mario Ferrari, Miguel Agullo, Guilio Ferrari, Doug Carlson Syngress Publishing, Pap/Cdr edition, August 1, 2006
This Book/DVD kit meets the growing demand from Lego Mindstorms fans for additional projects that can be built from their existing Lego Mindstorms kits. Over 40 new projects will appeal to that dedicated segment of the Lego audience that are committed to the RIS 1.x and 2.x standards.The book contains seven complete "Master" projects that illustrate how great design, planning, mechanical engineering skills, and programming can create stunning and award winning projects.The DVD contains instruction for over 40 projects in Adobe PDF form, a full suite of Lego software tools, and RCX/NQC code files. The projects range from the simple to the sophisticate, and are perfect for self-learning. \* Complete new set of projects for the RIS 1.x and 2.x \* This Book and DVD package delivers a complete kit, perfect for team projects as well as those individual building \* packed full with award winning designs that will inspire any Mindstorms fan
更多信息……
英语 [en] · PDF · 14.6MB · 2006 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17476.504
lgli/A:\scidir\9781597499477.pdf
Securing the Network Denny Cherry Elsevier/Syngress, Securing SQL Server, 2, 2013
* ''Denny Cherry is what would happen if Bill Gates and AC/DC got together to create a sibling. He’s a bare-knuckles, no holds-barred technologist, and you can bet that if he tells you that something does or doesn’t work, he’s speaking from experience. Active in the community, his passion is sharing. You’ll enjoy this book.''--**Buck Woody, Senior Technology Specialist, Microsoft**''Securing SQL Server - Protecting Your Database from Attackers and SQL Injection Attacks and Defense are two new books out on SQL security. The first, Securing SQL Server - Protecting Your Database from Attackers, author Denny Cherry takes a high-level approach to the topic. The book explains how to secure and protect a SQL database from attack. The book details how to configure SQL against both internal and external-based attacks. This updated edition includes new chapters on analysis services, reporting services, and storage area network security. For anyone new to SQL security, Cherry does a great job of explaining what needs to be done in this valuable guide. In and SQL Injection Attacks and Defense, editor Justin Clarke enlists the help of a set of experts on how to deal with SQL injection attacks. Since SQL is so ubiquitous on corporate networks, with sites often running hundreds of SQL servers; SQL is prone to attacks. SQL injection is a technique often used to attack databases through a website and is often done by including portions of SQL statements in a web form entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database. SQL injection is a code injection technique that exploits security vulnerability in a website's software. The vulnerability happens when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. With that, the need to defend servers against such attacks is an imperative and SQL Injection Attacks and Defense should be required reading for anyone tasks with securing SQL servers.''--**RSA Conference**
更多信息……
英语 [en] · PDF · 9.9MB · 2013 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17476.05
ia/xbox360forensics0000bolt.pdf
Xbox 360 Forensics: a digital forensics guide to examining artifacts / Steven Bolt, Samuel Liles (technical editor) Steven Bolt, Samuel Liles, technical editor Elsevier; Elsevier / Syngress, Elsevier Ltd., Burlington, MA, 2011
XBOX 360 Forensics is a complete investigation guide for the XBOX game console. Because the XBOX 360 is no longer just a video game console — it streams movies, connects with social networking sites and chatrooms, transfer files, and more — it just may contain evidence to assist in your next criminal investigation. The digital forensics community has already begun to receive game consoles for examination, but there is currently no map for you to follow as there may be with other digital media. XBOX 360 Forensics provides that map and presents the information in an easy-to-read, easy-to-reference format.This book is organized into 11 chapters that cover topics such as Xbox 360 hardware; XBOX LIVE; configuration of the console; initial forensic acquisition and examination; specific file types for Xbox 360; Xbox 360 hard drive; post-system update drive artifacts; and XBOX Live redemption code and Facebook.This book will appeal to computer forensic and incident response professionals, including those in federal government, commercial/private sector contractors, and consultants. Game consoles are routinely seized and contain evidence of criminal activity Author Steve Bolt wrote the first whitepaper on XBOX investigations
更多信息……
英语 [en] · PDF · 17.6MB · 2011 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17476.05
lgli/DVD-033/Shinder_T.,_Cunningham_S.,_White_D.L._Configuring_Windows_2000_Server_Security_(2000)(en)(512s).pdf
Configuring Windows 2000 Server Security (Syngress) Thomas W. Shinder, Stace Cunningham, D. Lynn White, Syngress Media, Garrick Olsen Syngress Media ; International Thomson, Syngress, 1, 2000
Microsoft has incorporated dramatic new security changes in Windows 2000 Server,including Kerberos Server Authentification, Public Key Infrastructure (PKI),IP Security (IPSec), Encrypting Filed System (EFS), and Active Directory permissions. This book is an individual guide for anyone bearing the responsibility for the overall security of Windows 2000 Server network.
更多信息……
英语 [en] · PDF · 4.2MB · 2000 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17476.05
lgli/A:\sciencedirect_books\9781597499927 (17).pdf
Unified Communications Forensics : Anatomy of Common UC Attacks Nicholas Grant and Joseph Shaw (Auth.) Syngress is an imprint of Elsevier, 1, 2013
__Unified Communications Forensics: Anatomy of Common UC Attacks__ is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: . analysis of forensic artifacts in common UC attacks . an in-depth look at established UC technologies and attack exploits . hands-on understanding of UC attack vectors and associated countermeasures . companion website **http://secvoip.com** giving readers access to the most up-to-date information on UC attacks. . Provides key information for hackers and pen testers on the most current Unified Communications implementations. . The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment. . Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics.
