Stöbern Sie durch unsere Angebote (20 Treffer)

Kategorien

Shops [Filter löschen]

OSSEC Host-Based Intrusion Detection Guide [Wit...
€ 61.99 *
ggf. zzgl. Versand

A guide on the OSSEC Host-based Intrusion Detection system. It shows how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems. This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems. -- Stephen Northcutt OSSEC determines if a host has been compromised in this manner by taking the equivalent of a picture of the host machine in its original, unaltered state. This ´´picture´´ captures the most relevant information about that machine´s configuration. OSSEC saves this ´´picture´´ and then constantly compares it to the current state of that machine to identify anything that may have changed from the original configuration. Now, many of these changes are necessary, harmless, and authorized, such as a system administrator installing a new software upgrade, patch, or application. But, then there are the not-so-harmless changes, like the installation of a rootkit, trojan horse, or virus. Differentiating between the harmless and the not-so-harmless changes determines whether the system administrator or security professional is managing a secure, efficient network or a compromised network which might be funneling credit card numbers out to phishing gangs or storing massive amounts of pornography creating significant liability for that organization. Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS. As such, readers can be certain they are reading the most accurate, timely, and insightful information on OSSEC. Nominee for Best Book Bejtlich read in 2008! Get Started with OSSEC Get an overview of the features of OSSEC including commonly used terminology, pre-install preparation, and deployment considerations. . Follow Steb-by-Step Installation Instructions Walk through the installation process for the ´´local , ´´agent , and ´´server´´ install types on some of the most popular operating systems available. . Master Configuration Learn the basic configuration options for your install type and learn how to monitor log files, receive remote messages, configure email notification, and configure alert levels. . Work With Rules Extract key information from logs using decoders and how you can leverage rules to alert you of strange occurrences on your network. . Understand System Integrity Check and Rootkit Detection Monitor binary executable files, system configuration files, and the Microsoft Windows registry. . Configure Active Response Configure the active response actions you want and bind the actions to specific rules and sequence of events. . Use the OSSEC Web User Interface Install, configure, and use the community-developed, open source web interface available for OSSEC. . Play in the OSSEC VMware Environment Sandbox . Dig Deep into Data Log Mining Take the ´´high art of log analysis to the next level by breaking the dependence on the lists of strings or patterns to look for in the logs.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
In Camera: Perfect Pictures Straight Out of the...
€ 16.99 *
ggf. zzgl. Versand

Understand your camera´s capabilities. Master the skills of exposure, composition and focus. Take amazing photos; no post-processing, no Photoshop, just your own vision. With amazing low-light capabilities, incredible definition, intelligent autofocus and a host of other features, digital cameras have now become so powerful that they have left their users behind. Most photographers can take competent shots in a range of conditions, or fix imperfect exposures in Photoshop or Lightroom, but very few have the skill to push their cameras to the limit and capture the perfect shot, under all conditions, with no post-processing required. In Camera is the perfect way to take your photography to that level; to master your camera, understand light, exposure and composition, and make amazing photographs, whatever your camera, without cheating after the event. One hundred of Gordon´s beautiful photos are given with his own expert commentary; full settings and camera details are included, and a host of tips and tricks let photographers of any level learn something from every example. The shots are taken with a wide range of cameras, and the emphasis is on getting results by improving your own skills, not wasting money on expensive equipment.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
In Camera: Perfect Pictures Straight Out of the...
€ 3.99 *
ggf. zzgl. Versand

With amazing low-light capabilities, incredible definition, intelligent autofocus and a host of other features, digital cameras have now become so powerful that they have left their users behind. Most photographers can take competent shots in a range of conditions, or fix imperfect exposures in Photoshop or Lightroom, but very few have the skill to push their cameras to the limit and capture the perfect shot, under all conditions, with no post-processing required. In Camera is the perfect way to take your photography to that level; to master your camera, understand light, exposure and composition, and make amazing photographs, whatever your camera, without cheating after the event. One hundred of Gordon´s beautiful photos are given with his own expert commentary; full settings and camera details are included , and a host of tips and tricks let photographers of any level learn something from every example. The shots are taken with a wide range of cameras, and the emphasis is on getting results by improving your own skills , not wasting money on expensive equipment.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
LGBTI Asylum Seekers and Refugees from a Legal ...
€ 89.95 *
ggf. zzgl. Versand

This book addresses the ?three moments? in lesbian, gay, bisexual, transgender and intersex (LGBTI) asylum seekers? and refugees? efforts to secure protection: The reasons for their flight, the Refugee Status Determination process, and their integration into the host community once they are recognized refugee status. The first part discusses one of the most under-researched areas within the literature devoted to asylum claims based on sexual orientation and gender identity, namely the reasons behind LGBTI persons? flight. It investigates the motives that drive LGBTI persons to leave their countries of origin and seek sanctuary elsewhere, the actors of persecution, and the status quo of LGBTI rights. Accordingly, an intersectional approach is employed so as to offer a comprehensive picture of how a host of factors beyond sexual orientation/gender identity impact this crucial first stage of LGBTI asylum seekers? journey. In turn, the second part explores the challenges that LGBTI asylum seekers face during the RSD process in countries of asylum. It first examines these countries? interpretations and applications of the process in relation to the relevant UNHCR guidelines and questions the challenges including the dominance of Western conceptions and narratives of sexual identity in the asylum procedure, heterogeneous treatment concerning the definition of a particular social group, and the difficulties related to assessing one?s sexual orientation within the asylum procedure. It subsequently addresses the reasons for and potential solutions to these challenges. The last part of the book focuses on the integration of LGBTI refugees into the countries of asylum. It first seeks to identify and describe the protection gaps that LGBTI refugees are currently experiencing, before turning to the reasons and potential remedies for them.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
LGBTI Asylum Seekers and Refugees from a Legal ...
€ 107.99 *
ggf. zzgl. Versand

