Angebote zu "Labs" (133 Treffer)

Kategorien

Shops

Principles of Computer Security Lab Manual, Fou...
42,99 € *
ggf. zzgl. Versand

Written by leading IT security educators and featuring 40+ challenging labs, this fully updated lab manual supplements Principles of Computer Security, Fourth Edition.

Anbieter: buecher
Stand: 02.06.2020
Zum Angebot
Computer Networks: Pearson New International Ed...
49,99 € *
ggf. zzgl. Versand

Appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire book - the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols. Networking Labs (Instructor bundle) This set of a dozen labs complements the textbook with hands-on exercises to let students explore the Internet protocols in a real-world setting. All the handouts and traces that students need to complete the exercises are included. The exercises run on Windows, Mac and Linux platforms, and may be used for labs, homeworks, and demonstrations. The protocols that are examined include Ethernet, 802.11, IP, ARP, ICMP, DHCP, UDP, TCP, HTTP, DNS and SSL. The labs also build useful skills by making use of popular networking tools including Wireshark, curl and wget, ping, traceroute, and dig. The instructor version of the labs includes solution handouts and source materials.

Anbieter: buecher
Stand: 02.06.2020
Zum Angebot
Computer Networks: Pearson New International Ed...
49,99 € *
ggf. zzgl. Versand

Appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments. Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire book - the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols. Networking Labs (Instructor bundle) This set of a dozen labs complements the textbook with hands-on exercises to let students explore the Internet protocols in a real-world setting. All the handouts and traces that students need to complete the exercises are included. The exercises run on Windows, Mac and Linux platforms, and may be used for labs, homeworks, and demonstrations. The protocols that are examined include Ethernet, 802.11, IP, ARP, ICMP, DHCP, UDP, TCP, HTTP, DNS and SSL. The labs also build useful skills by making use of popular networking tools including Wireshark, curl and wget, ping, traceroute, and dig. The instructor version of the labs includes solution handouts and source materials.

Anbieter: buecher
Stand: 02.06.2020
Zum Angebot
The Angel Playbook: An Essential Guide for Entr...
9,95 € *
ggf. zzgl. Versand

As an entrepreneur, your success depends on business communication skills. Whenever you make a powerful business presentation, deliver a winning pitch, or ace your business meeting, you have the potential to deliver a shot of financial adrenaline to your passion project. You can get the money you need to launch a startup, develop a business idea, or put investment capital to work and make investors happy. And who's listening to your pitch for money? An intelligent investor, who is always looking for new ventures that have a strong team, the potential to dominate a market, and a plan for future growth. That's the game of investing 101. But what do you do when the rules of the game change? With the advent of online investing in the form of equity crowdfunding, the JOBS Act opening the doors for new investors, and a new crop of startups reimagining and disrupting markets every day, there has never been a better time for entrepreneurs to raise money or for angel investors to seek new investments. With so much change, however, comes uncertainty. What angel investors and entrepreneurs need is a playbook, a manual that delivers the secret formula for financial success. That playbook has arrived. The Angel Playbook delivers the business communications techniques, methods, and mindset needed by entrepreneurs and angel investors to prosper and win. Experts interviewed for the Playbook include experienced angels like John Harbison of Tech Coast Angels; Kevin Laws, COO of AngelList; Pocket Sun of SoGal Ventures; and Ross Blankenship of Angel Kings. The success secrets of equity crowdfunding are revealed by Ron Miller of StartEngine and Aaron Pollak of Venture.co. Chris Bechtel of Growth Engine Labs talks about how new ventures get traction, and Jessica Mah of inDinero walks us through the process of sustaining early success. Startup founders and investors alike will benefit from the Playbook's advice on how 1. Language: English. Narrator: Bobby Brill. Audio sample: http://samples.audible.de/bk/acx0/087102/bk_acx0_087102_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 02.06.2020
Zum Angebot
Kali Linux Revealed
27,99 € *
ggf. zzgl. Versand

Kali Linux has not only become the information security professional's platform of choice, but evolved into an industrial-grade, and world-class operating system distribution-mature, secure, and enterprise-ready. Through the decade-long development process, Muts and his team, along with countless volunteers from the hacker community, have taken on the burden of streamlining and organizing our work environment, freeing us from much of the drudgery. They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world. An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali. However, the Kali team has never released an official Kali Linux manual, until now. In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information. Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.

Anbieter: buecher
Stand: 02.06.2020
Zum Angebot
Kali Linux Revealed
27,99 € *
ggf. zzgl. Versand

Kali Linux has not only become the information security professional's platform of choice, but evolved into an industrial-grade, and world-class operating system distribution-mature, secure, and enterprise-ready. Through the decade-long development process, Muts and his team, along with countless volunteers from the hacker community, have taken on the burden of streamlining and organizing our work environment, freeing us from much of the drudgery. They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world. An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali. However, the Kali team has never released an official Kali Linux manual, until now. In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information. Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.

