Angebote zu "Networking" (30 Treffer)

Privileged Attack Vectors
€ 21.99 *
ggf. zzgl. Versand

See how privileges, passwords, vulnerabilities, and exploits can be leveraged as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if , but when your organization will be breached. Attackers target the perimeter network, but in recent years have refocused their efforts on the path of least resistance: users and their privileges. In decades past an entire enterprise might be sufficiently managed through just a handful of credentials. Today´s environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. There is not one silver bullet to provide the protection you need against all vectors and stages of an attack. And while some new and innovative solutions will help protect against or detect the initial infection, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vector s details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. What You´ll Learn Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and auditing strategies to mitigate the threats and risk Understand a 12-step privileged account management Implementation plan Consider deployment and scope, including risk, auditing, regulations, and oversight solutions Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privileged escalation threats

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Computer Networks: Pearson New International Ed...
€ 49.99 *
ggf. zzgl. Versand

Appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum´s in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire book - the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols. Networking Labs (Instructor bundle) This set of a dozen labs complements the textbook with hands-on exercises to let students explore the Internet protocols in a real-world setting. All the handouts and traces that students need to complete the exercises are included. The exercises run on Windows, Mac and Linux platforms, and may be used for labs, homeworks, and demonstrations. The protocols that are examined include Ethernet, 802.11, IP, ARP, ICMP, DHCP, UDP, TCP, HTTP, DNS and SSL. The labs also build useful skills by making use of popular networking tools including Wireshark, curl and wget, ping, traceroute, and dig. The instructor version of the labs includes solution handouts and source materials.

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
StarTech.com PCI Gigabit Ethernet Netzwerkkarte...
€ 12.97 *
ggf. zzgl. Versand

Rüsten Sie Ihren PC mit PCI-Steckplatz um einen 10/100/1000 Mbps Ethernet-Anschluss auf. Diese PCI-basierte 10/100/1000 Mbps Gigabit Ethernet-Netzwerk Adapterkarte bietet einen einfachen Anschluss an ein Gigabit Ethernet und erfüllt alle Anforderungen der IEEE 802.3, 802.3u, 802.3ab und 802.3x-Normen. Die Gigabit Ethernet-Netzwerk Adapterkarte passt in jeden PCI-fähigen Client, Server oder Einzelplatz-Computer und unterstützt High-Performance-Zweikanal-Networking bei maximalen Datentransferraten von 1000 Mbps in jeder Richtung (insgesamt also 2000 Mbps) - das heißt, bis zu 10 Mal schneller als 10/100 Ethernet. Sie ist kompatibel mit einer breiten Palette von Betriebssystemen, unter ihnen Linux, Windows 98SE, ME, 2000, XP, XP-64bit, Vista, Vista-64bit, 7, 7-64bit, und Mac OS 10+, und beinhaltet eine optionale Low-Profile-Klammer, wodurch der Einbau der Karte auch in Computer/Server mit kleineren Gehäusen einfach wird.

Anbieter: schaefer-boutique.de
Stand: Sep 21, 2018
Zum Angebot
Python in Practice: Create Better Programs Usin...
€ 33.99 *
ggf. zzgl. Versand