This book addresses the ´three moments´ in lesbian, gay, bisexual, transgender and intersex (LGBTI) asylum seekers´ and refugees´ efforts to secure protection: The reasons for their flight, the Refugee Status Determination process, and their integration into the host community once they are recognized refugee status. The first part discusses one of the most under-researched areas within the literature devoted to asylum claims based on sexual orientation and gender identity, namely the reasons behind LGBTI persons´ flight. It investigates the motives that drive LGBTI persons to leave their countries of origin and seek sanctuary elsewhere, the actors of persecution, and the status quo of LGBTI rights. Accordingly, an intersectional approach is employed so as to offer a comprehensive picture of how a host of factors beyond sexual orientation/gender identity impact this crucial first stage of LGBTI asylum seekers´ journey. In turn, the second part explores the challenges that LGBTI asylum seekers face during the RSD process in countries of asylum. It first examines these countries´ interpretations and applications of the process in relation to the relevant UNHCR guidelines and questions the challenges including the dominance of Western conceptions and narratives of sexual identity in the asylum procedure, heterogeneous treatment concerning the definition of a particular social group, and the difficulties related to assessing one´s sexual orientation within the asylum procedure. It subsequently addresses the reasons for and potential solutions to these challenges. The last part of the book focuses on the integration of LGBTI refugees into the countries of asylum. It first seeks to identify and describe the protection gaps that LGBTI refugees are currently experiencing, before turning to the reasons and potential remedies for them.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Lulu at the Zoo
€ 8.99 *
ggf. zzgl. Versand

Lulu is the perfect character to introduce preschoolers to first experiences. Join her as she spends a fun day at the zoo and meets a whole host of noisy animals. With an accessible tone, warm and reassuring text and interactive flaps to lift on every page, Lulu at the Zoo is the perfect introduction to exciting visits out and about.Popular, trusted and reassuring, the Lulu picture, novelty and board books make the perfect companion for inquisitive little minds.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Tokyo. Architectural Guide
€ 48.00 *
ggf. zzgl. Versand

Based on traditional construction, the ultra-modern high-tech architecture of the Japanese capital fascinates architectural aficionados across the world. This new guide is an indispensable companion for anyone seeking to explore one of the world´s largest and most complex cities which will play host to the Summer Olympics in 2020. Almost 300 of Tokyo´s most interesting buildings from the post-1945 era are introduced in pictures and informative texts. Plans and indices complete this user-friendly guide, with maps making buildings easy to locate despite construction ensuing at a dizzying pace. From the sea of neon lighting at the Shibuya Crossing to eccentric structures composed solely of timber beams, this guide to Tokyo illustrates its unrivalled breadth of extraordinary architecture.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Advanced Penetration Testing
€ 33.99 *
ggf. zzgl. Versand

Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World´s Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data--even from organizations without a direct Internet connection--this guide contains the crucial techniques that provide a more accurate picture of your system´s defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today´s threats operate at a much more complex level--and this book shows you how to defend your high security network. Use targeted social engineering pretexts to create the initial compromise Leave a command and control structure in place for long-term access Escalate privilege and breach networks, operating systems, and trust structures Infiltrate further using harvested credentials while expanding control Today´s threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Advanced Penetration Testing (eBook, ePUB)
€ 32.99 *
ggf. zzgl. Versand

Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World´s Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data--even from organizations without a direct Internet connection--this guide contains the crucial techniques that provide a more accurate picture of your system´s defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today´s threats operate at a much more complex level--and this book shows you how to defend your high security network. * Use targeted social engineering pretexts to create the initial compromise * Leave a command and control structure in place for long-term access * Escalate privilege and breach networks, operating systems, and trust structures * Infiltrate further using harvested credentials while expanding control Today´s threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot
Macroeconomic and Financial Analysis of Mega-Ev...
€ 54.99 *
ggf. zzgl. Versand

The objective of this book is twofold. Firstly, to construct a small macroeconometric simulation and forecasting model for the Greek economy, which then is used as an instrument to assess the economic effects of staging a mega sporting event. Secondly, to identify whether a stock exchange reaction to a mega sporting event announcement exists. In this work these issues are examined within the context of the Summer Olympic Games. The book offers a fair picture of economic modelling, a step-by-step explanation of the procedure and work involved in developing and using the models. The book could be of interest to economists as well as to the researchers in Olympic Games modelling, while the outcomes may also improve the information available to policy makers and potential future hosts of mega sporting events.

Anbieter: buecher.de
Stand: Dec 10, 2018
Zum Angebot