Top Paid Books - Netwerk - Your selected Country: Netherlands

apps view_module menu
  • Ghost in the Wires

    William L. Simon, Steve Wozniak & Kevin Mitnick

    Netwerk In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data (Frank W. Abagnale). Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated through false identities, a host of cities, and plenty of close shaves, to an ultimate showdown with the Feds, who would stop at nothing to bring him down. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escapes -- and a portrait of a visionary who forced the authorities to rethink the way they pursu
  • System Design Interview – An Insider's Guide

    Alex Xu

    Netwerk The system design interview is considered to be the most complex and most difficult technical job interview by many. This book provides a step-by-step framework on how to tackle a system design question. It provides many examples to illustrate the systematic approach with detailed steps that you can follow. What’s inside? - An insider’s take on what interviewers really look for and why. - A 4-step framework for solving any system design interview question. - 15 real system design interview questions with detailed solutions. - 188 diagrams to visually explain how different systems work. Table Of Contents Chapter 1: Scale From Zero To Millions Of Users Chapter 2: Back-of-the-envelope Estimation Chapter 3: A Framework For System Design Interviews Chapter 4: Design A Rate Limiter Chapter 5: Design Consistent Hashing Chapter 6: Design A Key-value Store Chapter 7: Design A Unique Id Generator In Distributed Systems Chapter 8: Design A Url Shortener Chapter 9: Design A Web Crawler Chapte
  • Synology NAS Setup Guide

    Nicholas Rushton

    Netwerk Based around DSM 7.2, Updated September 2024 With superb functionality and ease of use through the acclaimed DSM operating system, Synology DiskStations are the NAS of choice for the discerning purchaser. Whether it is the storage and sharing of information, the streaming of videos, music and photos to computers and smart devices using Plex, video surveillance, or the ability to have a private cloud that allows access to information from anywhere, the DiskStation can do it. But this power and flexibility comes at a price: setting up a DiskStation for the very first time can seem a daunting prospect. This guide, with over 360 illustrations and screen shots and proven easy-to-follow instructions, will take you through the process from start to finish and help ensure that your home or small business network is a success. Covers working with Windows, Mac, Linux PCs, Chromebooks, Smartphones and tablets. Whether you have just purchased a DiskStation, are about to, or simply want to find ou
  • The Cold Start Problem

    Andrew Chen

    Netwerk 'A true Silicon Valley insider' Wired Why do some products take off? And what can we learn from them? The hardest part of launching a product is getting started. When you have just an idea and a handful of customers, growth can feel impossible. This is the cold start problem. Now, one of Silicon Valley's most esteemed investors uncovers how any product can surmount the cold start problem - by harnessing the hidden power of network effects. Drawing on interviews with the founders of Uber, LinkedIn, Airbnb and Zoom, Andrew Chen reveals how any start-up can launch, scale and thrive. _ 'Chen walks readers through interviews with 30 world-class teams and founders, including from Twitch, Airbnb and Slack, to paint a picture of what it takes to turn a start-up into a massive brand' TechCrunch 'Articulates the stages that every product must go through to be successful . . . and illustrates what companies need to do to achieve them' Forbes
  • Official 2 Guide to the CISSP CBK

    Hal Tipton & Steven Hernández

    Computers en internet With each new advance in connectivity and convenience comes a new wave of threats to privacy and security that are capable of destroying a company’s reputation, violating a consumer’s privacy, compromising intellectual property, and in some cases endangering personal safety. This is why it is essential for security professionals to stay current on the latest advances in technology and the new security threats they create. Recognized as one of the best tools available for the information security professional and especially for candidates studying for the (ISC)² CISSP examination, the Official (ISC)²® Guide to the CISSP® CBK®, Third Edition is both up-to-date and relevant, reflecting the latest developments in this ever-changing field and providing an intuitive approach to the CISSP Common Body of Knowledge (CBK). It provides a robust and comprehensive study of the 10 domains of the CBK, which covers everything from access controls and cryptography to operations security and p
  • TCP / IP For Dummies

    Candace Leiden & Marshall Wilensky

    Netwerk Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments. TCP/IP For Dummies, 6th Edition, is both an introduction to the basics for beginners as well as the perfect go-to resource for TCP/IP veterans. The book includes the latest on Web protocols and new hardware, plus very timely information on how TCP/IP secures connectivity for blogging, vlogging, photoblogging, and social networking. Step-by-step instructions show you how to install and set up TCP/IP on clients and servers; build security with encryption, authentication, digital certificates, and signatures; handle new voice and mobile technologies, and much more. Transmission Control Protocol / Internet Protocol (TCP/IP) is the de facto standard transmission medium worldwide for computer-to-computer communications; intranets, private internets, and the In
  • The Big Switch: Rewiring the World, from Edison to Google

    Nicholas Carr

    Netwerk “Magisterial…Draws an elegant and illuminating parallel between the late-19th-century electrification of America and today’s computing world.” —Salon Hailed as “the most influential book so far on the cloud computing movement” (Christian Science Monitor), The Big Switch makes a simple and profound statement: Computing is turning into a utility, and the effects of this transition will ultimately change society as completely as the advent of cheap electricity did. In a new chapter for this edition that brings the story up-to-date, Nicholas Carr revisits the dramatic new world being conjured from the circuits of the “World Wide Computer.”
  • Networking for Systems Administrators

    Michael W. Lucas

    Netwerk Stop waiting for the network team! If basic TCP/IP was hard, network administrators couldn’t do it. Servers give sysadmins a incredible visibility into the network—once they know how to unlock it. Most sysadmins don’t need to understand window scaling, or the differences between IPv4 and IPv6 echo requests, or other intricacies of the TCP/IP protocols. You need only enough to deploy your own applications and get easy support from the network team. This book teaches you: How modern networks really work The essentials of TCP/IP The next-generation protocol, IPv6 The right tools to diagnose network problems, and how to use them Troubleshooting everything from the physical wire to DNS How to see the traffic you send and receive Connectivity testing How to communicate with your network team to quickly resolve problems A systems administrator doesn’t need to know the innards of TCP/IP, but knowing enough to diagnose your own network issues transforms a good sysadmin into a great one
  • Cisco IOS Quick Reference Cheat Sheet

    Douglas Chick

    Netwerk Cisco IOS Down & Dirty Quick Reference Companion is a FAST ACCESS to Cisco commands and examples. In addition; each command has a direct link to Cisco’s website for more information and examples. This digital reference guide is a MUST HAVE for any network administrator or engineer that I keep on my laptop, digital reader, or smartphone when you need it. (especially when you cannot get to the internet) With a complete list of commands, description, and link directly to Cisco’s webpage, this is more than just a cheat sheet but a valued resource during emergencies and even a great study guide for your CCNA or any other type of Cisco Certification.
  • Official 2 Guide to the CISSP CBK

    Hal Tipton

    Computers en internet Never in the history of human civilization has a society been more interconnected through technology and devices than today. Telecommunications and network security are crucial aspects of the modern communications infrastructure which supports unsurpassed communications and collaboration around the world. While communication has become easier than ever, so has the ability to disrupt or eavesdrop sensitive communications.  From data to video to voice, telecommunications and network security has never been more significant than today.  Ensuring sound and effective communication infrastructures will become the norm for information security professionals.
  • BGP and the Internet

    Dimitrios Voutsinas

    Netwerk The Border Gateway Protocol (BGP) connects our digital universe. BGP is a conduit for the Internet and without BGP the Internet would not exist as we know it. All the digital richness it provides, the human and machine interaction, the email, videos, news, social networking and e-commerce, all this and much more would not be possible without BGP. BGP is perhaps one of the most important Network Protocols. What is BGP? This eBook started out as a three-day BGP training course, and was developed during the late 1990s to early 2000s when the proliferation of the Internet started to gain momentum. There was a growing demand for individuals with network and BGP knowledge and experience and as a consequence, there was an increasing demand for educational material. The original training course has been adapted into an eBook. This eBook contains the culmination of 20 years network communications and Internet field experience as well as lecture and personal notes. BGP and the Internet, explore
  • VMware vSphere For Dummies