Python in Practice presents Python programming technologies and techniques to help programmers write code that´s elegant, maintainable, and fast. Drawing on both the standard library and important third-party libraries, the book shows how to achieve significant speedups using high-level concurrency and compiled Python. The book is packed with examples and ideas that illustrate a wide range of techniques and modules, encompassing high-level networking, 2D graphics, 3D graphics, and GUI programming---including concurrent GUI programming. The book is aimed at programmers who want to take their Python programming to the next level. Product Description Winner of the 2014 Jolt Award for ´´Best Book´´ ?Whether you are an experienced programmer or are starting your career, Python in Practice is full of valuable advice and example to help you improve your craft by thinking about problems from different perspectives, introducing tools, and detailing techniques to create more effective solutions.? ?Doug Hellmann, Senior Developer, DreamHost If you?re an experienced Python programmer, Python in Practice will help you improve the quality, reliability, speed, maintainability, and usability of all your Python programs. Mark Summerfield focuses on four key themes: design patterns for coding elegance, faster processing through concurrency and compiled Python (Cython), high-level networking, and graphics. He identifies well-proven design patterns that are useful in Python, illuminates them with expert-quality code, and explains why some object-oriented design patterns are irrelevant to Python. He also explodes several counterproductive myths about Python programming?showing, for example, how Python can take full advantage of multicore hardware. All examples, including three complete case studies, have been tested with Python 3.3 (and, where possible, Python 3.2 and 3.1) and crafted to maintain compatibility with future Python 3.x versions. All code has been tested on Linux, and most code has also been tested on OS X and Windows. All code may be downloaded at www.qtrac.eu/pipbook.html . Coverage includes Leveraging Python?s most effective creational, structural, and behavioral design patterns Supporting concurrency with Python?s multiprocessing, threading, and concurrent.futures modules Avoiding concurrency problems using thread-safe queues and futures rather than fragile locks Simplifying networking with high-level modules, including xmlrpclib and RPyC Accelerating Python code with Cython, C-based Python modules, profiling, and other techniques Creating modern-looking GUI applications with Tkinter Leveraging today?s powerful graphics hardware via the OpenGL API using pyglet and PyOpenGL Features + Benefits Introduces readers to solid, well-established third-party libraries that greatly extend the standard Python library. Python in Practice presents Python programming technologies and techniques to help programmers write code that is elegant, maintainable, and fast. Drawing on both the standard library and important third-party libraries, the book shows how to achieve significant speedups using high-level concurrency and compiled Python. The book is packed with examples and ideas that illustrate a wide range of techniques and modules, encompassing high-level networking, 2D graphics, 3D graphics, and GUI programming---including concurrent GUI programming. The book is aimed at programmers who want to take their Python programming to the next level.

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Unix Network Programming, Volume 1
€ 84.99 *
ggf. zzgl. Versand

This is THE guide to UNIX network programming APIs. Whether you write Web servers, client/server applications, or any other network software, you need to understand networking APIS-especially sockets in greater detail than ever before. You need UNIX Network Programming, Volume 1, Third Edition. In this book, the Authors offer unprecedented, start-to-finish guidance on making the most of sockets, the de facto standard for UNIX network programming with APIs - as well as extensive coverage of the X/Open Transport Interface (XTI). Product Description This is THE guide to UNIX network programming APIs. Whether you write Web servers, client/server applications, or any other network software, you need to understand networking APIS-especially sockets in greater detail than ever before. You need UNIX Network Programming, Volume 1, Third Edition. In this book, the Authors offer unprecedented, start-to-finish guidance on making the most of sockets, the de facto standard for UNIX network programming with APIs - as well as extensive coverage of the X/Open Transport Interface (XTI). Features + Benefits The classic guide to UNIX networking APIs - completely updated! ° Previous editions sold over 160,000 units! Second Edition (1998) sold over 53,000 in retail alone! ° Updates coverage of programming standards, debugging techniques, and covers Operating Systems including Red Hat 9, Solaris 9, HP-UX, Free BSD 4.8/5.0, AIX 5.x, and Mac OS X. ° Bill Fenner (AT/T Labs) and Andrew Rudoff (SUN) carry on the tradition of this great work. Backcover UNIX Network Programming, Volume 1: The Sockets Networking API, Third Edition Everyone will want this book because it provides a great mix of practical experience, historical perspective, and a depth of understanding that only comes from being intimately involved in the field. I´ve already enjoyed and learned from reading this book, and surely you will too. --Sam Leffler The classic guide to UNIX networking APIs... now completely updated! To build today´s highly distributed, networked applications and services, you need deep mastery of sockets and other key networking APIs. One book delivers comprehensive, start-to-finish guidance for building robust, high-performance networked systems in any environment: UNIX Network Programming, Volume 1, Third Edition. Building on the legendary work of W. Richard Stevens, this edition has been fully updated by two leading network programming experts to address today´s most crucial standards, implementations, and techniques. New topics include: POSIX Single UNIX Specification Version 3 IPv6 APIs (including updated guidance on IPv6/IPv4 interoperability) The new SCTP transport protocol IPsec-based Key Management Sockets FreeBSD 4.8/5.1, Red Hat Linux 9.x, Solaris 9, AIX 5.x, HP-UX, and Mac OS X implementations New network program debugging techniques Source Specific Multicast API, the key enabler for widespread IP multicast deployment The authors also update and extend Stevens´ definitive coverage of these crucial UNIX networking standards and techniques: TCP and UDP transport Sockets: elementary, advanced, routed, and raw I/O: multiplexing, advanced functions, nonblocking, and signal-driven Daemons and inetd UNIX domain protocols ioctl operations Broadcasting and multicasting Threads Streams Design: TCP iterative, concurrent, preforked, and prethreaded servers Since 1990, network programmers have turned to one source for the insights and techniques they need: W. Richard Stevens´ UNIX Network Programming . Now, there´s an edition specifically designed for today´s challenges--and tomorrow´s. Foreword. Preface. I. INTRODUCTION AND TCP/IP. 1. Introduction. Introduction. A Simple Daytime Client. Protocol Independence. Error Handling: Wrapper Functions. A Simple Daytime Server. Roadmap to Client/Server Examples in the Text. OSI Model. BSD Networking History. Test Networks and Hosts. Unix Standards. 64-Bit Architectures. Summary. 2. The Transport Layer: TCP, UDP, and SCTP. Introduction. The Big Picture. User Datagram Protocol (UDP). Transmission Control Protocol (TCP). Stream Control Transmission Protocol (SCTP). TCP Connection Establishment and Termination. TIME_WAIT State. SCTP Association Establishment and Termination. Port Numbers. TCP Port Numbers and Concurrent Servers. Buffer Sizes and Limitations. Standard Internet Services. Protocol Usage by Common Internet Applications. Summary. II. ELEMENTARY SOCKETS. 3. Sockets Introduction. Introduction. Socket Address