Anbieter: buecher
Stand: 02.06.2020
Zum Angebot
Wireshark for Security Professionals
36,99 € *
ggf. zzgl. Versand

Leverage Wireshark, Lua and Metasploit to solve any security challengeWireshark is arguably one of the most versatile networking tools available, allowing microscopic examination of almost any kind of network activity. This book is designed to help you quickly navigate and leverage Wireshark effectively, with a primer for exploring the Wireshark Lua API as well as an introduction to the Metasploit Framework.Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to any Infosec position, providing detailed, advanced content demonstrating the full potential of the Wireshark tool. Coverage includes the Wireshark Lua API, Networking and Metasploit fundamentals, plus important foundational security concepts explained in a practical manner. You are guided through full usage of Wireshark, from installation to everyday use, including how to surreptitiously capture packets using advanced MiTM techniques. Practical demonstrations integrate Metasploit and Wireshark demonstrating how these tools can be used together, with detailed explanations and cases that illustrate the concepts at work. These concepts can be equally useful if you are performing offensive reverse engineering or performing incident response and network forensics. Lua source code is provided, and you can download virtual lab environments as well as PCAPs allowing them to follow along and gain hands on experience. The final chapter includes a practical case study that expands upon the topics presented to provide a cohesive example of how to leverage Wireshark in a real world scenario.* Understand the basics of Wireshark and Metasploit within the security space* Integrate Lua scripting to extend Wireshark and perform packet analysis* Learn the technical details behind common network exploitation* Packet analysis in the context of both offensive and defensive security researchWireshark is the standard network analysis tool used across many industries due to its powerful feature set and support for numerous protocols. When used effectively, it becomes an invaluable tool for any security professional, however the learning curve can be steep. Climb the curve more quickly with the expert insight and comprehensive coverage in Wireshark for Security Professionals.Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark's features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book's final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: * Master the basics of Wireshark * Explore the virtual w4sp-lab environment that mimics a real-world network * Gain experience using the Debian-based Kali OS among other systems * Understand the technical details behind network attacks * Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark * Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.

Anbieter: buecher
Stand: 02.06.2020
Zum Angebot
Wireshark for Security Professionals
36,99 € *
ggf. zzgl. Versand

Leverage Wireshark, Lua and Metasploit to solve any security challengeWireshark is arguably one of the most versatile networking tools available, allowing microscopic examination of almost any kind of network activity. This book is designed to help you quickly navigate and leverage Wireshark effectively, with a primer for exploring the Wireshark Lua API as well as an introduction to the Metasploit Framework.Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to any Infosec position, providing detailed, advanced content demonstrating the full potential of the Wireshark tool. Coverage includes the Wireshark Lua API, Networking and Metasploit fundamentals, plus important foundational security concepts explained in a practical manner. You are guided through full usage of Wireshark, from installation to everyday use, including how to surreptitiously capture packets using advanced MiTM techniques. Practical demonstrations integrate Metasploit and Wireshark demonstrating how these tools can be used together, with detailed explanations and cases that illustrate the concepts at work. These concepts can be equally useful if you are performing offensive reverse engineering or performing incident response and network forensics. Lua source code is provided, and you can download virtual lab environments as well as PCAPs allowing them to follow along and gain hands on experience. The final chapter includes a practical case study that expands upon the topics presented to provide a cohesive example of how to leverage Wireshark in a real world scenario.* Understand the basics of Wireshark and Metasploit within the security space* Integrate Lua scripting to extend Wireshark and perform packet analysis* Learn the technical details behind common network exploitation* Packet analysis in the context of both offensive and defensive security researchWireshark is the standard network analysis tool used across many industries due to its powerful feature set and support for numerous protocols. When used effectively, it becomes an invaluable tool for any security professional, however the learning curve can be steep. Climb the curve more quickly with the expert insight and comprehensive coverage in Wireshark for Security Professionals.Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark's features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book's final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: * Master the basics of Wireshark * Explore the virtual w4sp-lab environment that mimics a real-world network * Gain experience using the Debian-based Kali OS among other systems * Understand the technical details behind network attacks * Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark * Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.

Anbieter: buecher
Stand: 02.06.2020
Zum Angebot
Modern Biology: Biology Video Labs on DVD Lab M...
37,99 € *
ggf. zzgl. Versand

Modern Biology: Biology Video Labs on DVD Lab Manual with Answer Key ab 37.99 EURO Student

Anbieter: ebook.de
Stand: 02.06.2020
Zum Angebot