更多信息……
英语 [en] · PDF · 34.0MB · 2013 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17476.05
ia/hackproofingyour0000bidw.pdf
Hack proofing your identity in the information age : protect your family on the internet! Bidwell, Teri; Syngress Media, Inc Syngress Press [Imprint] Elsevier Science & Technology Books, Elsevier Ltd., Rockland, MA, 2002
Annotation Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet
更多信息……
英语 [en] · PDF · 24.0MB · 2002 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17475.955
zlib/Computers/Operating Systems/Syngress/Deploying Windows 2000 With Support Tools_27776692.pdf
Deploying Windows 2000 with Support Tools (Syngress) Syngress Syngress Media ; International Thomson, 1 edition, May 15, 2000
Windows 2000 Deployment Strategies provides all the information readers need to make intelligent decisions about transitioning from previous operating systems to Windows 2000 - including whether to implement it at all. System administrators can use this book to evaluate the new features of the Windows 2000 family and learn how to incorporate these enhancements into their current office environment. This thorough guide also covers how to simplify system management using the Microsoft Management Console (MMC), and how to centrally manage administration using Active Directory Services. Like all Syngress books, this one features easy-to-read chapters written by experts, a "migration path" chapter with a technology and upgrade overview, a "secrets appendix" that highlights little-known but important features, and detailed indexes that include tables and figures.
更多信息……
英语 [en] · PDF · 3.9MB · 2000 · 📘 非小说类图书 · 🚀/zlib · Save
base score: 11068.0, final score: 17475.955
lgli/9781597492379.Syngress.Reverse_Engineering_Code_With_IDA_Pro.Justin_Ferguson_&_Dan_Kaminsky.Jul.2008.pdf
Reverse Engineering Code with IDA Pro Justin Ferguson & Dan Kaminsky Syngress Publishing, 1, FR, 2008
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code.*Reverse Engineer REAL Hostile CodeTo follow along with this chapter, you must download a file called !DANGER!INFECTEDMALWARE!DANGER!... 'nuff said.*Download the Code!The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language.*Portable Executable (PE) and Executable and Linking Formats (ELF)Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering.*Break Hostile Code Armor and Write your own ExploitsUnderstand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow.*Master DebuggingDebug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers.*Stop Anti-ReversingAnti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how!*Track a Protocol through a Binary and Recover its Message StructureTrace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message.*Develop IDA Scripts and Plug-insLearn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks.ISBN : 9781597492379
更多信息……
英语 [en] · PDF · 9.5MB · 2008 · 📘 非小说类图书 · 🚀/lgli/zlib · Save
base score: 11068.0, final score: 17475.646
lgli/E:\It-Ebooks\Syngress\Syngress.How.To.Cheat.At.Deploying.And.Securing.RFID.Oct.2007.ISBN.1597492302.pdf
How to Cheat at Deploying and Securing RFID (How to Cheat) (How to Cheat) Frank Thornton; Paul Sanghera Syngress Publishing, Elsevier Ltd., Burlington, Mass, 2007
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books. <br><br>Major companies and countries around the world are adopting or considering whether to adopt RFID technologies. Visa and Wells Fargo are currently running tests with RFID, airports around the world are using RFID to track cargo and run customs departments, universities such as Slippery Rock are providing RFID-enabled cell phones for students to use for campus charges. According to the July 9 CNET article, RFID Tags: Big Brother in Small Packages?, "You should become familiar with RFID technology because you'll be hearing much more about it soon. Retailers adore the concept, and CNET News.com's own Alorie Gilbert wrote last week about how Wal-Mart and the U.K.-based grocery chain Tesco are starting to install "smart shelves" with networked RFID readers. In what will become the largest test of the technology, consumer goods giant Gillette recently said it would purchase 500 million RFID tags from Alien Technology of Morgan Hill, CA."<br> <br>For security professionals needing to get up and running fast with the topic of RFID, this <b>How to Cheat</b> approach to the topic is the perfect "just what you need to know" book!<br><br>* For most business organizations, adopting RFID is a matter of when<br>* The RFID services market is expected to reach $4 billion by 2008<br>* Covers vulnerabilities and personal privacy--topics identified by major companies as key RFID issues
更多信息……
英语 [en] · 德语 [de] · PDF · 7.4MB · 2007 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.646
upload/motw_shc_2025_10/shc/Managed Code Rootkits_ Hooking Into Runtim - Erez Metula.pdf
Managed Code Rootkits : Hooking Into Runtime Environments Erez Metula Elsevier, 1, 1, 2010
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack-the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks. Erez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed code that a computer is running, whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker, and countermeasures are covered, making this book a one stop shop for this new attack vector. Introduces the reader briefly to managed code environments and rootkits in general Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation Focuses on managed code including Java, .NET, Android Dalvik and reviews malware development scanarios Review "A well-put-together work: I was able to put some of the tasks to work for me right away. An excellent resource: Technical enough to be useful, but not overly technical." -- Chris Griffin, Trainer, ISECOM USA "As someone who has to deal with .NET security every day, I always look for new ideas and tools to make .NET applications more secure. This book provides both. It's especially valuable when you have to protect apps without having access to their original source code." -- Kyle C. Quest, GREM, GWAPT, GCIH, GCFA, GCIA, GCWN, GCUX, GCFW, GSNA, CISSP, CIPP, Director of Security Engineering, MetraTech "Overall the book is very well structured and presented in a way that maintains the reader's interest as the author delves ever deeper into why hackers use MCRs to target an organisation's applications. Continuity of the content is maintained by helpful summaries at the end of each chapter. Mr Metula is a consummate and talented security practitioner who knows his subject thoroughly. I consider this book to be excellent value for money and would recommend it to any security professional. In today's austere economic climate, modern IT solutions are being sought that are proven value for money. The use of virtual servers is rapidly increasing as they provide better utilisation and increased productivity of existing resources. This book highlights the risks of adopting such technology and provides valuable advice on countermeasures to mitigate those risks."-- InfoSecReviews.com "In today's austere economic climate, modern IT solutions are being sought?that are proven value for money. The use of virtual servers is rapidly increasing?as they provide better utilisation and increased productivity of existing resources. This book highlights the risks of adopting such technology and provides valuable advice on countermeasures to mitigate those risks." --Best Hacking and Pen Testing Books in InfoSecReviews Book Awards From the Back Cover Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack-the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable security checks. Erez Metula shows the reader how these rootkits are developed and inserted and how this attack can change the managed code that a computer is running, whether that be JAVA, .NET, Android Dalvik or any other managed code. Management development scenarios, tools like ReFrameworker, and countermeasures are covered, making this book a one stop shop for this new attack vector.