    Daniel Mitchell & Tom Keegan

    Netwerk A plain-English guide to the market-leading virtualization and cloud computing technology With virtualization, a single server can host dozens or hundreds of virtual machines running a variety of operating systems, and even hook them together in a virtual network or cloud infrastructure. This practical guide shows you how to create a virtual system using the VMware VSphere environment.  You'll find all the information you need to understand, design, and deploy one—without getting overwhelmed with technical detail. And once you’re up and running, this book is the perfect reference for maintenance and troubleshooting issues. Introduces you to virtualization and VMware’s virtualization/cloud computing technology, the most recent version is VMware vSphere Shows you how to design a vSphere environment Covers installation, deployment, management, maintenance, and troubleshooting Provides what IT managers and system administrators need to roll out their first virtualized or cloud
  • TCP/IP for Everyone

    Murat Yildirimoglu

    Netwerk Internet is based on TCP/IP. There are many terms like IP, DNS, VPN, etc., and the books explaining them are so detailed. This book introduces you to the World of TCP/IP. You will have a basic understanding of TCP/IP after reading this book. IP addres types, DHCP, DNS, NAT, Proxy, VPN and IPv6 subjects are explained. And it is funny somewhat:)
  • Hunting Cyber Criminals

    Vinny Troia

    Netwerk The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries. This book’s
  • Advanced Penetration Testing

    Wil Allsopp

    Netwerk Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data—even from organizations without a direct Internet connection—this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to b
  • Kali Linux Cookbook

    Willie L. Pritchett & David De Smet

    Netwerk A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.
  • Internet Routing with BGP

    Iljitsch van Beijnum

    Netwerk The internet is “a network of networks”. It’s made up of tens of thousands of largely independent networks, but somehow the users of one network can communicate with the users of any of the other networks. The Border Gateway Protocol (BGP) is the glue that binds these disparate networks together. BGP is a routing protocol: its main job is to allow each network to learn which ranges of IP addresses are used where, so packets can flow along the correct route. However, BGP has a more difficult job to do than other routing protocols. Yes, it has to make the packets reach their destination, but BGP also has to pay attention to the business side: those packets only get to flow over a network link if either the sender or the receiver pays for the privilege. This book covers the fundamentals of the technical side of BGP, and also looks at the intersection between the technical and business aspects of internet routing. The book contains 40 configuration examples that readers can try out
  • Windows Server 2019 & Essentials Installation Guide for Small Businesses

    Nicholas Rushton

    Netwerk Windows Server 2019 is a popular version of Microsoft's server operating system, available in Standard version and as Essentials, a version designed for organizations with up to 25 employees. However, as with most modern applications it comes with only the most basic of instructions. This book is a succinct installation guide produced from a real-world perspective and written according to the Goldilocks Principle: not too little information, not too much information, but just right. It assumes a reasonable working knowledge of Windows and the basics of networking. It is written in a friendly, “do-it-like-this” style, rather than with undue emphasis on theory and abstract topics. With over 190 illustrations and screenshots, practical examples and clear explanations, it takes you through setting up Windows Server and the Essentials variant in a typical small organisation. Whether you are installing it for the first time, are planning to do so or are just plain curious and learning W
  • This Week: A Packet Walkthrough On the M, MX, and T Series

    Antonio Sánchez-Monge

    Netwerk This Week: A Packet Walkthrough on the M, MX, AND T Series By Antonio Sánchez-Monge One of the most exciting advantages of ping is its ability to uncover details of the internal architecture of M/MX/T-Series routers. In Antonio Sanchez-Monge’s new book, ping becomes a tourist guide that takes you on a packet walkthrough and provides you with a new perspective of the device architecture. The author shows you, in detail, that ping is a surprisingly flexible resource for feature testing, design, operation, and troubleshooting. Here is a book brimming with valuable information for troubleshooting the interactions between different components inside a router, with unique usage applications for both large and small network operators. “It’s not a trivial task to troubleshoot or monitor the healthiness of today’s modern IP/MPLS network – yet here is a remedy using simple, basic tools. Once you go through this book you will be amazed at the impressive results you can get out of ping
  • Official 2 Guide to the CISSP CBK

    Hal Tipton

    Computers en internet Much like homes or our lives, security requires a plan and a structure to be effective.  Security architecture and design determines the most efficient and effective application of security principles at the right cost.  The most complete compendium of industry knowledge compiled by the foremost experts in global security. A must-have for those seeking to attain the Certified Information Systems Security Professional (CISSP) credential.
  • SharePoint 2010 For Dummies

    Vanessa L. Williams

    Netwerk Here's the bestselling guide on SharePoint 2010, updated to cover Office 365 SharePoint Portal Server is an essential part of the enterprise infrastructure for many businesses. The Office 365 version includes significantly enhanced cloud capabilities. This second edition of the bestselling guide to SharePoint covers getting a SharePoint site up and running, branded, populated with content, and more. It explains ongoing site management and offers plenty of advice for administrators who want to leverage SharePoint and Office 365 in various ways. Many businesses today rely on SharePoint Portal Server to aggregate SharePoint sites, information, and applications into a single portal This updated edition covers the enhanced cloud capacities of Office 365 and Microsoft SharePoint Online Shows how to use SharePoint to leverage data centers and collaborate with both internal and external customers, including partners and clients Covers getting a site up and running, populating it with content,
  • The Official 2 CISSP CBK Reference

    Arthur J. Deane & Aaron Kraus

    Netwerk The only official, comprehensive reference guide to the CISSP Thoroughly updated for 2021 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024. This CBK covers the current eight domains of CISSP with the necessary depth to apply them to the daily practice of information security. Revised and updated by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with: Common and good practices for each objective Common vocabulary and definitions References to widely accepted computing standards Highlights of successful approaches through case st
  • Networking All-in-One For Dummies

    Doug Lowe

    Netwerk Your ultimate one-stop networking reference    Designed to replace that groaning shelf-load of dull networking books you’d otherwise have to buy and house,  Networking All-in-One For Dummie s covers all the basic and not-so-basic information you need to get a network up and running. It also helps you keep it running as it grows more complicated, develops bugs, and encounters all the fun sorts of trouble you expect from a complex system. Ideal both as a starter for newbie administrators and as a handy quick reference for pros, this book is built for speed, allowing you to get past all the basics—like installing and configuring hardware and software, planning your network design, and managing cloud services—so you can get on with what your network is actually intended to do.   In a friendly, jargon-free style
  • Kali Linux Cookbook - Second Edition

    Corey P. Schultz & Bob Perciaccante

    Netwerk Over 80 recipes to effectively test your network and boost your career in security About This Book • Learn how to scan networks to find vulnerable computers and servers • Hack into devices to control them, steal their data, and make them yours • Target wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux Who This Book Is For If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linux What You Will Learn • Acquire the key skills of ethical hacking to perform penetration testing • Learn how to perform network reconnaissance • Discover vulnerabilities in hosts • Attack vulnerabilities to take control of workstations and servers • Understand password cracking to bypass security • Lear
  • Day One: MPLS for Enterprise Engineers

    Darren O'Connor

    Netwerk Day One: MPLS for Enterprise Engineers By Darren J. S. O’Connor There are many books on MPLS, even within the Day One library, but most are directed towards engineers with high levels of expertise and some networking engineers can get quite lost. This book takes a different tactic and focuses on configuring and recognizing MPLS basics, so those larger MPLS complexities seem less daunting. Day One: MPLS for Enterprise Engineers is for engineers with at least a JNCIA-level of Junos, in addition to some IGP experience (BGP experience helps but is not essential). With this experience in hand, the reader should be able to build a few simple topologies in a lab and follow along with the book’s tutorial chaters. Learning MPLS is key for enterprise engineers who are moving to, or working in Service Provider networks, and this Day One will allow you to understand what all those other MPLS books are saying. Start Here. “A superb book for getting straight into the heart of the subject matt
  • Network Analysis Using Wireshark Cookbook

    Yoram Orzach

    Netwerk Network analysis using Wireshark Cookbook contains more than 100 practical recipes for analyzing your network and troubleshooting problems in the network. This book provides you with simple and practical recipes on how to solve networking problems with a step-by-step approach.This book is aimed at research and development professionals, engineering and technical support, and IT and communications managers who are using Wireshark for network analysis and troubleshooting. This book requires a basic understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations.
  • Virtualization For Dummies

