Компьютеры: прочее - скачать книги или читать онлайн. Страница 22

Купить книгу The Antivirus Hacker's Handbook, автора Joxean  Koret
Pdf-книга
The Antivirus Hacker's Handbook
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software development to evade, attack, and exploit antivirus software—all of which can help you strengthen your network and protect your data. While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network. Discover how to reverse engineer your antivirus software Explore methods of antivirus software evasion Consider different ways to attack and exploit antivirus software Understand the current state of the antivirus software market, and get recommendations for users and vendors who are leveraging this software The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications.
Купить книгу Security in Fixed and Wireless Networks, автора Guenter  Schaefer
Pdf-книга
Security in Fixed and Wireless Networks
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms and protocols work.
Купить книгу Security Intelligence. A Practitioner's Guide to Solving Enterprise Security Challenges, автора Qing  Li
Pdf-книга
Security Intelligence. A Practitioner's Guide to Solving Enterprise Security Challenges
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle. You will learn about: Secure proxies – the necessary extension of the endpoints Application identification and control – visualize the threats Malnets – where is the source of infection and who are the pathogens Identify the security breach – who was the victim and what was the lure Security in Mobile computing – SNAFU With this book, you will be able to: Identify the relevant solutions to secure the infrastructure Construct policies that provide flexibility to the users so to ensure productivity Deploy effective defenses against the ever evolving web threats Implement solutions that are compliant to relevant rules and regulations Offer insight to developers who are building new security solutions and products
Купить книгу Cybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions, автора
Pdf-книга
Cybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration. Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skills Dives deeper into such intense topics as wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizations Delves into network administration for Windows, Linux, and VMware Examines penetration testing, cyber investigations, firewall configuration, and security tool customization Shares techniques for cybersecurity testing, planning, and reporting Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions is a comprehensive and authoritative look at the critical topic of cybersecurity from start to finish.
Купить книгу Radio-Frequency Human Exposure Assessment. From Deterministic to Stochastic Methods, автора Joe  Wiart
Pdf-книга
Radio-Frequency Human Exposure Assessment. From Deterministic to Stochastic Methods
Nowadays approximately 6 billion people use a mobile phone and they now take a central position within our daily lives. The 1990s saw a tremendous increase in the use of wireless systems and the democratization of this means of communication. To allow the communication of millions of phones, computers and, more recently, tablets to be connected, millions of access points and base station antennas have been extensively deployed. Small cells and the Internet of Things with the billions of connected objects will reinforce this trend. This growing use of wireless communications has been accompanied by a perception of risk to the public from exposure to radio frequency (RF) electromagnetic field (EMF). To address this concern, biomedical research has been conducted. It has also been important to develop and improve dosimetry methods and protocols that could be used to evaluate EMF exposure and check compliance with health limits. To achieve this, much effort has was made in the 1990s and 2000s. Experimental and numerical methods, including statistical methods, have been developed. This book provides an overview and description of the basic and advanced methods that have been developed for human RF exposure assessment. It covers experimental, numerical, deterministic and stochastic methods.
Купить книгу Threat Modeling. Designing for Security, автора Adam  Shostack
Pdf-книга
Threat Modeling. Designing for Security
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
Купить книгу Cyber Security Policy Guidebook, автора Jason  Healey
Pdf-книга
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices. Inside are detailed chapters that: Explain what is meant by cyber security and cyber security policy Discuss the process by which cyber security policy goals are set Educate the reader on decision-making processes related to cyber security Describe a new framework and taxonomy for explaining cyber security policy issues Show how the U.S. government is dealing with cyber security policy issues With a glossary that puts cyber security language in layman's terms—and diagrams that help explain complex topics—Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.
Купить книгу Information Security. Principles and Practice, автора Mark  Stamp
Pdf-книга
Information Security. Principles and Practice
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic «orange book» view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.
Купить книгу Vehicle Dynamics Estimation using Kalman Filtering. Experimental Validation, автора Moustapha  Doumiati
Pdf-книга
Vehicle Dynamics Estimation using Kalman Filtering. Experimental Validation
Vehicle dynamics and stability have been of considerable interest for a number of years. The obvious dilemma is that people naturally desire to drive faster and faster yet expect their vehicles to be “infinitely” stable and safe during all normal and emergency maneuvers. For the most part, people pay little attention to the limited handling potential of their vehicles until some unusual behavior is observed that often results in accidents and even fatalities. This book presents several model-based estimation methods which involve information from current potential-integrable sensors. Improving vehicle control and stabilization is possible when vehicle dynamic variables are known. The fundamental problem is that some essential variables related to tire/road friction are difficult to measure because of technical and economical reasons. Therefore, these data must be estimated. It is against this background, that this book’s objective is to develop estimators in order to estimate the vehicle’s load transfer, the sideslip angle, and the vertical and lateral tire/road forces using a roll model. The proposed estimation processes are based on the state observer (Kalman filtering) theory and the dynamic response of a vehicle instrumented with standard sensors. These estimators are able to work in real time in normal and critical driving situations. Performances are tested using an experimental car in real driving situations. This is exactly the focus of this book, providing students, technicians and engineers from the automobile field with a theoretical basis and some practical algorithms useful for estimating vehicle dynamics in real-time during vehicle motion.
Купить книгу Public Key Cryptography. Applications and Attacks, автора
Pdf-книга
Public Key Cryptography. Applications and Attacks
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based – such as the discrete logarithm problem and the difficulty of factoring integers. The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography: • Explains fundamentals of public key cryptography • Offers numerous examples and exercises • Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam • Provides solutions to the end-of-chapter problems Public Key Cryptography provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.
Купить книгу Data-Driven Security. Analysis, Visualization and Dashboards, автора
Pdf-книга
Data-Driven Security. Analysis, Visualization and Dashboards
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions. Everything in this book will have practical application for information security professionals. Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks Covers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and more Written by a team of well-known experts in the field of security and data analysis Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards.
Купить книгу Эра блокчейн, автора Константина Крохмаля
Электр. книга
Эра блокчейн
РЕКОМЕНДАЦИИ, БИЗНЕС-СХЕМЫ, РЕШЕНИЯ, ПРОГНОЗЫ.Сейчас мы стоим на рубеже нового скачка в развитии, основанного на технологии блокчейн.Блокчейн сейчас используется в основном для криптовалют, но, учитывая будущие перспективы, могу предположить, что из технологии она превратится в реальный источник дохода, в создание нового бизнеса и новых технологий. Я описал развитие блокчейн на ближайшие 20 лет и попытался систематизировать бизнес-схемы, уже применяемые в мире, а также предложил новые решения.