更多信息……
英语 [en] · PDF · 5.8MB · 2010 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17475.646
ia/dissectinghackf00000stre.pdf
Dissecting the Hack : The F0rb1dd3n Network Street, Jayson E.; Nabors, Kent Elsevier Ltd, Elsevier Ltd., Burlington, MA, 2010
<p><i>Dissecting the Hack</i>&nbsp;is one heck of a ride! Hackers, IT professionals, and Infosec aficionados will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats.</p> <p>Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book!</p> <br> <br> <ul> <li>Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code</li> <li>Introduces basic hacking techniques in real life context for ease of learning</li> <li>Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack</li> </ul>
更多信息……
英语 [en] · PDF · 27.8MB · 2010 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17475.646
lgli/Desconocido - Dan Kaminsky Reverse Engineering Code With Ida Pro Syngress 2008 (2008, ).pdf
Dan Kaminsky Reverse Engineering Code With Ida Pro Syngress 2008 Justin Ferguson; Dan Kaminsky Syngress Publishing, Elsevier Ltd., Burlington, MA, 2008
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the worlds most powerful and popular took for reverse engineering code. *Reverse Engineer REAL Hostile Code To follow along with this chapter, you must download a file called !DANGER!INFECTEDMALWARE!DANGER!... nuff said. *Download the Code! The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language. *Portable Executable (PE) and Executable and Linking Formats (ELF) Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering. *Break Hostile Code Armor and Write your own Exploits Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow. *Master Debugging Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers. * Stop Anti-Reversing Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how! *Track a Protocol through a Binary and Recover its Message Structure Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message. *Develop IDA Scripts and Plug-ins Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks.
更多信息……
英语 [en] · PDF · 5.1MB · 2008 · 📘 非小说类图书 · 🚀/lgli/zlib · Save
base score: 11068.0, final score: 17475.646
nexusstc/PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance/e73f8f98e51822d38aef8686f4861414.pdf
PCI compliance [recurso electrónico] understand and implement effective PCI data security standard compliance Branden R. Williams, Anton Chuvakin Ph.D. Stony Brook University Stony Brook NY. Syngress Publishing, 3°, 2012
The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. __PCI Compliance, 3e,__ provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting millions of customers and costing companies millions of dollars in fines and reparations. That doesn’t include the effects such security breaches have on the reputation of the companies that suffer attacks. __PCI Compliance, 3e,__ helps readers avoid costly breaches and inefficient compliance initiatives to keep their infrastructure secure. * Provides a clear explanation of PCI * Provides practical case studies, fraud studies, and analysis of PCI * The first book to address version 2.0 updates to the PCI DSS, security strategy to keep your infrastructure PCI compliant
更多信息……
英语 [en] · PDF · 6.4MB · 2012 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.646
lgli/Desconocido - Dan Kaminsky Reverse Engineering Code With Ida Pro Syngress 2008 (2008, ).epub
Dan Kaminsky Reverse Engineering Code With Ida Pro Syngress 2008 Desconocido Syngress Publishing, Elsevier Ltd., Burlington, MA, 2008
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the worlds most powerful and popular took for reverse engineering code. *Reverse Engineer REAL Hostile Code To follow along with this chapter, you must download a file called !DANGER!INFECTEDMALWARE!DANGER!... nuff said. *Download the Code! The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language. *Portable Executable (PE) and Executable and Linking Formats (ELF) Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering. *Break Hostile Code Armor and Write your own Exploits Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow. *Master Debugging Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers. * Stop Anti-Reversing Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how! *Track a Protocol through a Binary and Recover its Message Structure Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message. *Develop IDA Scripts and Plug-ins Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks.