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Red Hat RHCSA/RHCE 7 Cert Guide
€ 62.99 *
ggf. zzgl. Versand

Red Hat RHCE®/RHCSA? 7 Cert Guide has a single goal: to help students pass the newest versions of Red Hat´s RHCE and RHCSA exams for Red Hat Enterprise Linux 7. The most comprehensive and time-efficient RHCE 7 / RHCSA 7 prep guide available, it´s an extraordinarily cost-effective alternative to expensive training. Written by a leading Red Hat trainer, consultant, and speaker, it presents focused, straight-to-the-point coverage of every exam topic. Product Description Red Hat RHCE®/RHCSA? 7 Cert Guide has a single goal: to help you pass the newest versions of Red Hat´s RHCE and RHCSA exams for Red Hat Enterprise Linux 7. The most comprehensive and time-efficient RHCE 7 / RHCSA 7 prep guide available, it´s an extraordinarily cost-effective alternative to expensive training. Authored by a leading Red Hat trainer, consultant, and speaker, it presents focused, straight-to-the-point coverage of every exam topic. Coverage includes: RHCSA: RHEL 7 Server installation, tools, file/folder management, text files, connectivity, users/groups, permissions, networking, processes, VMs, software installation, tasks, logging, partitions, LVMs, kernel management, Kickstart, boot procedures/troubleshooting, HTTP, SELinux, firewalls, FTP, and NTP RHCE: Connecting to iSCSI SANs, performance reporting, server optimization, log servers, routing configuration, authentication, command-line firewall management, SELinux services, web services, DNS, FTP, NFS, SMB, SMTP, SSH, and NTP From start to finish, this guide is organized to help you focus your study time where you need the most help, so you can retain more, and earn higher scores. It offers: Step-by-step chapter labs to help you practice what you´ve just learned

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
CompTIA Server+
€ 59.99 *
ggf. zzgl. Versand

