Serious CryptographyThis practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.
You'll also learn: Key concepts in cryptography, such as computational security, attacker models, and forward secrecy; The strengths and limitations of the TLS protocol behind HTTPS secure websites; Quantum computation and post-quantum cryptography; About various vulnerabilities by examining numerous code examples and use cases; How to choose the best algorithm or protocol and ask vendors the right questions.
Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls.
Whether you're a seasoned practitioner or a beginner looking to dive i ...
Gray Hat C#Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like fuzzing, performing vulnerability scans, and analyzing malware. With some help from Mono, you'll write your own practical security tools that will run on Windows, OS X, Linux, and even mobile devices.
After a crash course in C# and some of its advanced features, you'll learn how to: Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads; Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections; Write a .NET decompiler for OS X and Linux; Parse and read offline registry hives to dump system information; Automate the security tools Arachni and Metasploit using their MSGPACK RPCs.
Streamline and simplify your workday by making the most of C#'s extensive repertoire of powerful tools and libraries with Gray Hat C#. ...
The DAM Book, 2nd EditionOne of the main concerns for digital photographers today is asset management: how to file, find, protect, and re-use their photos. The best solutions can be found in The DAM Book, our bestselling guide to managing digital images efficiently and effectively.
Anyone who shoots, scans, or stores digital photographs is practicing digital asset management (DAM), but few people do it in a way that makes sense. In this second edition, photographer Peter Krogh - the leading expert on DAM - provides new tools and techniques to help professionals, amateurs, and students: Understand the image file lifecycle (from shooting to editing, output, and permanent storage); Learn new ways to use metadata and key words to track photo files; Create a digital archive and name files clearly; Determine a strategy for backing up and validating image data; Learn a catalog workflow strategy, using Adobe Bridge, Camera Raw, Adobe Lightroom, Microsoft Expression Media, and Photoshop CS4 together; Migrate images ...
Web Design for DevelopersWeb Design for Developers will show you how to make your web-based application look professionally designed. We'll help you learn how to pick the right colors and fonts, avoid costly interface and accessibility mistakes your application will really come alive. We'll also walk you through some common Photoshop and CSS techniques and work through a web site redesign, taking a new design from concept all the way to implementation. ...
Beginning Ruby, 3rd EditionLearn the principles behind object-oriented programming and within a few chapters create a fully functional Ruby application. You'll also gain a basic understanding of many ancillary technologies such as databases, XML, web frameworks, and networking - some of which are needed as part of a fully functioning Ruby application.
Based on the bestselling first and second editions, Beginning Ruby, 3rd Edition is a leading guide to learn Ruby from the ground up. The new edition of this book provides the same excellent introduction to Ruby as the previous editions plus updates for the newest version of Ruby 2.3 which includes new garbage collection support of symbol type objections, a new incremental garbage collector, memory management, vfork(2) with system and spawn functions and much more. This book can also be used as a textbook or companion to a textbook on beginning Ruby programming.
The light and agile Ruby programming language remains a very popular open source scripting option f ...
Cyber-Physical Attack Recovery ProceduresThis book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time—even from the other side of the planet.
Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker—until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know—it really is a cyber-physical attack.
Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your emplo ...
Efficient R ProgrammingBecome a more productive programmer with Efficient R Programming. Drawing on years of experience teaching R courses, authors Colin Gillespie and Robin Lovelace give practical advice on a range of topics - from optimizing set-up of RStudio to leveraging C++ - that make this book a valuable asset for both experienced and novice programmers. It's suitable for academics, business users, and programmers from a wide range of backgrounds.
Get practical, tried-and-true advice from longtime R instructors; Dive into a wide range of topics, including RStudio set-up and leveraging C++, suitable for all skill levels; Gain insight into RStudio's functionality to boost code-writing productivity; Learn the necessary skills for team-based R programming work; Save time, and energy, debugging code and searching online forums. ...
Introducing SEOYour easy-to-digest brief introduction to SEO (search engine optimization) - an imperative methodology used to improve the visibility of websites using different strategies and techniques.
Using a calculative and practical approach, this book teaches you the techniques, practical implementations, and concepts of SEO that will enable you to get to grips with the fundamental aspects of search engine optimization.
Introducing SEO jumpstarts your knowledge using an easy-to-follow approach – add it to your library today. ...
Moodle 3 Administration, 3rd EditionMoodle is the de facto standard for open source learning platforms. However, setting up and managing a learning environment can be a complex task since it covers a wide range of technical, organizational, and pedagogical topics. This ranges from basic user and course management, to configuring plugins and design elements, all the way to system settings, performance optimization, events frameworks, and so on.
This book concentrates on basic tasks such as how to set up and configure Moodle and how to perform day-to-day administration activities, and progresses on to more advanced topics that show you how to customize and extend Moodle, manage courses, cohorts, and users, and how to work with roles and capabilities. You'll learn to configure Moodle plugins and ensure your VLE conforms to pedagogical and technical requirements in your organization. You'll then learn how to integrate the VLE via web services and network it with other sites, including Mahara, and extend your system via pl ...
Next Generation Databases: NoSQL, NewSQL, and Big DataThis is a book for enterprise architects, database administrators, and developers who need to understand the latest developments in database technologies. It is the book to help you choose the correct database technology at a time when concepts such as Big Data, NoSQL and NewSQL are making what used to be an easy choice into a complex decision with significant implications.
The relational database (RDBMS) model completely dominated database technology for over 20 years. Today this "one size fits all" stability has been disrupted by a relatively recent explosion of new database technologies. These paradigm-busting technologies are powering the "Big Data" and "NoSQL" revolutions, as well as forcing fundamental changes in databases across the board.
Deciding to use a relational database was once truly a no-brainer, and the various commercial relational databases competed on price, performance, reliability, and ease of use rather than on fundamental arch ...