Computer networking and communications Books
John Wiley & Sons Inc Reliability and Availability of Cloud Computing
Book SynopsisThis book addresses IS/IT architects, developers, program managers, product managers, and quality managers who are considering or responsible for applications that will be virtualized or deployed on a cloud.Trade Review“For sure, specialists responsible for recommending, providing, or managing cloud platforms for either private or public cloud will profit with having this work on their shelf. I would also like to highly recommend this position for people new to the considered concepts of cloud computing or computer systems reliability as it provides an excellent background for the both areas.” (IEEE Communications Magazine, 1 October 2013) “Therefore, it will probably only be of real interest to those who are directly involved in improving or implementing their own systems in a cloud platform.” (Computing Reviews, 30 November 2012) Table of ContentsFigures xvii Tables xxi Equations xxiii Introduction xxv I BASICS 1 1 CLOUD COMPUTING 3 1.1 Essential Cloud Characteristics 4 1.2 Common Cloud Characteristics 6 1.3 But What, Exactly, Is Cloud Computing? 7 1.4 Service Models 9 1.5 Cloud Deployment Models 11 1.6 Roles in Cloud Computing 12 1.7 Benefi ts of Cloud Computing 14 1.8 Risks of Cloud Computing 15 2 VIRTUALIZATION 16 2.1 Background 16 2.2 What Is Virtualization? 17 2.3 Server Virtualization 19 2.4 VM Lifecycle 23 2.5 Reliability and Availability Risks of Virtualization 28 3 SERVICE RELIABILITY AND SERVICE AVAILABILITY 29 3.1 Errors and Failures 30 3.2 Eight-Ingredient Framework 31 3.3 Service Availability 34 3.4 Service Reliability 43 3.5 Service Latency 46 3.6 Redundancy and High Availability 50 3.7 High Availability and Disaster Recovery 56 3.8 Streaming Services 58 3.9 Reliability and Availability Risks of Cloud Computing 62 II ANALYSIS 63 4 ANALYZING CLOUD RELIABILITY AND AVAILABILITY 65 4.1 Expectations for Service Reliability and Availability 65 4.2 Risks of Essential Cloud Characteristics 66 4.3 Impacts of Common Cloud Characteristics 70 4.4 Risks of Service Models 72 4.5 IT Service Management and Availability Risks 74 4.6 Outage Risks by Process Area 80 4.7 Failure Detection Considerations 83 4.8 Risks of Deployment Models 87 4.9 Expectations of IaaS Data Centers 87 5 RELIABILITY ANALYSIS OF VIRTUALIZATION 90 5.1 Reliability Analysis Techniques 90 5.2 Reliability Analysis of Virtualization Techniques 95 5.3 Software Failure Rate Analysis 100 5.4 Recovery Models 101 5.5 Application Architecture Strategies 108 5.6 Availability Modeling of Virtualized Recovery Options 110 6 HARDWARE RELIABILITY, VIRTUALIZATION, AND SERVICE AVAILABILITY 116 6.1 Hardware Downtime Expectations 116 6.2 Hardware Failures 117 6.3 Hardware Failure Rate 119 6.4 Hardware Failure Detection 121 6.5 Hardware Failure Containment 122 6.6 Hardware Failure Mitigation 122 6.7 Mitigating Hardware Failures via Virtualization 124 6.8 Virtualized Networks 127 6.9 MTTR of Virtualized Hardware 129 6.10 Discussion 131 7 CAPACITY AND ELASTICITY 132 7.1 System Load Basics 132 7.2 Overload, Service Reliability, and Service Availability 135 7.3 Traditional Capacity Planning 136 7.4 Cloud and Capacity 137 7.5 Managing Online Capacity 144 7.6 Capacity-Related Service Risks 147 7.7 Capacity Management Risks 153 7.8 Security and Service Availability 157 7.9 Architecting for Elastic Growth and Degrowth 162 8 SERVICE ORCHESTRATION ANALYSIS 164 8.1 Service Orchestration Definition 164 8.2 Policy-Based Management 166 8.3 Cloud Management 168 8.4 Service Orchestration’s Role in Risk Mitigation 169 9 GEOGRAPHIC DISTRIBUTION, GEOREDUNDANCY, AND DISASTER RECOVERY 174 9.1 Geographic Distribution versus Georedundancy 175 9.2 Traditional Disaster Recovery 175 9.3 Virtualization and Disaster Recovery 177 9.4 Cloud Computing and Disaster Recovery 178 9.5 Georedundancy Recovery Models 180 9.6 Cloud and Traditional Collateral Benefits of Georedundancy 180 9.7 Discussion 182 III RECOMMENDATIONS 183 10 APPLICATIONS, SOLUTIONS, AND ACCOUNTABILITY 