更多信息……
英语 [en] · EPUB · 18.8MB · 2008 · 📘 非小说类图书 · 🚀/lgli/zlib · Save
base score: 11068.0, final score: 17475.555
nexusstc/Federal Cloud Computing: The Definitive Guide for Cloud Service Providers/1bea7f51a8a660aac94467d901be598a.pdf
Federal cloud computing [recurso electrónico] : the definitive guide for cloud service providers Matthew Metheny Syngress ; Elsevier Science [distributor, 1st ed, Amsterdam, 2012
__Federal Cloud Computing: The Definitive Guide for Cloud Service Providers__ offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. * Provides a common understanding of the federal requirements as they apply to cloud computing * Provides a targeted and cost-effective approach for applying the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) * Provides both technical and non-technical perspectives of the Federal Assessment and Authorization (A&A) process that speaks across the organization
更多信息……
英语 [en] · PDF · 18.4MB · 2012 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.555
nexusstc/Federal Cloud Computing: The Definitive Guide for Cloud Service Providers/90b46e1bb72e6f6047ffd48e09682d07.epub
Federal cloud computing [recurso electrónico] : the definitive guide for cloud service providers Matthew Metheny Syngress ; Elsevier Science [distributor, 1st ed, Amsterdam, 2012
__Federal Cloud Computing: The Definitive Guide for Cloud Service Providers__ offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. * Provides a common understanding of the federal requirements as they apply to cloud computing * Provides a targeted and cost-effective approach for applying the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) * Provides both technical and non-technical perspectives of the Federal Assessment and Authorization (A&A) process that speaks across the organization
更多信息……
英语 [en] · EPUB · 48.3MB · 2012 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.555
lgli/E:\It-Ebooks\Syngress\Syngress.The.Real.MCTS.MCITP.Windows.Server.2008.Enterprise.Administrator.Exam.70647.Prep.Kit.Apr.2008.ISBN.1597492493.pdf
The Real MCTS/MCITP Exam 70-647 Prep Kit : Independent and Complete Self-Paced Solutions Tariq Bin Azad, Anthony Piltzecker Syngress ; Elsevier Science [distributor, 1st, 2008
This exam is designed to validate skills as a Windows Server 2008 Enterprise Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-647. The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCITP candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. A MCITP Enterprise Administrator is responsible for the overall IT environment and architecture, and translates business goals into technology decisions and designs mid-range to long-term strategies. The enterprise administrator is also responsible for infrastructure design and global configuration changes. * Targeted at MCSE/MCSA upgraders AND new MCITP certification seekers. * Interactive FastTrack e-learning modules help simplify difficult exam topics * Two full-function ExamDay practice exams guarantee double coverage of all exam objectives * Free download of audio FastTracks for use with iPods or other MP3 players * THE independent source of exam day tips, techniques, and warnings not available from Microsoft * Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives
更多信息……
英语 [en] · PDF · 26.1MB · 2008 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.555
lgli/D:\!genesis\library.nu\b6\_298542.b6117dd5ea0324bd1543b18f775e88a8.pdf
Ninja Hacking : Unconventional Penetration Testing Tactics and Techniques Thomas Wilhelm, Jason Andress Syngress/Elsevier, Ninja Hacking, 1, 2011
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: disguise, espionage, stealth, and concealment. Learn how to benefit from these tools by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse! Discusses techniques used by malicious attackers in real-world situationsDetails unorthodox penetration testing techniques by getting inside the mind of a ninjaExpands upon current penetration testing methodologies including new tactics for hardware and physical attacks
更多信息……
英语 [en] · PDF · 10.3MB · 2011 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.555
nexusstc/Applied Cyber Security and the Smart Grid/fcd915e02440a1589dd5713f9e24a0b7.epub
Applied cyber security and the smart grid [recurso electrónico] Implementing security controls into the modern power infrastructure Eric D Knapp; Raj Samani; Joel Langill Syngress Media,U.S., 1, PS, 2013
Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer. Discover the potential of the Smart Grid Learn in depth about its systems See its vulnerabilities and how best to protect it </ul>
更多信息……
英语 [en] · EPUB · 3.7MB · 2013 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.555
lgli/DVD-032/Craft_M.,_Lewis_E._Building_Cisco_Networks_for_Windows_2000_(2000)(en)(566s).pdf
Building Cisco Networks for Windows 2000 Syngress Syngress Media ; International Thomson, Syngress, 1, 2000
The release of Windows 2000 Server represents a major advance in the integration of Microsoft's and Cisco's network technologies. Windows 2000 provides an LDAP-compliant directory service called Active Directory. It is accessible over any TCP/IP based internetwork, including the Internet. As such, the Active Directory is the foundation of this book. Coverage also includes: Quality of Service (QoS). Voice-over Internet Protocol (VoIP) Telephony applications for Cisco's IOS and Microsoft's Windows 2000 IP Routing Streaming data This book is unique in that it explores the technologies of Cisco and Microsoft both separately and together. If you have a network that uses either Cisco equipment or Microsoft Windows 2000, you will find the book useful. If you have a network that uses both Cisco equipment and Microsoft Windows 2000, you will find the book invaluable.
更多信息……
英语 [en] · PDF · 6.0MB · 2000 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.285
ia/digitalforensics0000alth.pdf
Digital Forensics with Open Source Tools Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac, Linux, Unix, etc Harlan Carvey; Cory Altheide Waltham, MA: Syngress, Elsevier Ltd., Burlington, MA, 2011
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a platform for performing computer forensics. Both well-known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts. Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as the open source examination platform; disk and file system analysis; Windows systems and artifacts; Linux systems and artifacts; Mac OS X systems and artifacts; Internet artifacts; and automating analysis and extending capabilities. The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations. This book will appeal to forensic practitioners from areas including incident response teams and computer forensic investigators; forensic technicians from legal, audit, and consulting firms; and law enforcement agencies. Written by world-renowned forensic practitioners Details core concepts and techniques of forensic file system analysis Covers analysis of artifacts from the Windows, Mac, and Linux operating systems
更多信息……
英语 [en] · PDF · 15.2MB · 2011 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17475.285
lgli/A:\scidir\9781597490054.pdf
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals James C. Foster and Mike Price (Auth.) Syngress Pub. Inc. ; Distributed by O'Reilly Media in the United States and Canada, Elsevier Ltd., Rockland, Mass, 2005
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets – The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same – communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode – Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting – Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not “recreate the wheel.”5. Coding Tools – The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.•Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits. •Perform zero-day exploit forensics by reverse engineering malicious code. •Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.