    Bernard Golden

    Netwerk Virtualization has become a “megatrend”—and for good reason. Implementing virtualization allows for more efficient utilization of network server capacity, simpler storage administration, reduced energy costs, and better use of corporate capital. In other words: virtualization helps you save money, energy, and space. Not bad, huh? If you’re thinking about “going virtual” but have the feeling everyone else in the world understands exactly what that means while you’re still virtually in the dark, take heart. Virtualization for Dummies gives you a thorough introduction to this hot topic and helps you evaluate if making the switch to a virtual environment is right for you. This fun and friendly guide starts with a detailed overview of exactly what virtualization is and exactly how it works, and then takes you on a tour of the benefits of a virtualized environment, such as added space in overcrowded data centers, lower operations costs through more efficient infrastructure adm
  • IT Infrastructure Architecture - Infrastructure Building Blocks and Concepts 4th Edition

    Sjaak Laan

    Netwerk IT infrastructure has been the foundation for successful application deployments for many decades. However, general and up-to-date infrastructure knowledge is not widespread. Experience shows that software developers, system administrators, and project managers often have little understanding of the major impact that IT infrastructure has on the performance, availability, and security of software applications. This book explains the concepts, history, and implementation of IT infrastructure. Although there are many books on each of the infrastructure building blocks, this is the first book to describe them all: datacenters, servers, networks, storage, operating systems, and end-user devices. The building blocks described in this book provide functionality, but they also provide the non-functional attributes of performance, availability, and security. These attributes are discussed at a conceptual level in separate chapters and in more detail in the chapters on each building block. Whe
  • Hands on Hacking

    Matthew Hickey & Jennifer Arcuri

    Netwerk A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker’s perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you’ll look for flaws and their known exploits—including tools developed by real-world government financed state-actors. An introduction to the same hacking techniques that malicious hackers will use against an organization Written by infosec ex
  • Juniper Junos Step by step CLI Guide

    Be Sure Academy

    Netwerk In this ebook, you will be introduced to Juniper’s basic network security design concepts. You will learn about the Junos operating system (Junos OS) along with EX, SRX, MX devices. The book will explain the concepts of 1. Initial Configuration 2. CLI Shortcut Keys 3. Operational Mode Overview 4. Operational Mode Commands 5. Configuration Mode Overview 6. Configuration Mode 7. Device Access Configuration 8. Users Configuration 9. System Services Configuration 10. Interface Configuration 11. Management IP Address Configurations 12. Static Routing Configuration 13. VLAN Configuration 14. Port Security Configuration 15. Configuration Management Commands 16. Shutdown and Reboot Device 17. Logs Collection and Management 18. Install and reset Junos release 19. Troubleshooting Commands 20. Finding recommended /Suggested Releases 21.Juniper Customer Support 22.Juniper RMA Process This book will start from ground zero and teach you how to access the Command Line Interface (CLI) of Juniper's
  • How to Hack Like a Ghost

    Sparc Flow

    Netwerk How to Hack Like a Ghost takes you deep inside the mind of a hacker as you carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way. Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment. Sparc Flow invites you to shadow him every step of the way, from recon to infiltration, as you hack a shady, data-driven political consulting firm. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced cybersecurity defense systems. You’ll experience all the thrills, frustrations, dead-ends, and eureka moments of his mission first-hand, while picking up practical, cutting-edge techniques for penetrating cloud technologies. There are no do-overs for hackers, so your training starts with basic OpSec procedures, using an ephemeral OS, Tor, bouncing servers, and detailed code to build an anonymous, replaceable hacking infrastructure
  • Docker

    Andy Hayes

    Netwerk Welcome to "Docker: A Quick Introduction To Using Docker Containers Today." This is the best guide for people who want to use Docker as well as implement container-based virtualization. You should not shy away from Docker containers because you lack the knowledge to implement them. All you have to do is completely engage this book. We have divided the book into chapters to make it easier for you to go through. The different topics covered are: Playing with Busybox Docker Run Terminology Webapps with Docker Static Sites Docker Images Our First Image Dockerfile Docker on AWS & much more
  • Hacking: The Art of Exploitation, 2nd Edition

    Jon Erickson

    Netwerk Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections,
  • Programming Massively Parallel Processors

    David B. Kirk & Wen-mei W. Hwu

    Netwerk Programming Massively Parallel Processors: A Hands-on Approach, Third Edition shows both student and professional alike the basic concepts of parallel programming and GPU architecture, exploring, in detail, various techniques for constructing parallel programs. Case studies demonstrate the development process, detailing computational thinking and ending with effective and efficient parallel programs. Topics of performance, floating-point format, parallel patterns, and dynamic parallelism are covered in-depth. For this new edition, the authors have updated their coverage of CUDA, including coverage of newer libraries, such as CuDNN, moved content that has become less important to appendices, added two new chapters on parallel patterns, and updated case studies to reflect current industry practices. - Teaches computational thinking and problem-solving techniques that facilitate high-performance parallel computing - Utilizes CUDA version 7.5, NVIDIA's software development tool create
  • Penetration Testing with BackBox

    Stefan Umit Uygur

    Netwerk This practical book outlines the steps needed to perform penetration testing using BackBox. It explains common penetration testing scenarios and gives practical explanations applicable to a real-world setting. This book is written primarily for security experts and system administrators who have an intermediate Linux capability. However, because of the simplicity and user-friendly design, it is also suitable for beginners looking to understand the principle steps of penetration testing.
  • InfoPath with SharePoint 2013 How-To

    Steven Mann

    Netwerk Need fast, reliable, easy-to-use solutions for using InfoPath® with SharePoint® 2013? This book delivers exactly what you’re looking for: step-by-step help and guidance with the tasks you’ll perform most often. You’ll learn better ways to design and develop intuitive, effective form-based solutions, and then efficiently administer, secure, and troubleshoot them. The industry’s most focused resource for solving business problems with SharePoint and InfoPath forms, this book provides all the answers you need—now! Steven Mann is an Enterprise Applications Engineer for Morgan Lewis and has nearly 20 years of professional experience with collaboration and business intelligence, including a decade working with SharePoint. Formerly Principal Architect for RDA Corporation, his books include InfoPath with SharePoint 2010 How-To, Microsoft SharePoint 2010 Business Intelligence Unleashed, SharePoint 2010 Field Guide, and SharePoint 2010 Managed Metadata Unleashed. Fast, Accurate, and
  • Instant Wireshark Starter

    Abhinav Singh

    Netwerk Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Written as a practical guide, Wireshark Starter will show you all you need to know to effectively capture and analyze network traffic. This book is specially designed for new learners who are willing to dive deeper into network analysis using Wireshark. It requires a basic understanding of network protocols and their implementation and is equally handy for network administrators, forensic experts, and network penetration testers.
  • Day One: Junos QoS for IOS Engineers

    Venkatesh Krishnan

    Netwerk When it’s time to swap out your Cisco routers with new Juniper Networks devices, use this book to optimize the QoS functionality of your new network. QoS has become an integral part of network design given the volume of video and voice traffic over IP. While fundamentally both IOS and Junos support QoS across their plat- forms, there are still some differences in how the OSes are implemented and how they are understood. Day One: Junos QoS for IOS Engineers addresses the needs of the IOS-trained engineer by providing side-by-side comparisons of QoS configurations and techniques in both IOS and Junos. In a few quick steps you can compare what you did yesterday with IOS to what you can do with Junos. Along the way are insights, tips, and no-nonsense explana- tions of what is taking place. If you are an engineer who is already familiar with IOS QoS, get ready to see the ‘Junos way’ in action, whether it’s simply using a different syntax or a whole hierarachy. “This Day One book
  • Violent Python

    TJ O'Connor

    Computers en internet Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. - Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. - Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices. - Data-mine popular social media websites and evade modern
  • Mastering System Center 2012 Configuration Manager