185 10.1 Application Configuration Scenarios 185 10.2 Application Deployment Scenario 187 10.3 System Downtime Budgets 188 10.4 End-to-End Solutions Considerations 197 10.5 Attributability for Service Impairments 201 10.6 Solution Service Measurement 204 10.7 Managing Reliability and Service of Cloud Computing 207 11 RECOMMENDATIONS FOR ARCHITECTING A RELIABLE SYSTEM 209 11.1 Architecting for Virtualization and Cloud 209 11.2 Disaster Recovery 216 11.3 IT Service Management Considerations 217 11.4 Many Distributed Clouds versus Fewer Huge Clouds 224 11.5 Minimizing Hardware-Attributed Downtime 225 11.6 Architectural Optimizations 231 12 DESIGN FOR RELIABILITY OF VIRTUALIZED APPLICATIONS 244 12.1 Design for Reliability 244 12.2 Tailoring DfR for Virtualized Applications 246 12.3 Reliability Requirements 248 12.4 Qualitative Reliability Analysis 256 12.5 Quantitative Reliability Budgeting and Modeling 259 12.6 Robustness Testing 260 12.7 Stability Testing 267 12.8 Field Performance Analysis 268 12.9 Reliability Roadmap 269 12.10 Hardware Reliability 270 13 DESIGN FOR RELIABILITY OF CLOUD SOLUTIONS 271 13.1 Solution Design for Reliability 271 13.2 Solution Scope and Expectations 273 13.3 Reliability Requirements 275 13.4 Solution Modeling and Analysis 279 13.5 Element Reliability Diligence 285 13.6 Solution Testing and Validation 285 13.7 Track and Analyze Field Performance 288 13.8 Other Solution Reliability Diligence Topics 292 14 SUMMARY 296 14.1 Service Reliability and Service Availability 297 14.2 Failure Accountability and Cloud Computing 299 14.3 Factoring Service Downtime 301 14.4 Service Availability Measurement Points 303 14.5 Cloud Capacity and Elasticity Considerations 306 14.6 Maximizing Service Availability 306 14.7 Reliability Diligence 309 14.8 Concluding Remarks 310 Abbreviations 311 References 314 About the Authors 318 Index 319
£70.16
John Wiley & Sons Inc iOS Hackers Handbook
Book SynopsisDiscover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple''s mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it. Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks Also examines kernel debugging and exploitation Companion website includesTable of ContentsIntroduction xv Chapter 1 iOS Security Basics 1 Chapter 2 iOS in the Enterprise 15 Chapter 3 Encryption 47 Chapter 4 Code Signing and Memory Protections 69 Chapter 5 Sandboxing 107 Chapter 6 Fuzzing iOS Applications 139 Chapter 7 Exploitation 185 Chapter 8 Return-Oriented Programming 219 Chapter 9 Kernel Debugging and Exploitation 249 Chapter 10 Jailbreaking 297 Chapter 11 Baseband Attacks 327 Appendix References 365 Index 369
£26.24
John Wiley & Sons Inc Information Overload
Book SynopsisThis book covers the ever-increasing problem of information overload from both the professional and academic perspectives. Focusing on the needs of practicing engineers and professional communicators, it addresses the causes and costs of information overload, along with strategies and techniques for reducing and minimizing its negative effects. The theoretical framework of information overload and ideas for future research are also presented. The book brings together an international group of authors, providing a truly global point of view on this important, rarely covered topic.Table of ContentsList of Practical Insights from Corporations xv List of Figures xvii List of Tables xix Foreword xxi Preface xxvii Acknowledgments xxix A Note from the Series Editor xxxi Contributors xxxiii About the Editors xxxvii 1 INFORMATION OVERLOAD: AN INTERNATIONAL CHALLENGE TO PROFESSIONAL ENGINEERS AND TECHNICAL COMMUNICATORS 1 Judith B. Strother, Jan M. Ulijn, and Zohra Fazal 1.1 Definitions, Causes, and Consequences of Information Overload 1 1.1.1 Definitions of Information Overload 1 1.1.2 Causes of Information Overload 2 1.1.3 Consequences of Information Overload 3 1.2 Perspectives on the Concept of Information Overload 4 1.2.1 An Information and Time-Management Perspective 5 1.2.2 A Supplier/Producer/Writer and Client/User/Reader Perspective 5 1.2.3 An International/Intercultural