更多信息……
英语 [en] · PDF · 24.4MB · 2005 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.285
zlib/Jurisprudence & Law/Criminology, Forensic Science/Altheide, Cory, Carvey, Harlan/Digital Forensics with Open Source Tools_27453883.pdf
Digital Forensics with Open Source Tools Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac, Linux, Unix, etc Altheide, Cory, Carvey, Harlan Syngress Publishing, 1. Aufl, s.l, 2011
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a platform for performing computer forensics. Both well-known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts. Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as the open source examination platform; disk and file system analysis; Windows systems and artifacts; Linux systems and artifacts; Mac OS X systems and artifacts; Internet artifacts; and automating analysis and extending capabilities. The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations. This book will appeal to forensic practitioners from areas including incident response teams and computer forensic investigators; forensic technicians from legal, audit, and consulting firms; and law enforcement agencies. Written by world-renowned forensic practitioners Details core concepts and techniques of forensic file system analysis Covers analysis of artifacts from the Windows, Mac, and Linux operating systems
更多信息……
英语 [en] · PDF · 4.6MB · 2011 · 📘 非小说类图书 · 🚀/zlib · Save
base score: 11068.0, final score: 17475.285
nexusstc/Cyber Spying/b1952496adc9ca8c6684e5d1c30bcc1d.pdf
Cyber spying : tracking your family's (sometimes) secret online lives Ted Fair, Michael Nordfelt, Eric Cole, Sandra Ring Syngress Publishing, Sometimes Secret Online Lives, 1, 2005
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.
更多信息……
英语 [en] · PDF · 143.8MB · 2005 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.285
ia/pcicomplianceund0000chuv.pdf
PCI Compliance : Understand and Implement Effective PCI Data Security Standard Compliance Anton Chuvakin; Ward Spangenberg; Branden R Williams; Elsevier Elsevier Science & Technology Books; Syngress, Elsevier Ltd., Amsterdam, 2010
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, Second Edition, discusses not only how to apply PCI in a practical and cost-effective way but more importantly why. The book explains what the Payment Card Industry Data Security Standard (PCI DSS) is and why it is here to stay; how it applies to information technology (IT) and information security professionals and their organization; how to deal with PCI assessors; and how to plan and manage PCI DSS project. It also describes the technologies referenced by PCI DSS and how PCI DSS relates to laws, frameworks, and regulations.This book is for IT managers and company managers who need to understand how PCI DSS applies to their organizations. It is for the small- and medium-size businesses that do not have an IT department to delegate to. It is for large organizations whose PCI DSS project scope is immense. It is also for all organizations that need to grasp the concepts of PCI DSS and how to implement an effective security framework that is also compliant. Completely updated to follow the PCI DSS standard 1.2.1 Packed with help to develop and implement an effective security strategy to keep infrastructure compliant and secure Both authors have broad information security backgrounds, including extensive PCI DSS experience
更多信息……
英语 [en] · PDF · 22.5MB · 2010 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17475.285
lgli/A:\usenetabtechnical\Penetration Testers Open Source Toolkit Vol. 2 - A. Bayles, et al., (Elsevier, 2007) WW.pdf
Penetration Tester's Open Source Toolkit, Volume 2 Aaron W. Bayles, technical editor and contributor ... [et al.] Syngress Publishing, Elsevier Ltd., Burlington, MA, 2007
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.<br><br>• Perform Network Reconnaissance<br>Master the objectives, methodology, and tools of the least understood aspect of a penetration test.<br>• Demystify Enumeration and Scanning<br>Identify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services.<br>• Hack Database Services<br>Understand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system.<br>• Test Web Servers and Applications<br>Compromise the Web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications.<br>• Test Wireless Networks and Devices<br>Understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.<br>• Examine Vulnerabilities on Network Routers and Switches<br>Use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices.<br>• Customize BackTrack 2<br>Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.<br>• Perform Forensic Discovery and Analysis with BackTrack 2<br>Use BackTrack in the field for forensic analysis, image acquisition, and file carving.<br>• Build Your Own PenTesting Lab<br>Everything you need to build your own fully functional attack lab.
更多信息……
英语 [en] · PDF · 23.8MB · 2007 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.197
lgli/dvd36/Amini R., Peiris Ch., Snedaker S. - How to Cheat at Designing Security for a Windows Server 2003 Network(2006)(500).pdf
How to Cheat at Designing Security for a Windows Server 2003 Network (How to Cheat) (How to Cheat) Chris Ruston, Chris Peiris Syngress ; Distributed by O'Reilly Media, ITPro collection, Rockland, Mass, ©2006
This guide for busy IT managers describes best practices for creating secure and available remote access to Windows Server 2003 enterprise networks. Each stage of the process is covered, from the analysis of a company's business requirements through the design of various individual components of the security infrastructure. Amini is a systems manager for Marriott International in Salt Lake City. Distributed in the US by O'Reilly.