    Steve Rachui, Kent Agerlund, Santos Martinez & Peter Daalmans

    Netwerk Expert coverage of Microsoft's highly anticipated network software deployment tool The latest version of System Center Configuration Manager (SCCM) is a dramatic update of its predecessor Configuration Manager 2007, and this book offers intermediate-to-advanced coverage of how the new SCCM boasts a simplified hierarchy, role-based security, a new console, flexible application deployment, and mobile management. You'll explore planning and installation, migrating from SCCM 2007, deploying software and operating systems, security, monitoring and troubleshooting, and automating and customizing SCCM 2012 with scripts. Features an unparalleled team of authors, two of whom are insiders at Microsoft and have worked with SCCM since nearly its inception Provides in-depth coverage and offers a hands-on approach to learning all there is to know about SCCM Explores why SCCM 2012 is the most significant update in its 16-year history Packed with real-world scenarios to show you how to use SCCM in va
  • This Week: Deploying MBGP Multicast VPNs

    Antonio Sanchez Monge

    Netwerk The networking industry has been looking for the best way to offer Multicast VPN services while leveraging the strength and scalability of the existing unicast L3VPN technology. The result of several years of effort is Multi-Protocol BGP Multicast VPN, often referred to as MBGP MVPN. This next generation technology has received a warm welcome in the market and is already deployed in many production networks, from Tier-1 service providers to financial and trading companies. This Week: Deploying MBGP Multicast VPNs assumes the reader has at least some experi- ence with IP/MPLS architectures, including Multi-Protocol BGP and IGPs. You are not ex- pected to be an expert in multicast as the basic concepts are revisited in the book, but if you are already familiar with BGP/MPLS L3 VPNs, you will find this book easier to read. Whatever you bring to this seminar in a book will only be amplified by its clear explanations, explicit examples, and attention to detail. The author walks you step-by
  • IT Disaster Recovery Planning For Dummies

    Peter H. Gregory & Philip Jan Rothstein

    Netwerk If you have a business or a nonprofit organization, or if you’re the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it’s easy to put it off. After all, where do you start? IT Disaster Recovery Planning For Dummies shows you how to get started by creating a safety net while you work out the details of your major plan. The right plan will get your business back on track quickly, whether you're hit by a tornado or a disgruntled employee with super hacking powers. Here's how to assess the situation, develop both short-term and long-term plans, and keep your plans updated. This easy-to-understand guide will help you Prepare your systems, processes, and people for an organized response to disaster when it strikes Identify critical IT systems and develop a long-range strategy Select and train your disaster recovery team Conduct a Business Impact Analysis Determine risks to your business from natural or human-mad
  • The Kubernetes Book

    Nigel Poulton

    Netwerk 2024 edition. Fully updated for Kubernetes v1.29. Brand new chapter covering WebAssembly on Kubernetes. The Kubernetes Book, by Nigel Poulton, renowned author and video trainer, is up to date with the latest trends in Kubernetes and the rapidly evolving cloud-native ecosystem. Containers transformed how we package and deploy applications, but they came with inherent challenges. Kubernetes is a platform for deploying and managing containerised applications at scale. It also abstracts underlying infrastructure, making it easier to deploy and manage applications across heterogenous clouds and on-premises environments. The Kubernetes Book offers a beginner-friendly approach to mastering Kubernetes architecture and core concepts such as Pods, Deployments, Services, StatefulSets, Ingress, ConfigMaps, and more. It also demystifies the Kubernetes API, teaches you how to secure Kubernetes, and brings you up to speed with important cloud-native concepts such as microservices, declarative config
  • The Official 2 CCSP CBK Reference

    Aaron Kraus

    Netwerk The only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated . Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the cloud. This highly sought-after global credential has been updated with revised objectives. The new third edition of The Official (ISC)2 Guide to the CCSP CBK is the authoritative, vendor-neutral common body of knowledge for cloud security professionals. This comprehensive resource provides cloud security professionals with an indispensable working reference to each of the six CCSP domains: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform and Infrastructure Security; Cloud Application Security; Cloud Security Operations; and Legal, Risk and Compliance. Detailed, in-depth chapters contain the accurate information required to prepare for and achieve CCSP certific
  • Bug Bounty Bootcamp

    Vickie Li

    Netwerk Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You’ll also learn how to navigate bug bounty programs set up by companies to reward security professionals for finding bugs in their web applications. Bug bounty programs are company-sponsored programs that invite researchers to search for vulnerabilities on their applications and reward them for their findings. This book is designed to help beginners with little to no security experience learn web hacking, find bugs, and stay competitive in this booming and lucrative industry.    You’ll start by learning how to choose a program, write quality bug reports, and maintain professional relationships in the industry. Then you’ll learn how to set up a web hacking lab and use a proxy to capture traffic. In Part 3 of the book, you’ll explore the mechanisms of common web vulnerabilities, like XSS, SQL
  • The Pentester BluePrint

    Phillip L. Wylie & Kim Crawley

    Netwerk JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester  offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals,&#x
  • Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems

    Benjamin Walker

    Netwerk Keeping this high-demand information from yourself will be detrimental to your technologically-clueless future self... Do computers and technology, in general, feel alien-like to you, as if it's something way past your time? The advancements made in technology have taken over how our society functions, and so there's no other way to deal with your shortcomings than to handle it head-on. According to TechCo , technology has influenced nearly every aspect of our daily lives , resulting in: Improved communicationImproved forms of home entertainmentImproved housing and lifestyle standardsAn altered healthy industryMore convenient tools for education          And last, but certainly not least:  Easier travel, both short and long distances It's incredible to think there are people who have made all these things possible, yet, don't you want to know more about what's happening on the inside of it all? In a nutshell, it's a form of communication th
  • SNMP Mastery

    Michael W. Lucas

    Netwerk SNMP Simple Network Management Protocol Four lies in one acronym? It’s baroque. It’s arcane. And it’s everywhere. SNMP is one of those system management skills that people acquire by experience, stumbling through one horrid implementation after another and counting their knowledge by their scars. SNMP Mastery is your guide to the secret landscape of one of computing’s most mysterious tools. You will understand: What makes SNMP simple When to use SNMP, and when not to How to use SNMP securely Objects, MIBs, and OIDs using the net-snmp management toolkit SNMPv3 efficient queries debugging proxies, SMUX, and AgentX View-based Access Control Model (VACM) extending the net-snmp agent logging, traps, and notifications Stop stumbling through the SNMP minefield. Read SNMP Mastery today!
  • Day One: Juniper Ambassadors’ Cookbook for 2019

    Nupur Kanoi, Chris Parker, Christian Scholz, Dan Hearty, Michel Tepper, Said van de Klundert, Paul Clarke, Martin Brown, Peter Klimai, Tom Dwyer, Pierre-Yves Maunier, Yasmin Lara, Stefan Fouant, Steve Puluka & Nick Ryce

    Netwerk How-to solutions and network recipes by the community dedicated to up and running Juniper reliability.  The Juniper Ambassador program recognizes and supports its top community members and the generous contributions they make through sharing their knowledge, passion, and expertise on J-Net, Facebook, Twitter, LinkedIn, and other social networks.  “This is another great addition to the bulging Juniper Day One library. The Juniper Ambassadors have created recipes for a considerable number of hot-button issues facing engineers and architects today. The recipes explain and guide you through the setup of the solutions and help simplify and speed up the time to operations. There’s a great mix of traditional CLI-based implementation as well the new world of automation and network reliability engineering. I’ll certainly be using this book for some of my forthcoming data center and multicloud projects.”- Bhupen Mistry, Director & Principal Consultant, Operativity Ltd. IT
  • Explain the Cloud Like I’m 10

    Todd Hoff

    Netwerk This is a completely updated and expanded version. What is the cloud? Discover the secrets of the cloud through simple explanations that use lots of pictures and lots of examples. Why learn about the cloud? It’s the future. The cloud is the future of software, the future of computing, and the future of business. If you’re not up on the cloud, the future will move on without you. Don’t miss out. Not a techie? Don’t worry. I wrote this book for you! After reading Explain Cloud Like I'm 10, you will understand the cloud. You will understand how the cloud works. You will understand all the major technologies that make up the cloud. When you hear someone say some new cool thing is in the cloud, you’ll understand exactly what they mean. You will feel the cloud deep in your bones. That’s a promise. How do I deliver on that promise? I’ll tell you a little secret: the cloud is not that hard to understand. It’s just that nobody has taken the time to explain it properly. I take t
  • Day One: SRX Series Up and Running with Advanced Security Services