Perspective 7 1.2.4 An Innovation Perspective 7 1.3 Readers of this Book 7 1.4 Structure of this Book 8 1.4.1 Section I: Causes and Costs of Information Overload 8 1.4.2 Section II: Control and Reduction of Information Overload 10 References 11 SECTION I. CAUSES AND COSTS OF INFORMATION OVERLOAD 2 OF TIME MAGAZINE, 24/7 MEDIA, AND DATA DELUGE: THE EVOLUTION OF INFORMATION OVERLOAD THEORIES AND CONCEPTS 15 Debashis “Deb” Aikat and David Remund 2.1 Introduction 16 2.2 Theory and Concept of Information Overload 16 2.3 Information Overload as a Twentieth Century Phenomenon 17 2.4 Evolution of Information and Its Proliferation in Society 21 2.4.1 The Early Quest for Information and Knowledge (320 BCE–Thirteenth Century) 21 2.4.2 The Age of Renaissance (Fourteenth–Seventeenth Century) and the Printing Press 22 2.4.3 The Industrial Revolution (Eighteenth–Nineteenth Century) and Its Information Innovations 23 2.4.4 The Era of the Mind and the Machine (Twentieth Century) 24 2.4.5 Internet Boom and Information Explosion of the 1990s 27 2.4.6 Data Deluge and Information Overload in the Twenty-First Century Digital Age 28 2.5 Information Overload Concepts 29 2.5.1 Definitions of Information Overload and Related Concepts 29 2.5.2 The Context of Information Overload 30 2.5.3 Causes and Consequences of Information Overload 31 2.6 Conclusion and Four Lessons Learned 32 Acknowledgment 33 References 33 PRACTICAL INSIGHTS FROM IBM 39 3 THE CHALLENGE OF INFORMATION BALANCE IN THE AGE OF AFFLUENT COMMUNICATION 41 Paulus Hubert Vossen 3.1 Introduction 42 3.2 Quantitative Aspects of Information Overload 43 3.3 Qualitative Aspects of Information Overload 45 3.3.1 Philosophical Perspective: Information in Science and Technology 45 3.3.2 Political Perspective: Information in Modern Society and a Global World 46 3.3.3 Economic Perspective: Information as a Commodity on the Market 47 3.3.4 Societal Perspective: Information as the Glue Between Communities 48 3.3.5 Psychological Perspective: Information as a Basis for Knowing and Acting 49 3.3.6 Ecological Perspective: Information as a Prerequisite for Living Creatures 50 3.4 Conclusion 51 3.5 A Call for Fundamental Research 52 References 53 PRACTICAL INSIGHTS FROM XEROX 55 Xerox Takes on Information Overload 55 Identifying the Problem 55 Sharing Information 56 Sorting Information 57 Cutting Through the Clutter 57 Life-Saving Software 58 Urban Central Nervous System 58 4 FROM CAVE WALL TO TWITTER: ENGINEERS AND TECHNICAL COMMUNICATORS AS INFORMATION SHAMAN FOR DIGITAL TRIBES 61 Anne Caborn and Cary L. Cooper 4.1 Introduction: The Dawn of the Information Shaman 62 4.2 The Magic of Metaphor 64 4.3 The Audience: The Emergence of Digital Tribes 65 4.4 Quill to Keyboard: The Writer and New Media 66 4.5 Helping the Reader: Techniques for the Information Shaman 68 4.6 The Magic of Hypertext Techniques: Journeys at the Speed of Thought 70 4.7 Conclusion: The Responsibilities of the Information Shaman 72 References 73 PRACTICAL INSIGHTS FROM THE LIMBURG MEDIA GROUP 75 Newspaper Position in The Netherlands 76 Managing Information Overload Using an Evolutionary Approach 76 A Revolutionary Perspective 77 5 THE INFLUENCE OF CULTURE ON INFORMATION OVERLOAD 79 Jan M. Ulijn and Judith B. Strother 5.1 Introduction 80 5.2 Levels of Culture 81 5.3 Cultural Patterns of Discourse Organization 82 5.4 High Context Versus Low Context 83 5.5 Internationalization Versus Localization 85 5.5.1 Latin America 86 5.5.2 Japan 87 5.5.3 China 87 5.6 The Effect of Professional Culture 88 5.7 Japan and U.S. Discourse Structures 91 5.8 Cultural Issues in Reader Versus Writer Responsibility 92 5.9 Implications for Engineers and Technical Communicators and Their Corporations 93 5.10 Conclusion 95 References 95 PRACTICAL INSIGHTS FROM A2Z GLOBAL LANGUAGES 99 6 EFFECT OF COLOR, VISUAL FORM, AND TEXTUAL INFORMATION ON INFORMATION OVERLOAD 103 No€el T. Alton and Alan Manning 6.1 Introduction 104 6.2 Previous Studies of Decorative and Indicative Effects 106 6.3 Experiments and Results 111 6.3.1 Study One: Restaurant Menu