更多信息……
英语 [en] · PDF · 70.5MB · 2006 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.197
nexusstc/The Real MCTS/MCITP Exam 70-646 Prep Kit: Independent and Complete Self-Paced Solutions/429f076f1e530e2eba1f5afaadd672b0.pdf
The Real MCTS/MCITP Exam 70-646 Prep Kit : Independent and Complete Self-Paced Solutions Naomi Alpern, Tariq Azad, Dustin Hannifin, Shawn Tooley, Tony Piltzecker Syngress ; [Elsevier Science, distributor, Pap/Cdr, 2008
This exam is designed to validate skills as a Windows Server 2008 Server Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-646. The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCITP candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. A MCITP Server Administrator is responsible for the operations and day-to-day management of an infrastructure of servers for an enterprise organization. Server administrators manage the infrastructure, web, and IT application servers, and use scripts to accomplish tasks on a regular basis. They conduct most server management tasks remotely by using Terminal Server or administration tools installed on their local workstation. MCITP Server Administrators also support engineering projects, and are responsible for server builds and configuration. * Targeted at MCSE/MCSA upgraders, AND new MCITP certification seekers. * Interactive FastTrack e-learning modules help simplify difficult exam topics * Two full-function ExamDay practice exams guarantee double coverage of all exam objectives * Free download of audio FastTracks for use with iPods or other MP3 players * Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives
更多信息……
英语 [en] · PDF · 27.2MB · 2008 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.197
nexusstc/XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts/3a6a6152c814c3dfb69723d46c3c21ac.pdf
XBOX 360 Forensics : A Digital Forensics Guide to Examining Artifacts Steven Bolt, Samuel Liles, technical editor Elsevier; Elsevier / Syngress, 1, PT, 2011
<p>Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the likelihood that a criminal investigator encounters an XBOX 360 is a certainty. The digital forensics community has already begun to receive game consoles for examination, but there is no map for them to follow as there may be with other digital media. <i>XBOX 360 Forensics</i> provides that map and present the information for the examiners in an easy to read, easy to read format. </p><br><br><ul><li>Game consoles are routinely seized and contain evidence of criminal activity</li></ul> <ul> <p><li>Author Steve Bolt wrote the first whitepaper on XBOX investigations</li> </ul>
更多信息……
英语 [en] · PDF · 22.1MB · 2011 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.197
lgli/A:\usenetabtechnical\Hack-Proof_Your_Wireless_Network (Syngress, 2002) WW.pdf
Hack proofing your wireless network Christian Barnes; Neal O'Farrell; et al Syngress Pub : Distributed by Publishers Group West in the U.S. & Jaguar Book Group in Canada, Rockland, Mass, ©2002
Traditionally, someone had to be sitting in front of your computer to read your documents, see your e-mail, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front of your computer. Are you using an 802.11 or Bluetooth device on your computer? Are you using a PDA to communicate with other systems or to get onto the Internet? Are you using a cellular phone to initiate a network connection back to your office? Have you just set up the latest wireless gateway at
更多信息……
英语 [en] · PDF · 6.2MB · 2002 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.197
upload/bibliotik/C/Citrix XenDesktop Implementation - Gareth R. James.epub
Citrix XenDesktop Implementation : A Practical Guide for IT Professionals James, Gareth R. Elsevier Science & Technology Books, 2014;2010
Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop Client Settings. This book briefly discusses the work of desktop delivery controller mechanisms followed by its installation process, integration process of XenDesktop with Microsoft Active Directory, and the configuration of the desktop delivery controller. It then examines the process of installing the virtual desktop onto the server infrastructure, and it follows the installation and integration onto Xen Server, Hyper-V, and VMware hypervisors. Furthermore, it discusses the advanced configuration settings. The book covers the installation of the Citrix Provisioning Server and its fundamental configuration. It also explores the configuration of Citrix XenApp for Application provisioning, the integration of virtual applications, and the implementation of virtual profiles into the virtual desktop. The book concludes by explaining the advanced XenDesktop client settings on audio, video, and peripherals. Ideal one-stop handbook for implementing a Citrix XenDesktop virtual desktop solution Includes all technical details required for you to evaluate how Citrix XenDesktop would integrate into your existing environment Covers integration with VMware ESX/vSphere, Microsoft Hyper-V including System Center Virtual Machine Manager (SCVMM) and Citrix XenServer
更多信息……
英语 [en] · EPUB · 18.5MB · 2014 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17475.197
lgli/A:/rsc/SD/9781597492508.pdf
Configuring SonicWALL firewalls Chris Lathem; Daniel H Bendell; Benjamin W Fortenberry; Kevin Lynn; Joshua Reed Syngress Publishing, Elsevier Ltd., Rockland, Mass, 2006
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. <p>This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.</p><p>Configuring SonicWALL Firewalls is the first book to deliver an in-depth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource.</p><p>* First book to deliver an in-depth look at the SonicWALL firewall product line</p><p>* Covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls</p><p>* Includes advanced troubleshooting techniques and the SonicWALL Security Manager</p>
更多信息……
英语 [en] · PDF · 39.6MB · 2006 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.197
nexusstc/Cyber Spying/7e103c52438767e5c4a5a68cd0ea2e33.djvu
Cyber spying : tracking your family's (sometimes) secret online lives Ted Fair; Michael Nordfelt; Sandra Ring; Eric Cole; Ebrary, Inc Syngress Publishing, Sometimes Secret Online Lives, 1, 2005
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.