    Alexandre Cezar

    Netwerk Set up the SRX Series as a next-generation firewall and take advantage of its advanced security features, including machine-learning malware prevention capabilities.  From a security perspective, the SRX Series goes beyond traditional stateful firewalls, providing Unified Threat Management (UTM), Advanced Anti-Malware detection and blocking (Sky ATP), reputation blocking (Security Intelligence), and a complete set of next-generation firewall services (NGFW): Application Firewall, Application QOS, Application Routing, SSL Proxy Inspection, and Intrusion Prevention System (IPS). But there isn’t an all-in-one document that explains how you can easily configure all this. Until now. Day One: SRX Series Up and Running with Advanced Security Services walks you through the SRX Series setup using advanced security measures to protect and defend your network. Learn how to spend more time analyzing security traffic than fixing common configuration issues with your new SRX Series – chapt
  • This Week: Data Center Deployment with EVPN/VXLAN

    Deepti Chandra

    Netwerk Deepen your understanding of all the implementation aspects of using EVPN/VXLAN for data center deployments. This Week: Data Center Deployment with EVPN/VXLAN provides readers with a structured understanding of EVPN/VXLAN technology concepts and how they are implemented. The book includes detailed configuration examples, verification commands, and packet captures to demonstrate different traffic flows within a data center as well as for Data Center Interconnect (DCI). This Week: Data Center Deployment with EVPN/VXLAN contains five full-length case studies complete with illustrations, configurations, and field-tested insights from a senior data center architect.  When you’re done with this book, you’ll be able to: • Understand the fundamentals and implementation aspects of using EVPN-VXLAN for data center deployments. • Design next generation data center architectures. • Show detailed configuration examples, verification commands, and packet walkthrough examples. Publica
  • The Practice of Network Security Monitoring

    Richard Bejtlich

    Netwerk Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. In The Practice of Network Security Monitoring , Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. You'll learn how to: –Determine where to deploy NSM platforms, and size them for the monitored networks –Deploy stand-alone or distributed NSM installations –Use command line and graphical packet analysis tools, and NSM consoles –Interpret network evidence from server-side and client-side intrusions –Integrate threat i
  • QNAP NAS Setup Guide for Home and Small Business

    Nicholas Rushton

    Netwerk With superb functionality and ease of use through the acclaimed QTS operating system, QNAP is a popular choice when buying Network Attached Storage. Whether it is the storage and sharing of information, the streaming of photos, music and video to computers and smart devices, or the ability to have a private cloud that allows access to information from anywhere, a QNAP NAS can do it all with aplomb. But this power and flexibility comes at a price: setting up a QNAP NAS for the very first time can seem a daunting prospect for someone who has not done so before. This guide, based around the latest version of QTS and covering Windows PCs, Macs, Chromebooks and portable devices, with easy-to-follow instructions and nearly 300 illustrations, will take you through it from start to finish and help ensure that your home or small business network is a success. It is written according to the Goldilocks Principle: not too little information, not too much information, but just the right amount.
  • Day One: Juniper Ambassadors’ Cookbook 2017

    Nick Ryce

    Netwerk The Juniper Ambassadors take on today’s top networking issues in this cookbook full of high performance recipes that will save you time, money, and late night cutovers that can go awry.   The Juniper Ambassador program recognizes and supports its top community members and the generous contributions they make through sharing their knowledge, passion, and expertise on J-Net, Facebook, Twitter, and other social networks. In their new Day One cookbook, the Juniper Ambassadors take on some of the top support issues and provide clear-cut solutions and frank discussions on how to keep things running. The recipes in this cookbook are meant to provide quick and tested solutions to everyday networking administration issues. “Day One: Juniper Ambassadors Cookbook 2017 covers several complex networking problems and solutions, working with technologies such as EVPN, VXLAN, OSPF sham links, centralized route reflectors, scripted automation with Python, segment routing, and BGP flow spec. U
  • Building a Home Security System with Arduino

    Jorge R. Castro

    Netwerk Design, build and maintain a home security system with Arduino Uno About This Book • Learn what a security system is, how it works and create one for yourself • Develop a security system by setting up security cameras and motion detector systems • Manage and analyze all the data collected by the sensors from the security system, using a graphical application Who This Book Is For This book is for novice programmers and hobbyists who want to understand how Arduino can be used to program a home security system as well as to those who want to delve deeper into the world of Arduino. What You Will Learn • Run cables and electricity to support home security infrastructure • Connect Arduino to your programming environment • Learn to interact with output devices – alarms, locks, shutters • Understand different parts of electronics circuit (MOSFET, resistor, capacitor) • Integrate home monitoring and security notifications with monitoring systems • Use logical level shifter
  • Mastering OpenVPN

    Eric Crist & Jan Just Keijser

    Netwerk If you are familiar with TCP/IP networking and general system administration, then this book is ideal for you. Some knowledge and understanding of core elements and applications related to Virtual Private Networking is assumed.
  • WiFi User Guide

    Gel Gepsy

    Netwerk How to get the best Wi-Fi connectivity and security with the least amount of money and time.  Securing your privacy is at the center of this guide.  Wi-Fi is a two-way communication networking technology using 2.4 and 5 GHz radio bands. Without any precaution, anyone nearby can tune into. The best ways to get good Wi-Fi security and connectivity are simple and inexpensive turn-key solutions and even low-cost 'Do-It-Yourself' alternatives.
  • An Executive Guide to Identity Access Management - 2nd Edition

    Alasdair Gilchrist

    Netwerk In this high-level executive guide to Identity and Access Management, we discuss the good the bad and the ugly aspects. We consider why you need IAM, how it helps with security, compliance, governance and importantly how it can save you a fortune in time, effort and money on compliance auditing. However, it's not all good news, so we will discuss the problems you will face, the reasons for the high failure rates in deployment and the best practices you can follow to mitigate the risks of failure. Nonetheless, in this second edition, we contemplate how deploying IAM will reap benefits in the enterprise and discuss strategy and best practices for deployment in the cloud, commerce, IoT, and hybrid enterprise scenarios. We will also contemplate IDaaS and other next-generation approaches to IAM such as Identity Relationship Management (IRM).
  • Hacking Exposed Wireless, Third Edition

    Joshua Wright & Johnny Cache

    Netwerk Exploit and defend against the latest wireless network attacks Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you’ll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave. Assemble a wireless attack toolkit and master the hacker’s weapons Effectively scan and enumerate WiFi networks and client devices Leverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suite Develop and launch client-side attacks us
  • Wireshark Essentials

    James H. Baxter

    Netwerk This book is aimed at IT professionals who want to develop or enhance their packet analysis skills. Basic familiarity with common network and application services terms and technologies is assumed; however, expertise in advanced networking topics or protocols is not required. Readers in any IT field can develop the analysis skills specifically needed to complement and support their respective areas of responsibility and interest.
  • Exam Ref 70-486

    William Penberthy

    Netwerk Prepare for Microsoft Exam 70-486—and help demonstrate your real-world mastery of developing ASP.NET MVC-based solutions. Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Specialist level. Focus on the expertise measured by these objectives: Design the application architectureDesign the user experienceDevelop the user experienceTroubleshoot and debug web applicationsDesign and implement security This Microsoft Exam Ref: Organizes its coverage by exam objectives.Features strategic, what-if scenarios to challenge you.
  • Instant OpenNMS Starter

    Ghislain Hachey

    Netwerk Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A starters' guide to learning OpenNMS with ease, with a focus on immediate results.Instant OpenNMS Starter is for network administrators of any level with a slight focus on the novice that would enjoy a swift glance at what OpenNMS has to offer. It assumes the reader will have knowledge of basic network operations and protocols such as the Internet Protocol Suite.
  • Official 2 Guide to the CISSP CBK