Serverumgebungen planen, verwalten und Probleme beheben Erläuterungen zu allen Themen der aktuellen CompTIA-Server+-Prüfung SKO-004 Aktuell, verständlich, praxistauglich Die CompTIA Server+-Prüfung teilt sich in mehrere Fachgebiete auf. In der aktuellen Fassung der Prüfung SKO-004 lauten sie: Serverarchitektur Serveradministration Speicher Sicherheit Networking Wiederherstellung im Notfall Fehlersuche Die Autoren erläutern Ihnen diese Themen ausführlich und vermitteln Ihnen so das für die Zertifizierung benötigte Fachwissen. Darüber möchten Sie Ihnen praxistaugliches Verständnis der Thematik nahebringen. Das beginnt damit, dass Server nicht einfach aufgerüstete PCs sind und sich insbesondere in Konfiguration und Einsatz unterscheiden. Sie lernen in diesem Buch die Eigenschaften und Einsatzgebiete, sowohl was die Hardware als auch was die spezifischen Betriebssysteme und Applikationen von Servern anbelangt, gründlich kennen. Nicht zuletzt befassen sich die Autoren mit Themenvon der Planung über die physischen Umgebungsbedingungen bis hin zu aktuellen Themen wie der Virtualisierung, verschiedenen Fragen der Sicherheit, der Datensicherung und dem Disaster Recovery. Dieses Lehrmittel wurde für das CompTIA Authorized Curriculum geprüft und ist CAQC-zertifiziert. Weitere Informationen zu dieser Qualifizierung erhalten Sie unter: dem Inhalt: Server-Hardware: Prozessoren, Arbeitsspeicher, BIOS/UEFI Storagelösungen und -technologien: SSD, SAS, SATA, Fibre Channel, iSCSI Fehlertoleranz: RAID, Energieversorgung Server installieren und aktualisieren Hardware im Netzwerk: Kabel, Netzwerkkarten, Übertragungsgeräte TCP/IP: IPv4 und IPv6 Serverrollen: Datei- und Druckdienste, Internet- und Maildienste, Netzwerkdienste Netzwerkbetriebssysteme: Windows Server, UNIX/Linux und deren Installation Konfigurationsbetrachtungen: Dateisystem, Kontingentierung, Verzeichnisdienste, Gruppenrichtlinien Server Management: Remote-Verbindungen, Ereignisprotokolle, Monitoring, SNMP, WBEM Deployment- und Virtualisierungsszenarien Physische, technische und organisatorische Sicherheit Datensicherung in der Praxis Disaster Recovery Planning Unterhalt und Troubleshooting in der Praxis Die CompTIA Server+-Prüfung: Fragen, Antworten, Simulationstest

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Rapid GUI Programming with Python and Qt
€ 57.99 *
ggf. zzgl. Versand

The Insider´s Best-Practice Guide to Rapid PyQt 4 GUI Development Whether you´re building GUI prototypes or full-fledged cross-platform GUI applications with native look-and-feel, PyQt 4 is your fastest, easiest, most powerful solution. Qt expert Mark Summerfield has written the definitive best-practice guide to PyQt 4 development. With Rapid GUI Programming with Python and Qt you´ll learn how to build efficient GUI applications that run on all major operating systems, including Windows, Mac OS X, Linux, and many versions of Unix, using the same source code for all of them. Summerfield systematically introduces every core GUI development technique: from dialogs and windows to data handling; from events to printing; and more. Through the book´s realistic examples you´ll discover a completely new PyQt 4-based programming approach, as well as coverage of many new topics, from PyQt 4´s rich text engine to advanced model/view and graphics/view programming. Every key concept is illuminated with realistic, downloadable examples-all tested on Windows, Mac OS X, and Linux with Python 2.5, Qt 4.2, and PyQt 4.2, and on Windows and Linux with Qt 4.3 and PyQt 4.3. Coverge includes Python basics for every PyQt developer: data types, data structures, control structures, classes, modules, and more Core PyQt GUI programming techniques: dialogs, main windows, and custom file formats Using Qt Designer to design user interfaces, and to implement and test dialogs, events, the Clipboard, and drag-and-drop Building custom widgets: Widget Style Sheets, composite widgets, subclassing, and more Making the most of Qt 4.2´s new graphics/view architecture Connecting to databases, executing SQL queries, and using form and table views Advanced model/view programming: custom views, generic delegates, and more Implementing online help, internationalizing applications, and using PyQt´s networking and multithreading facilities

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Archos Arnova 10b 10 8GB [Wi-Fi] schwarz
€ 47.72 *
zzgl. € 3.99 Versand