更多信息……
英语 [en] · DJVU · 48.2MB · 2005 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11055.0, final score: 17475.197
lgli/D:\!genesis\library.nu\95\_73211.95b3ebd6248b36778ccf73988aaab2f2.pdf
CompTIA Linux+ Certification Study Guide (2009 Exam) : Exam XK0-003 Brian Barber; technical editor, Kevin Riggins; contributing authors, Chris Happel, Terrence V. Lillard, Graham Speake Syngress Publishing, 1st, 2009
CompTIA's Linux+ certification is a globally-recognized, vendor neutral exam. The Linux+ exam (XK1-003) is a substantive revision with updates on applications, networking, and security. Our new study guide is aligned to cover all of the material of the updated 2009 exam with special attention to the new topics including troubleshooting Web-related services, understanding DNS record types and resolving them, and the basics of SELinux security. The study guide will cover installing applications, configuring the base system, using BASH, and securing and maintaining Linux. After reading this book, not only will you be able to ace the exam but you will be able to maintain, troubleshoot, and install Linux as workstations and servers. Special Features Include: Covers everything from test taking techniques to advanced topics - keeping the beginner and intermediate IT professional in mind Layout of the guide parallels the 2009 Linux+ objectives for ease of study More than just a book, this kit includes a self test, tiered questions, and two practice exams Covers everything from test taking techniques to advanced topics - keeping the beginner and intermediate IT professional in mindLayout of the guide parallels the 2009 Linux+ objectives for ease of studyMore than just a book, this kit includes a self test, tiered questions, and two practice exams
更多信息……
英语 [en] · PDF · 4.4MB · 2009 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.197
nexusstc/Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management/a06f9b879336d0b10952431bca013d3e.pdf
Logging and Log Management : The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management Anton A. Chuvakin, Kevin J. Schmidt Elsevier Science & Technology Books; Syngress; Elsevier/Syngress, 1, PS, 2012
Effectively analyzing large volumes of diverse logs can pose many challenges. __Logging and Log Management__ helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in detail, including approaches to creating useful logs on systems and applications, log searching and log review. * Comprehensive coverage of log management including analysis, visualization, reporting and more * Includes information on different uses for logs -- from system operations to regulatory compliance * Features case Studies on syslog-ng and actual real-world situations where logs came in handy in incident response * Provides practical guidance in the areas of report, log analysis system selection, planning a log analysis system and log data normalization and correlation
更多信息……
英语 [en] · PDF · 12.4MB · 2012 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17475.197
lgli/A:\usenetabtechnical\Syngress.Mobile.Malware.Attacks.And.Defense.2011.RETAiL.PROPER.eBOOK-RTR .pdf
Mobile Malware Attacks And Defense Ken Dunham; Saeed Abu-Nimeh Syngress Publishing, 2011
Security threats on mobile platforms are one of the key topics and main targets for the next couple of years, given the ubiquity and popularity of these devices, plus their advanced capabilities and use of sensitive application: micro payments, online banking and e-commerce, access to "the cloud", etc. This book is one of the few references, if not the only one (till very recently), focused on the multiple security aspects of the mobile ecosystem. As such, it constitutes a great historical reference about what mobile malware (referred as MM) and threats were until its publication, in late 2008. The book starts by introducing mobile malware, although it can be a bit confusing for the novice reader, as it mixes up attacks, tools and threats (most them Bluetooth based), and for example, WiFi is not even mentioned (yet). The next chapter (ch 2) provides an interesting overview on how mobile malware shows up in a terminal from a user perspective, including the most common behaviors and the kind of interaction expected from the user. It would be great to have a detailed explanation of the propagation method, as with CommWarrior, for all the samples analyzed in this chapter. The next three chapters (ch 3-5) are a really valuable historical reference about mobile malware, including its timeline, how it has evolved since 2000 till 2008, the types of threats, categorized by malware families, the most significant or famous specimens, such as Cabir in the Bluetooth side, plus an extensive taxonomy of mobile malware and threats based on the infection strategy, distribution and payload. Although some tables, with more than 400 references, could have been moved to an appendix to facilitate the reading, this set of chapters summarizes how mobile malware seriously started, back in 2004, and evolved over time. The comparison of different pieces of malware, and the extra analysis of the most relevant specimens, together with the technical details they used to survive, makes this section of the book a very good "encyclopedia". Then, the book reflects the influence of multiple authors, presenting different unconnected and independent chapters. The phishing, SMSishing and Vishing chapter moves out of the mobile space, covering lots of details about these threats on traditional environments, such as common web browser based solutions, and the usage and purpose of the network captures attached is still not clear to me. I still remember my surprise from a technical perspective when I read that the transmitted data between the client and the verification server could not be identified, as they were using an SSL connection: "What about using a HTTP(S) interception proxy?" Finally, it includes an extensive phishing academic research mainly based on Bayesian networks and a distributed framework, which on my opinion, is clearly out of the scope of the book. The more technical chapters come next; chapter 7 focuses on the core elements for the most widely used mobile platforms, their protection mechanisms and how they have been bypassed in the past, covering mainly Windows Mobile (WM), iPhone, Symbian, BlackBerry and J2ME (Java). It includes a extremely short summary on prevention and exploitation. This is complemented by the techniques, methods and tools available for the analysis of mobile malware (ch 8), the in-depth details for the disassembly and debugging of associated binaries (ch 10), plus the strategy and main constraints to perform a forensic analysis on this type of devices (chapters 8 and 9). This is by far the most relevant technical portion of the book. The book follows the old and useful Syngress layout tradition of adding a few common sections at the end of each chapter to reinforce the material covered: Summary, Solutions Fast Track, and FAQ. The first portion of the book (ch 1-5) will be an eye opener for a non-technical audience; highly recommended, together with the last chapter (ch 11) focused on the defensive side and how to mitigate all the threats covered along the book. The second portion for the book (ch 7-10) is focused on security professionals, mainly incident handlers and forensic analyst that need to deal with the technical aspects of mobile attacks and infections. Due to the new mobile threats and issues that turned up in 2009 for the advanced smartphone platforms (like iPhone or Android), and the trend for new and more dangerous specimens expected in 2010, a second volume or edition would be a must.