    Hal Tipton

    Computers en internet The world of investigations, law and regulations continues to shape the minimum security requirements for many organizations. Today's information security professional must not only understand the technology of the environment but the regulatory, political and legal aspects of well. Additionally given the nature of crime and the increasing use of technology to facilitate crime it is extremely likely the information security professional will be called upon to assist in an investigation.
  • IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6

    Rick Graziani

    Netwerk To support future business continuity, growth, and innovation, organizations must transition to IPv6, the next generation protocol for defining how computers communicate over networks. IPv6 Fundamentals provides a thorough yet easy-to-understand introduction to the new knowledge and skills network professionals and students need to deploy and manage IPv6 networks. Leading networking instructor Rick Graziani explains all the basics simply and clearly, one step at a time, providing all the details you’ll need to succeed. Building on this introductory coverage, he then introduces more powerful techniques that involve multiple protocols and processes and provides hands-on resources you can rely on for years to come. You’ll begin by learning why IPv6 is necessary, how it was created, and how it works. Next, Graziani thoroughly introduces IPv6 addressing, configuration options, and routing protocols, including RIPng, EIGRP for IPv6, and OSPFv3. You’ll learn how to integrate IPv6 with
  • Internet Communications Using SIP

    Henry Sinnreich & Alan B. Johnston

    Netwerk "This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place." --Henning Schulzrinne, Professor, Columbia University Since its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust technology, SIP today is fully capable of supporting the communication systems that power our twenty-first century work and life. This second edition handbook has been revamped to cover the newest standards, services, and products. You'll find the latest on SIP usage beyond VoIP, including Presence, instant messaging (IM), mobility, and emergency services, as well as peer-to-peer SIP applications, quality-of-service, and security issues--everything you need to build and deploy today's SIP services. This book will help you * Work with SIP in Presence and event-based communications * Handle SIP-based application-level mobility issues * Develop applications to facilitate communica
  • Hacking Exposed 7

    Stuart McClure, Joel Scambray & George Kurtz

    Netwerk The latest tactics for thwarting digital attacks “Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment “Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure h
  • Information Storage and Management

    EMC Education Services

    Netwerk The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the "Cloud" as well as updates and vital information on new technologies. Features a separate section on emerging area of cloud computing Covers new technologies such as: data de-duplication, unified storage, continuous data protection technology, virtual provisioning, FCoE, flash drives, storage tiering, big data, and more Details storage models such as Network Attached Storage (NAS), Storage Area Network (SAN), Object Based Storage along with virtualization at various infrastructure components Explores Business Continuity and
  • Tcl 8.5 Network Programming

    Wojciech Kocjan & Piotr Beltowski

    Netwerk The book is written so that both experienced and novice Tclers can find useful information inside. It starts with quick introduction to Tcl and its networking support for those who are less familiar with them. Authors focus on showing practical, yet simple examples for each module and command described so that reader understands how to use them when solving the real life problems. The examples given are useful programs that try to solve real-world needs. All sample programs are clear and concise yet nothing essential is left out and the programming style focuses on readability rather than on stylistic rigor or efficiency. This book is for Tcl developers with basic network programming concepts, who want to add networking capabilities to their applications. Working knowledge of Tcl and basic experience of network protocols will be useful. The reader should be familiar with basic concepts used in modern networking – keywords like TCP, HTTP or XML should not be a mystery. The book does
  • OpenVPN 2 Cookbook

    Jan Just Keijser

    Netwerk This is a cookbook, with practical recipes providing tips and tricks to the most common problems and scenarios faced with OpenVPN. This book is ideal for system administrators and networking professionals who are interested in building secure VPNs using OpenVPN. It is preferable that the reader has a basic knowledge of OpenVPN, as well as general network administration skills.
  • JUNOS OS For Dummies

    Walter J. Goralski, Cathy Gadecki & Michael Bushong

    Netwerk Learn to use JUNOS to make your network reliable! Providing network administrators with a reliable network operating system, JUNOS software is an award-winning network operating system that focuses on security and the avoidance of down time. This easy-to-understand book starts with the basics of JUNOS and walks you through its features so that you can quickly learn how to set up, operate, and add key services. Since the various JUNOS features are constantly being updated to provide your network with the best security possible, this new edition shares must-know information, helpful advice, handy tips, and essential cautions for working with JUNOS. Plus, you'll find out how to set up a routing protocol that automates configuration of routing tables for greater efficiency and how you can set up individual or group user accounts locally on the route, or on remote centralized authentication servers. Starts with the basics and introduces you to JUNOS Explains how to connect, manage, and tro
  • Microsoft Windows Server Administration Essentials

    Tom Carpenter

    Netwerk The core concepts and technologies you need to administer a Windows Server OS Administering a Windows operating system (OS) can be a difficult topic to grasp, particularly if you are new to the field of IT. This full-color resource serves as an approachable introduction to understanding how to install a server, the various roles of a server, and how server performance and maintenance impacts a network. With a special focus placed on the new Microsoft Technology Associate (MTA) certificate, the straightforward, easy-to-understand tone is ideal for anyone new to computer administration looking to enter the IT field. Each chapter offers a clear and concise look at the core Windows administration concepts you need to know to gain an understanding of these difficult topics. Offers a clear, no-nonsense approach to administering a Windows operating system and presents it in such a way that IT beginners will confidently comprehend the subject matter Targets the MTA 98-365 exam by covering Win
  • Wikis For Dummies

    Dan Woods & Peter Thoeny

    Netwerk Corporations have finally realized the value of collaboration tools for knowledge sharing and Wiki is the open source technology for creating collaborative Web sites, as either a public site on the Internet or on a private intranet site Shows readers how to set up Wikis in a corporate setting or on a personal site so that users can retrieve information, post information, and edit the content Covers everything from choosing a Wiki engine to administration and maintenance Discusses the advantages of using Wiki in a corporate environment, which companies such as Microsoft, Boeing, Disney, and Motorola have already discovered
  • IT Governance

    Alan Calder

    Netwerk This book provides expert information security management and governance guidance based on ISO 27001:2022 and ISO 27002:2022.
  • TCP/IP

    Rob Botwright

    Netwerk Unleash Your Networking Potential with the TCP/IP Network+ Protocols and Campus LAN Switching Fundamentals Bundle! Are you ready to master the art of networking? Whether you're a beginner looking to kickstart your networking journey or an experienced professional aiming to refine your skills, the TCP/IP Network+ Protocols and Campus LAN Switching Fundamentals bundle is your ultimate resource. 📚 Book 1: TCP/IP Essentials: A Beginner's Guide Are you new to the world of networking? Fear not! Our Beginner's Guide simplifies complex TCP/IP concepts and IP addressing, laying a strong foundation for your networking expertise. 📚 Book 2: Network+ Protocols: Intermediate Insights Ready to take your skills up a notch? Dive deeper into networking protocols, subnetting techniques, and routing concepts with Intermediate Insights, equipping you for the next level of networking challenges. 📚 Book 3: Advanced TCP/IP and Campus LAN Switching Explore advanced topics such as routing protocols, V
  • NMAP Network Scanning Series

    Rob Botwright

    Netwerk Unlock the Power of Network Security with the NMAP Network Scanning Series! Welcome to the Network Security, Monitoring, and Scanning Library, a comprehensive bundle that will empower you with the knowledge and skills needed to navigate the intricate world of network security and reconnaissance. In today's digital age, safeguarding your networks and data has never been more critical, and this book bundle is your ultimate guide to network security excellence. Book 1: NMAP for Beginners - A Practical Guide to Network Scanning Are you new to network scanning? This book is your perfect starting point. Dive into foundational concepts and follow easy-to-understand instructions to kickstart your journey toward mastering network scanning. Book 2: NMAP Mastery - Advanced Techniques and Strategies for Network Analysis Ready to take your skills to the next level? Explore advanced techniques, NMAP scripting, customized scanning, and perform in-depth network assessments. Become a true NMAP expert.
  • AZ-104