Das ARNOVA 10 ist das perfekte Tablet für Ihren digitalen Lifestyle. Das 10 Display ermöglicht komfortables Surfen im Internet und die perfekte Darstellung von Apps und Multimedia-Inhalten in HD. Das ARNOVA 10 Tablet mit Android Eclair lässt sich durch eine Vielzahl an Applikationen individuell anpassen und bietet gute Leistung zu einem Top-Preis. Dank des 1024 Pixel breiten Displays, entfällt lästiges Zoomen und die meisten Webseiten werden in voller Breite dargestellt. Über WiFi haben Sie in jedem Raum Ihres Zuhauses oder von einem Hotspot aus Zugriff auf das Internet. Bleiben Sie erreichbar mit Apps für Social Networking und Chat, die integrierte Webcam ermöglicht die Nutzung von Videochat Applikationen. Mit der komfortablen virtuellen Tastatur schreiben Sie ganz bequem auf dem ARNOVA 10. Durch die komfortable Display-Größe und die Portabilität eignet sich das ARNOVA 10 auch als mobiles Büro. Verwenden Sie die USB-Host Schnittstelle, um eine Maus, eine Tastatur oder eine externe Flash-Festplatte anzuschließen. So bearbeiten Sie bequem Ihre Office-Dokumente. Lassen Sie Ihren PC ausgeschaltet und erledigen Sie viele Computer-Aufgaben einfach mit dem ARNOVA 10. Genießen Sie Ihre Multimedia-Dateien auf dem ARNOVA 10. Dieses Tablet beherrscht eine Vielzahl an Dateiformaten - egal, ob Sie Videos, Fotos oder Musik wiedergeben möchten. Entsprechende Videos können Sie sogar in HD-Qualität abspielen. Das ARNOVA 10 Tablet verfügt über eine USB-Schnittstelle, Multimedia-Dateien übertragen Sie einfach per Drag&Drop von Ihrem PC oder von einem USB Flash-Laufwerk mit dem vorinstallierten Datei-Manager. Neue Dateien werden in Sekundenschnelle erkannt. Dank des integrierten Musik-Players und vielfältiger Musik-Apps aus der AppsLib haben Sie Ihre Lieblingsmusik immer dabei. ARNOVA 10 - Tablet - Linux with Google Android 2.1 - 8 GB - 25.4 cm ( 10 ) TFT ( 1024 x 600 ) - Kamera auf Vorderseite - microSD-Steckplatz - Wi-Fi

Anbieter: trade-a-game
Stand: Sep 19, 2018
Zum Angebot
Wireshark for Security Professionals
€ 38.99 *
ggf. zzgl. Versand

Leverage Wireshark, Lua and Metasploit to solve any security challenge Wireshark is arguably one of the most versatile networking tools available, allowing microscopic examination of almost any kind of network activity. This book is designed to help you quickly navigate and leverage Wireshark effectively, with a primer for exploring the Wireshark Lua API as well as an introduction to the Metasploit Framework. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to any Infosec position, providing detailed, advanced content demonstrating the full potential of the Wireshark tool. Coverage includes the Wireshark Lua API, Networking and Metasploit fundamentals, plus important foundational security concepts explained in a practical manner. You are guided through full usage of Wireshark, from installation to everyday use, including how to surreptitiously capture packets using advanced MiTM techniques. Practical demonstrations integrate Metasploit and Wireshark demonstrating how these tools can be used together, with detailed explanations and cases that illustrate the concepts at work. These concepts can be equally useful if you are performing offensive reverse engineering or performing incident response and network forensics. Lua source code is provided, and you can download virtual lab environments as well as PCAPs allowing them to follow along and gain hands on experience. The final chapter includes a practical case study that expands upon the topics presented to provide a cohesive example of how to leverage Wireshark in a real world scenario. * Understand the basics of Wireshark and Metasploit within the security space * Integrate Lua scripting to extend Wireshark and perform packet analysis * Learn the technical details behind common network exploitation * Packet analysis in the context of both offensive and defensive security research Wireshark is the standard network analysis tool used across many industries due to its powerful feature set and support for numerous protocols. When used effectively, it becomes an invaluable tool for any security professional, however the learning curve can be steep. Climb the curve more quickly with the expert insight and comprehensive coverage in Wireshark for Security Professionals. Master Wireshark to solve real-world security problems If you don´t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark´s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book´s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: * Master the basics of Wireshark * Explore the virtual w4sp-lab environment that mimics a real-world network * Gain experience using the Debian-based Kali OS among other systems * Understand the technical details behind network attacks * Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark * Employ Lua to extend Wireshark features and create useful scripts To sum up, the book

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot