||Gray Hat Hacking, 5th Edition|
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition.
Build and launch spoofing exploits with Ettercap; Induce error conditions and crash software using fuzzers; Use advanced reverse engineering to exploit Windows and Linux software; Bypass Windows Access Control and memory protection schemes; Exploit web applications with Padding Oracle Att ...
||Microsoft SQL Server 2017 on Linux|
This comprehensive guide shows, step-by-step, how to set up, configure, and administer SQL Server 2017 on Linux for high performance and high availability. Written by a SQL Server expert and respected author, Microsoft SQL Server 2017 on Linux teaches valuable Linux skills to Windows-based SQL Server professionals. You will get clear coverage of both Linux and SQL Server and complete explanations of the latest features, tools, and techniques. The book offers clear instruction on adaptive query processing, automatic tuning, disaster recovery, security, and much more.
Understand how SQL Server 2017 on Linux works; Install and configure SQL Server on Linux; Run SQL Server on Docker containers; Learn Linux Administration; Troubleshoot and tune query performance in SQL Server; Learn what is new in SQL Server 2017; Work with adaptive query processing and automatic tuning techniques; Implement high availability and disaster recovery for SQL Server on Linux; Learn the security features avai ...
||Principles of Computer Security, 5th Edition|
Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written by a pair of highly respected security educators, Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Exam SY0-501) will help you pass the exam and become a CompTIA certified computer security expert.
Ensure operational, organizational, and physical security; Use cryptography and public key infrastructures (PKIs); Secure remote access, wireless networks, and virtual private networks (VPNs); Authenticate users and lock down mobile devices; Harden network devices, operating systems, and applications; Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing; Combat viruses, worms, Trojan ...
||CompTIA Linux+/LPIC-1 Certification All-in-One Exam Guide, Premium 2nd Edition|
The premium edition features the bestselling book plus one year of unlimited access to Practice Labs for CompTIA Linux+, including real world hands-on tasks carried out on real hardware simply accessed from a web browser.
An innovative, hands-on study system from a team of CompTIA certification and Linux experts, CompTIA Linux+/LPIC-1 Certification All-in-One Exam Guide, Premium Edition with Online Practice Labs offers complete lab based coverage of CompTIA Linux+ exams LX0-103 and LX0-104. The Practice Labs platform offers an opportunity to work with industry standard technologies to provide hands-on experience and help you develop a deeper understanding of the topics covered in the certification exams.
One year of online access includes: Real hardware and software needed to develop your practical skills - this is not a simulation but access to the actual equipment you would expect to find in any work place along with a wide range of industry standard technologies; Certification ...
||Communications Receivers, 4th Edition|
This thoroughly updated guide offers comprehensive explanations of the science behind today's radio receivers along with practical guidance on designing, constructing, and maintaining real-world communications systems. You will explore system planning, antennas and antenna coupling, amplifiers and gain control, filters, mixers, demodulation, digital communication, and the latest software defined radio (SDR) technology. Written by a team of telecommunication experts, Communications Receivers: Principles and Design, Fourth Edition, features technical illustrations, schematic diagrams, and detailed examples.
Basic radio considerations; Radio receiver characteristics; Receiver system planning; Receiver implementation considerations; RF and baseband techniques for Software-Defined Radios; Transceiver SDR considerations; Antennas and antenna coupling; Mixers; Frequency sources and control; Ancillary receiver circuits; Performance measurement. ...
||Healthcare Information Technology Exam Guide, 2nd Edition|
Gain the skills and knowledge required to implement and support healthcare IT (HIT) systems in various clinical and healthcare business settings. Health Information Technology Exam Guide for CHTS and CAHIMS Certifications prepares IT professionals to transition into HIT with coverage of topics ranging from health data standards to project management. This new edition includes broadened security content in addition to coverage of disruptive innovations such as complex platforms that support big data, genomics, telemedicine, mobile devices, and consumers. Learn about achieving true interoperability, updates to HIPAA rules, and FHIR and SMART standards.
Healthcare and Information Technology in the United States; Fundamentals of Healthcare Information Science; Healthcare Information Standards and Regulation; Implementing, Managing, and Maintaining Healthcare Information Technology; Optimizing Healthcare Information Technology; Making Healthcare Information Technology Private, Secure, an ...
||CorelDRAW X8, 12th Edition|
This thoroughly revised guide offers complete coverage of CorelDraw X8, including the revamped interface and brand-new features. CorelDRAW X8: The Official Guide shows anyone - from a beginner to an experienced illustrator - how to create top-drawer commercial graphics and exquisite artwork. You will learn to draw photorealistic illustrations, use shortcuts to create complex art, lay out text like a pro, add special effects, and transform 2D objects into 3D graphics. The book features tips for printing high-quality work that matches what you've designed on your monitor.
Work in the customizable interface redesigned to reflect Windows Metro style; Explore and understand the software's menus, palettes, and dockers; Lay out brochures, flyers, and other multi-page documents; Add paragraph, artistic, and custom-shaped text to your designs; Search the Content Exchange for fonts, vector patterns, background designs, and the Get More docker; Use the Perspective, Extrude, Smear, Twirl, Attra ...
||Annual Editions, 22nd Edition|
The Annual Editions series is designed to provide convenient inexpensive access to a wide range of current articles from some of the most respected magazines, newspapers and journals published today. Annual Editions are updated on a regular basis through a continuous monitoring of over 300 periodical sources. The articles selected are authored by prominent scholars, researchers, and commentators writing for a general audience. Each Annual Editions volume has a number of features designed to make them especially valuable for classroom use; including a brief overview for each unit, as well as Learning Outcomes, Critical Thinking questions, and Internet References to accompany each article. ...
||Hacking Exposed Malware & Rootkits, 2nd Edition|
Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology.
Learn how malware infects, survives, and propagates across an enterprise; See how hackers develop malicious code and target vulnerable systems; Detect, neutralize, and remove user-mode and kernel-mode rootkits; Use hypervisors and honeypots to uncover and kill virtual rootkits; Defend against keylogging, redirect, click fraud, and identity theft; Block spear phishing, client-side, and embedded-code exploits; Effectively deploy ...
||Hacking Exposed Industrial Control Systems|
This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating? and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using "ICS safe" methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.
Assess your exposure and develop an effective risk management plan; Adopt the latest ICS-focused threat intelligence techniques; Use threat modeling to create realistic risk scenario ...
||Anti-Hacker Tool Kit, 4th Edition|
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. ...