    Rob Botwright

    Netwerk Introducing the "AZ-104: Azure Administrator Mastery" Book Bundle! Unlock the full potential of Microsoft Azure with this comprehensive book bundle. Whether you're a beginner or an experienced administrator, this bundle has something for everyone. Dive into Azure fundamentals, master identity and resource management, explore advanced networking and storage techniques, and ascend to pro-level automation and optimization. Book 1 - Azure Essentials: A Beginner's Guide to Navigating AZ-104 Are you new to Azure or looking to refine your basics? This book is your trusted companion. Learn to navigate the Azure portal, create and manage resources, and grasp core concepts. Start your Azure journey with confidence! Book 2 - Mastering Identity & Resource Management in Azure: A Comprehensive Guide to AZ-104 Identity and resource governance are pivotal in Azure. Master access control, implement robust identity solutions, and enforce compliance through resource management. Become a steward of s
  • The Composable Enterprise: Agile, Flexible, Innovative

    August-Wilhelm Scheer

    Netwerk The benefits of digitalisation do not lie in the use of new technologies for existing processes, but in organisational changes and new business models. The book highlights the composable enterprise as the guiding principle for successful digital transformation and associated cost reductions and revenue increases. What does it mean? A composable enterprise is organised in a decentralised process-oriented way. This allows the enterprise to react quickly to new situations, develop or change processes and business models. The information systems are based on platform architectures. A paradigm shift to monolithic applications. Sector concepts for industry, consulting and universities show how organisation and application architectures interlock in the composable enterprise. The reader receives inspiration, a foundation and a compass for the digital transformation of a company to the composable enterprise. The Author Prof. Dr. Dr.h.c. mult. August- Wilhelm Scheer is one of the most influent
  • The CompTIA Network+ & Security+ Certification

    Comptia Ace5

    Netwerk Unlock Your IT Potential: The Definitive CompTIA Certification Study Guide & Test Prep, Master Your IT Journey: The Ultimate 2-in-1 Network+ and Security+ CompTIA Certification Guide In a digital age that demands expertise in both networking and security, why settle for a guide that offers only half the equation? Backed by two decades of copywriting for the IT sector, I present a resource that understands the modern IT professional's needs. This dual guide is meticulously constructed to navigate both the realms of the Network+ and Security+ CompTIA certifications, ensuring you're armed with knowledge that's both broad and deep. Double the Expertise in a Single Guide: Dual Depth: Dive deep into both networking and security realms, ensuring a holistic IT skillset ready for today's challenges.Efficient Learning: Seamlessly interwoven topics provide you with a logical progression through both certifications, eliminating the disjointedness of studying from separate resources.Battle-Tes
  • Cloud Data Architectures Demystified: Gain the expertise to build Cloud data solutions as per the organization's needs

    Ashok Boddeda

    Netwerk Learn using Cloud data technologies for improving data analytics and decision-making capabilities for your organization KEY FEATURES  ● Get familiar with the fundamentals of data architecture and Cloud computing. ● Design and deploy enterprise data architectures on the Cloud. ● Learn how to leverage AI/ML to gain insights from data. DESCRIPTION  Cloud data architectures are a valuable tool for organizations that want to use data to make better decisions. By understanding the different components of Cloud data architectures and the benefits they offer, organizations can select the right architecture for their needs. This book is a holistic guide for using Cloud data technologies to ingest, transform, and analyze data. It covers the entire data lifecycle, from collecting data to transforming it into actionable insights. The readers will get a comprehensive overview of Cloud data technologies and AI/ML algorithms. The readers will learn how to use these technologies and a
  • Cybersecurity First Principles: A Reboot of Strategy and Tactics

    Rick Howard

    Netwerk The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles , Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles. The author convincingly lays out the arguments for the absolute cybersecurity first principle and then discusses the strategies and tactics required to achieve it. In the book, you'll explore: Infosec history from the 1960s until the early 2020s and why it has largely failed What the infosec community should be trying to achieve instead The arguments for the absolute and atomic cybersecurity first principle The strategies and tactics to adopt that will have the greatest impact in pursuing the ultimate first principle Case studies through a first principle lens of the 2015 OPM hack, the 2016 DNC Hack, the 2019 Colonial Pipel
  • Threats

    Adam Shostack

    Netwerk Secure your applications with help from your favorite Jedi masters In Threats: What Every Engineer Should Learn From Star Wars , accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a structured and memorable way—about the threats to your systems. You’ll move from thinking of security issues as clever one-offs and learn to see the patterns they follow. This book brings to light the burning questions software developers should be asking about securing systems, and answers them in a fun and entertaining way, incorporating cybersecurity lessons from the much-loved Star Wars series. You don’t need to be fluent in over 6 million forms of exploitation to face these threats with the steely calm of a Jedi master. You’ll also find: Understandable and memorable introductions to the most important threats that ever
  • AWS Certified Solutions Architect Study Guide with 900 Practice Test Questions

    Ben Piper & David Clinton

    Netwerk Master Amazon Web Services solution delivery and efficiently prepare for the AWS Certified SAA-C03 Exam with this all-in-one study guide The AWS Certified Solutions Architect Study Guide: Associate (SAA-C03) Exam, 4th Edition comprehensively and effectively prepares you for the challenging SAA-C03 Exam. This Study Guide contains efficient and accurate study tools that will help you succeed on the exam. It offers access to the Sybex online learning environment and test bank, containing hundreds of test questions, bonus practice exams, a glossary of key terms, and electronic flashcards. This one year free access is supported by Wiley's support agents who are available 24x7 via email or live chat to assist with access and login questions. In this complete and authoritative exam prep blueprint, Ben Piper and David Clinton show you how to: Design resilient AWS architectures Create high-performing solutions Craft secure applications and architectures Design inexpensive and cost-optimized ar
  • Computer Networking: A Top-Down Approach, Global Edition

    James Kurose & Keith Ross

    Netwerk This print textbook is available for students to rent for their classes. The Pearson print rental program provides students with affordable access to learning materials, so they come to class ready to succeed. A top-down, layered approach to computer networking. Unique among computer networking texts, the 8th Edition of the popular Computer Networking: A Top Down Approach builds on the authors’ long tradition of teaching this complex subject through a layered approach in a “top-down manner.” The text works its way from the application layer down toward the physical layer, motivating students by exposing them to important concepts early in their study of networking. Focusing on the Internet and the fundamentally important issues of networking, this text provides an excellent foundation for students in computer science and electrical engineering, without requiring extensive knowledge of programming or mathematics. The 8th Edition has been updated to reflect the most important and
  • Hacking For Dummies

    Kevin Beaver

    Netwerk Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more. You’ll find out how to: Stay on top of the latest security weaknesses that could affect your business’s security setup Use freely available testing tools to “penetration tes
  • Learn IoT Programming Using Node-RED: Begin to Code Full Stack IoT Apps and Edge Devices with Raspberry Pi, NodeJS, and Grafana

    Bernardo Ronquillo Japón

    Netwerk Program edge devices by learning low-code programming and essentials of IoT systems. KEY FEATURES   ● In-depth practical demonstration of the IoT architecture with numerous examples. ● Includes graphical illustrations and uses of popular full-stack tools. ● Access to hardware components and software packages to build powerful IoT systems. DESCRIPTION  Learn IoT Programming with Node-RED is an excellent source of practical knowledge for developing a successful Internet of Things system, starting with the very first step of programming a Raspberry Pi, and using numerous open-source software development tools. To begin, the book will provide you with a practical experience of visual programming, fundamentals of Node-RED, and the architecture of an Internet of Things system. The book covers data collecting capabilities and the development of real-time streaming functionalities. The book describes how to set up an Internet of Things infrastructure, manage software deve
  • Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition

    Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez & Moses Frost

    Netwerk Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks. Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition clearly explains the enemy’s devious weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. You will get complete coverage of Internet of Things, mobile, and Cloud security along with penetration testing, malware analysis, and reverse engineering techniques. State-of-the-art malware, ransomware, and system exploits are thoroughly explained. Fully revised content includes 7 new chapters covering
  • Windows Server 2022 Essential Network Installation Guide