更多信息……
英语 [en] · PDF · 11.2MB · 2011 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17474.957
ia/eleventhhournetw0000alpe.pdf
Eleventh hour network+ [recurso electrónico] exam N10-004 study guide Naomi J. Alpern, Robert J. Shimonsky Syngress ; Elsevier Science [distributor, Elsevier Ltd., Rockland, Mass, 2010
Eleventh Hour Security+: Exam SY0-201 Study Guide offers a practical guide for those preparing for the CompTIA Network+ exam. The book's 10 chapters provide in-depth discussions of the following topics: network fundamentals; network media; network devices; wireless networking; open systems interconnection (OSI) model and networking protocols; transmission control protocol/internet protocol (TCP/IP) and IP routing; wide area networking; hardware and software security; network management; and network troubleshooting. Each chapter includes information on exam objectives, exam warnings, and the top five toughest questions along with their answers. The only book keyed to the new 2009 objectives that has been crafted for last minute cramming Easy to find, essential material with no fluff – this book does not talk about security in general, just how it applies to the test Includes review of five toughest questions by topic - sure to improve your score
更多信息……
英语 [en] · PDF · 12.3MB · 2010 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17474.957
lgli/U:\!Genesis\!!ForLG\!!!3\Syngress.Cisco.Router.and.Switch.Forensics.Investigating.and.Analyzing.Malicious.Network.Activity.Apr.2009.eBook-DDU.pdf
Managing and Securing a Cisco SWAN Dale Liu, lead author and technical editor; James Burton ... [et al.] Syngress Publishing, 1st, 2009
This book is essential reading for any network admin, network engineer, or security consultant responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network. It covers all product features, with particular attention to the challenges of integrating legacy Cisco products into a Wireless-Aware network. Specifically, the book also includes coverage of Cisco IOS Software-based Cisco Aironet Series access points, Cisco and Cisco Compatible client adapters and the CiscoWorks Wireless LAN Solution Engine (WLSE). - Emphasis on AUTOMATING and SIMPLIFYING the management of mixed environment (wired and wireless) networks. - Describes how to centralized control and configuration of thousands of networking devices - Security blueprint to help detect rogue access points and achieve fast, secure roaming for mobile applications
更多信息……
英语 [en] · PDF · 11.2MB · 2009 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17474.957
lgli/N:\libgen djvu ocr\109000\c5fb67d8001d08bdcd8a94800b0c53c0-ocr.djvu
Windows to Linux Migration Toolkit : Your Windows to Linux Extreme Makeover David Allen, Christian Lahti, Herbert Lewis, John Streeton Stile, James Stanger, Andrew Taylor Scott, Timothy Tuck Syngress Pub. ; Distributed by O'Reilly Media in the United States and Canada, 1 edition, November 11, 2004
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services will find this book valuable. The book will help them fine-tune their migration services to make them more efficient, thorough, feature-enhanced, and cost-effective by utilizing migration scripts and best practices gleaned from the author's many years of real-world migrations in large and small companies. * The book and fully functioning scripts on the CD-ROM work for migrations from Windows NT or Windows 2000 to any Linux distribution. * David Allen has done over 25,000 user migrations from Windows to Linux. * Microsoft will stop supporting Windows NT in December 2004 forcing over 2 million enterprise customers to migrate from Windows NT to a new sever operating system. Both IBM and Dell are offering enterprise servers running Linux which will allow customers to realize a 50% reduction in TCO. In 2003 Linux servers represented the largest growth segment in the Server market, and all the major research groups indicate this trend will continue through t least 2007.
更多信息……
英语 [en] · DJVU · 8.1MB · 2004 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11055.0, final score: 17474.873
ia/unixforensicanal0000pogu.pdf
UNIX and Linux Forensic Analysis DVD Toolkit Chris Pogue; Cory Altheide; Todd Haverkos Rockland: Syngress Publishing, Elsevier Ltd., Burlington, Mass, 2008
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by the attacker. The book begins with a chapter to describe why and how the book was written, and for whom, and then immediately begins addressing the issues of live response (volatile) data collection and analysis. The book continues by addressing issues of collecting and analyzing the contents of physical memory (i.e., RAM). The following chapters address /proc analysis, revealing the wealth of significant evidence, and analysis of files created by or on UNIX systems. Then the book addresses the underground world of UNIX hacking and reveals methods and techniques used by hackers, malware coders, and anti-forensic developers. The book then illustrates to the investigator how to analyze these files and extract the information they need to perform a comprehensive forensic analysis. The final chapter includes a detailed discussion of loadable kernel Modules and malware. Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else. This book contains information about UNIX forensic analysis that is not available anywhere else. Much of the information is a result of the author's own unique research and work. The authors have the combined experience of law enforcement, military, and corporate forensics. This unique perspective makes this book attractive to all forensic investigators.
更多信息……
英语 [en] · PDF · 16.8MB · 2008 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17474.873
nexusstc/Windows Forensic Analysis DVD Toolkit/73a1a8042b299c1e861ef0b5e3132be9.pdf
Windows Forensic Analysis DVD Toolkit, Second Edition Harlan Carvey, Eoghan Casey, technical editor Syngress Publishing, 2nd ed., Burlington, MA, Massachusetts, 2009
Windows is the largest operating system on desktops and servers worldwide, which mean more intrusions and cybercrime happen on these systems. This book covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants.
更多信息……
英语 [en] · PDF · 6.2MB · 2009 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17474.66
上一页 1 2 下一页
上一页 1 2 下一页
安娜的档案
主页
搜索
捐赠
🧬 SciDB
常问问题
账户
登录 / 注册
账户
公开资料
已下载文件
我的捐赠
Referrals
Explore
活动
代码浏览器
ISBN Visualization ↗
Community Projects ↗
Open data
数据集
种子
大语言模型数据
关注我们
联系邮箱
安娜的博客 ↗
Reddit ↗
Matrix ↗
Help out
改进元数据
志愿服务与悬赏
翻译 ↗
Development
安娜的软件 ↗
安全性
数字千年版权法(DCMA)/ 版权声明
镜像
annas-archive.li ↗
annas-archive.pm ↗
annas-archive.in ↗
SLUM [无关联] ↗
SLUM 2 [无关联] ↗