IT eBooks
Download, Read, Use
Building Networks and Servers Using BeagleBone
Building Networks and Servers Using BeagleBone

Create your own video theatre and music jukebox using Beaglebone. Make your multimedia library available to all the devices on your network, without spending an excessive amount of money on computer components and software. You'll start off by installing the Debian operating system image onto your BeagleBone, and setting up the software required to serve up both audio and video files to any device on the network. Next, you'll move on to network monitoring software, and install traceroute, MTR (My traceroute), Nmap, and iptraf-ng, to monitor the traffic on your local network. Once the monitoring software is set up, you'll create a RAID array to store all your media files. You'll then go one step further, and set up live and recorded video streaming using a web-based application. Finally, you'll learn to add Wi-Fi connectivity to your multimedia server by setting up WAP on your BeagleBone system. ...
Raspberry Pi Networking Cookbook, 2nd Edition
Raspberry Pi Networking Cookbook, 2nd Edition

With increasing interest in Maker Projects and the Internet of Things (IoT), students, scientists, and hobbyists are using the Raspberry Pi as a reliable, inexpensive platform to connect local devices to Internet services. This book begins with recipes that are essential to installing the Raspberry Pi and configuring it for network access. Then it continues with recipes on installing common networking services such as firewalls and file sharing. The final chapters include recipes for network monitoring, streaming data from the Raspberry Pi to IoT services, and using clusters of Raspberry Pis to store and analyze large volumes of data. ...
Network Attacks and Exploitation
Network Attacks and Exploitation

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. Assaults and manipulation of computer networks are rampant around the world. One of the biggest challenges is fitting the ever-increasing amount of information into a whole plan or framework to ...
Investigating the Cyber Breach
Investigating the Cyber Breach

Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You'll learn how to make the most of today's best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving inte ...
Network Security Through Data Analysis, 2nd Edition
Network Security Through Data Analysis, 2nd Edition

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. Use sensors to collect network, service, host, and active domain data; Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect; Detect unusual phenomena through exploratory data analysis (EDA ...
Foundations of Python Network Programming, 3rd Edition
Foundations of Python Network Programming, 3rd Edition

Foundations of Python Network Programming, Third Edition, covers all of the classic topics found in the second edition of this book, including network protocols, network data and errors, email, server architecture, and HTTP and web applications, plus updates for Python 3. If you're a Python programmer who needs a deep understanding of how to use Python for network-related tasks and applications, this is the book for you. From web application developers, to systems integrators, to system administrators—this book has everything that you need to know. ...
Mastering Go
Mastering Go

The Go programming language, often referred to as Golang, is really making strides, with some masterclass developments, architected by the greatest programming minds. Tobias Lutke, CEO of Shopify, recently quoted as saying "Go will be the server language of the future", powerful words, with much ambition. Go programmers are in high demand, but more controversially, Go takes the stage, where C and Unix programmers previously led the way. The growth of the Go language has seen it become the means by which systems, networking, web, and cloud applications are implemented. Comfortable with syntax, you'll benefit by mastering the use of the libraries and utilise its features, speed, and efficiency, for which the Go ecology is justly famous. You already know a little Go syntax and you've written some small projects, most Go programmers face the difficulty of having to integrate their Golang skills with production code. Typical introductions to Go programming, often stop short of this tr ...
Learn Cisco Network Administration in a Month of Lunches
Learn Cisco Network Administration in a Month of Lunches

Cisco's ultrareliable routers and switches are the backbone of millions of networks, but "set and forget" is not an acceptable attitude. Fortunately, you don't have to be an old-time administrator to set up and maintain a Cisco-based network. With a handful of techniques, a little practice, and this book, you can keep your system in top shape. Learn Cisco Network Administration in a Month of Lunches is designed for occasional and full-time network administrators using Cisco hardware. In 22 bite-sized lessons, you'll learn practical techniques for setting up a Cisco network and making sure that it never fails. Real-world labs start with configuring your first switch and guide you through essential commands, protocols, dynamic routing tricks, and more. ...
Raspberry Pi for Arduino Users
Raspberry Pi for Arduino Users

Leverage your Arduino skills in the Raspberry Pi world and see how to cross the two platforms into sophisticated programs. The Arduino and Raspberry Pi communities overlap more than you might think. Arduinos can be expanded to have network capabilities with a variety of "shields", all of which increase the cost and complexity of the system. By contrast, Raspberry Pis all run Linux, which is a very network-competent platform. The newest Pi, the Raspberry Pi Zero W, is WiFi and Bluetooth capable, and costs around $10 U.S. For network enabled gadgets, it makes far more sense to cross to the Raspberry PI platform, if only someone would make it easy to do. That's what this book is about. You'll learn some survival level Linux system administration, so you know how to set the machine up and how to establish at least minimal security for your gadget. You'll set up and learn the Geany IDE on your Pi, which is fairly similar to the Arduino IDE. Where the two platforms overlap the most ...
Kali Linux 2018: Windows Penetration Testing, 2nd Edition
Kali Linux 2018: Windows Penetration Testing, 2nd Edition

Microsoft Windows is one of the two most common OSes, and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, and forensics tools, and not the OS. This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. You will start by learning about the various desktop environments that now come with Kali. The book covers network sniffers and analysis tools to uncover the Windows protocols in use on the network. You will see several tools designed to improve your average in password acquisition, from hash cracking, online attacks, offline attacks, and rainbow tables to social engineering. It also demonstrates several use cases for ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2024