    Nicholas Rushton

    Netwerk For Windows Server 2022 and Windows Server 2022 Essentials This book is a practical installation guide for Windows Server 2022, produced from a real-world perspective and written according to the Goldilocks Principle: not too little information, not too much information, but just right. It assumes a reasonable working knowledge of Windows and the basics of networking. It is written in a friendly, “do-it-like-this” style, rather than with undue emphasis on theory and abstract topics. With over 200 illustrations and screenshots, practical examples and clear explanations, it takes you through setting up Windows Server 2022 in a typical small organization. Whether you are installing it for the first time, are planning to do so or are just plain curious and learning Windows Server, you will find this proven guide of interest and help. And, with everything in one place, it is the superior alternative to spending many frustrating hours searching the internet for what is sometimes inaccur
  • The Art of Cyberwarfare

    Jon DiMaggio

    Netwerk A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks. Whether you’re an individual researcher or part of a team within a Security Operations Center (SoC), you’ll learn to approach, track, and attribute attacks to these advanced actors.  The first part of the book is an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations. It explores the geopolitical context in which the attacks took place, the patterns found in the attackers’ techniques, and the supporting evidence analysts used to attribute such attacks. Dive in
  • Go H*ck Yourself

    Bryson, Payne

    Netwerk Learn firsthand just how easy a cyberattack can be. Go Hack Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you’ll be shocked by how easy they are to carry out—and realize just how vulnerable most people really are. You’ll be guided through setting up a virtual hacking lab so you can safely try out attacks without putting yourself or others at risk. Then step-by-step instructions will walk you through executing every major type of attack, including physical access hacks, Google hacking and reconnaissance, social engineering and phishing, malware, password cracking, web hacking, and phone hacking. You’ll even hack a virtual car! You’ll experience each hack from the point of view of both the attacker and the target. Most importantly, every hack is grounded in real-life examples and paired with practical cyber defense tips, so you’ll understand how to guard ag
  • TLS Mastery

    Michael W. Lucas

    Netwerk Transport Layer Security, or TLS, makes ecommerce and online banking possible. It protects your passwords and your privacy. Let’s Encrypt transformed TLS from an expensive tool to a free one. TLS understanding and debugging is an essential sysadmin skill you must have. TLS Mastery takes you through: • How TLS works • What TLS provides, and what it doesn’t • Wrapping unencrypted connections inside TLS • Assessing TLS configurations • The Automated Certificate Management Environment (ACME) protocol • Using Let’s Encrypt to automatically maintain TLS certificates • Online Certificate Status Protocol • Certificate Revocation • CAA, HSTS, and Certificate Transparency • Why you shouldn’t run your own CA, and how to do it anyway • and more! Stop wandering blindly around TLS. Master the protocol with TLS Mastery !
  • How to Hack Like a Legend

    Sparc Flow

    Netwerk Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, frustration, and strategic decision-making first-hand in this exhilarating narrative journey into a highly defended Windows environment driven by AI. Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced Windows defense systems. You’ll experience all the thrills, frustrations, dead-ends, and eureka moments of the mission first-hand, while picking up practical, cutting-edge techniques for evading Microsoft’s best security systems. The adventure starts with setting up your elite hacking infrastructure complete with virtual Windows system. After some
  • Ethical Hacking

    Daniel G. Graham

    Netwerk A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst.   You’ll begin with the basics: capturing a victim’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you’ll deploy reverse shells that let you remotely run commands on a victim’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you’ll use to traverse a private
  • Hacking of Computer Networks

    Dr. Hidaia Mahmood Alassouli

    Netwerk The objective of the book is to summarize to the user with main topics in computer networking hacking. The book consists of the following parts: Part 1: Lab Setup  Part2: Foot printing and Reconnaissance Part 3: Scanning Methodology Part 4: Enumeration Part 5:System Hacking Part 6: Trojans and Backdoors and Viruses Part 7: Sniffer and Phishing Hacking Part 8: Hacking Web Servers Part 9:Hacking Windows and Linux Systems Part 10: Wireless Hacking Part 11: Hacking Mobile Applications
  • Principles of Synchronous Digital Hierarchy

    Rajesh Kumar Jain

    Netwerk The book presents the current standards of digital multiplexing, called synchronous digital hierarchy, including analog multiplexing technologies. It is aimed at telecommunication professionals who want to develop an understanding of digital multiplexing and synchronous digital hierarchy, in particular, and the functioning of practical telecommunication systems, in general. The text includes all relevant fundamentals and provides a handy reference for problem solving or defining operations and maintenance strategies. The author covers digital conversion and TDM principles, line coding and digital modulation, signal impairments, and synchronization, as well as emerging systems.
  • The Read Aloud Cloud

    Forrest Brazeal

    Netwerk What is “the cloud”? Is it here or there? Should it be allowed? Should I even care? Have you ever imagined the internet as a giant Rube Goldberg machine? Or the fast-evolving cloud computing space as a literal jungle filled with prehistoric beasts? Does a data breach look like a neo-noir nightmare full of turned-up coat collars and rain-soaked alleys? Wouldn’t all these vital concepts be easier to understand if they looked as interesting as they are? And wouldn’t they be more memorable if we could explain them in rhyme? Whether you’re a kid or an adult, the answer is: YES! The medicine in this spoonful of sugar is a sneaky-informative tour through the past, present and future of cloud computing, from mainframes to serverless and from the Internet of Things to artificial intelligence. Forrest is a professional explainer whose highly-rated conference talks and viral cartoon graphics have been teaching engineers to cloud for years. He knows that a picture is worth a thousand wo
  • Creation and Deployment of Smart Contracts on Ethereum Blockchain

    Dr. Hidaia Mahmood Alassouli

    Netwerk This work explains briefly the creation and deployment Of Smart Contract on Ethereum Blockchain. The work consists from the following sectionsBlockchainSolidity variables and types How to Setup or Install Ethereum on WindowsHow to compile and deploy smart contract on JavaScriptVMHow to install Ganache Blockchain on Windows and deploy smart contract using it.How to compile and deploy Smart Contract on Test Networks,Quick example of deploying ERC20 token smart contract.Getting started tutorial on SolidityCreating ERC-20 smart contract and crowd sale (ICO) smart contract without coding ERC-20 smart contract and crowd sale (ICO) smart contract:Creating Ethereum ERC-20 Tokens and Crowd Sales (ICO) without coding with Token Wizard:Example of creating and deploying an ERC20 token on the test and main network!!!
  • Some Tutorials in Computer Networking Hacking

    Dr. Hidaia Mahmood Alassouli

    Netwerk The objective of this work is to provide some quick tutorials in computer networking hacking.The work includes the following tutorials:Tutorial 1: Setting Up Penetrating Tutorial in Linux.Tutorial 2: Setting Up Penetrating Tutorial in Windows.Tutorial 3: OS Command Injection: Tutorial 4: Basic SQL Injection Commands. Tutorial 5: Manual SQL injection using order by and union select technique.Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection.Tutorial 7: Uploading Shell in the Site having LFI.Tutorial 8: Advanced Way for Uploading ShellTutorial 9: Uploading shell Using Sqli Command.Tutorial 10: Uploading Shell Using SQLmapTutorial 11: Post Based SQL InjectionTutorial 12: Cracking the Hashes Using Hashcat. Tutorial 13: Hacking windows 7 and 8 through Metasploite Tutorial 14: Tutorial on Cross Site Scripting Tutorial 15: Hacking Android Mobile Using MetasploitTutorial 16: Man of the middle attack:Tutorial 17: Using SQLmap for SQL injectionTutorial 18: Hide Your IpTutorial
  • Designing Microservices Using Django: Structuring, Deploying and Managing the Microservices Architecture with Django

    Shayank Jain

    Netwerk A step-by-step that will help you build Microservices architecture using Django and Python Microservices architectures solve the multiple problems of software architecture. Django is a full-stack development framework, written in python.  This book includes everything necessary for web application development; from the user views to the information storage: model, persistence, relationships, controllers, forms, validations, rest API and a very useful back office. Furthermore, the book will show how to build production-ready microservices. It will help you create restful APIs and get familiar with Redis and Celery. Towards the end, the book will show how to secure these services and deploy these microservices using Django. Lastly, it will show how to scale our services.  
  • Penetration Testing For Dummies

    Robert Shimonski

    Netwerk Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking.  Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of

keyboard_arrow_up