Design 112 6.3.2 Study Two: Graph Design and Recall Accuracy 114 6.3.3 Study Three: Diagram Design and Recall Accuracy 116 6.4 Practical Implications for Engineers and Technical Communicators 117 6.5 Conclusion 119 References 121 PRACTICAL INSIGHTS FROM APPLIED GLOBAL TECHNOLOGIES 123 7 COST OF INFORMATION OVERLOAD IN END-USER DOCUMENTATION 125 Prasanna Bidkar 7.1 Introduction 126 7.2 Information Overload 126 7.3 Causes of Information Overload 128 7.4 Sources of Noise in User Documentation 129 7.4.1 Information Content 129 7.4.2 Channel 130 7.4.3 Receiver 131 7.5 Effects of Information Overload on Users 132 7.6 The Current Study 133 7.6.1 The Survey 133 7.6.2 Results and Observations 133 7.7 Cost of Information Overload 135 7.7.1 Cost Framework 135 7.7.2 Scenario 1: Ideal Scenario 136 7.7.3 Scenario 2 136 7.7.4 Scenario 3 136 7.7.5 Scenario 4 136 7.7.6 An Example from the User’s Perspective: Denim Corp 137 7.7.7 An Example from the Producer’s Perspective: Logistics Corp 137 7.8 Conclusion 138 References 139 PRACTICAL INSIGHTS FROM HARRIS CORPORATION 141 Sources of Information Overload 141 Strategies for Dealing with Information Overload 142 SECTION II. CONTROL AND REDUCTION OF INFORMATION OVERLOAD: EMPIRICAL EVIDENCE 8 TAMING THE TERABYTES: A HUMAN-CENTERED APPROACH TO SURVIVING THE INFORMATION DELUGE 147 Eduard Hoenkamp 8.1 Introduction 148 8.2 Reducing Information Overload by Being Precise About What We Ask for 150 8.2.1 Conversational Query Elaboration to Discover Support Groups 150 8.2.2 Constructing Verbose Queries Automatically During a Presentation 151 8.3 Steering Clear of Information Glut Through Live Visual Feedback 152 8.4 Improving Search Engines by Making Them Human Centered 156 8.4.1 Case 1: The Basic Level Category 158 8.4.2 Case 2: The Complex Nominal 162 8.4.3 Case 3: Exploiting Natural Language Properties 165 8.5 Conclusion 167 Acknowledgments 167 References 168 PRACTICAL INSIGHTS FROM THE LABORATORY FOR QUALITY SOFTWARE 171 References 173 9 TECHNOLOGIES FOR DEALING WITH INFORMATION OVERLOAD: AN ENGINEER’S POINT OF VIEW 175 Toon Calders, George H. L. Fletcher, Faisal Kamiran, and Mykola Pechenizkiy 9.1 Introduction 176 9.2 Information Overload: Challenges and Opportunities 177 9.3 Storing and Querying Semistructured Data 179 9.3.1 XML as a Data Format for Semistructured Data 180 9.3.2 RDF as a Data Format for Semistructured Data 181 9.3.3 Remarks on the Use of XML and RDF 183 9.4 Techniques for Retrieving Information 183 9.5 Mining Large Databases for Extracting Information 187 9.6 Processing Data Streams 190 9.7 Summary 190 References 191 PRACTICAL INSIGHTS FROM THE COLLEGE OF AERONAUTICS, FLORIDA INSTITUTE OF TECHNOLOGY 195 From Data to Information to Situational Awareness to Decisions 196 Transformative Airspace Architecture 197 Robust, Agile, and Intelligently Responsive Information-Sharing Architecture 197 Next Generation Efforts to Manage Information 198 Distributed Decision Making 199 System-Wide Information Management (SWIM) 200 Shared Situation Awareness and Collaborative Decision Making 201 Automation and Information in the NAS 201 Summary 201 References 202 10 VISUALIZING INSTEAD OF OVERLOADING: EXPLORING THE PROMISE AND PROBLEMS OF VISUAL COMMUNICATION TO REDUCE INFORMATION OVERLOAD 203 Jeanne Mengis and Martin J. Eppler 10.1 The Qualitative Side of Information Overload 204 10.2 Causes of Information Overload 206 10.3 How Information Visualization Can Improve the Quality of Information and Reduce Information Overload 208 10.4 Using Visualization in Practice: Understanding the Knowing–Doing Gap 209 10.5 Methods and Context of the Study 211 10.5.1 Measures 211 10.5.2 Procedure and Analysis 213 10.6 Indications of the Knowing–Doing Gap: Visuals Are Valued, but Poorly Used 214 10.7 Understanding the Knowing–Doing Gap with TAM 214 10.8 Discussion 216 10.9 Conclusion 217 10.10 Future Research Directions 218 10A.1 Appendix 219 References 222 PRACTICAL INSIGHTS FROM ALVOGEN 227 The Challenges of Information Overload 227 Strategies for Dealing with Information Overload 228 11 DROWNING IN DATA: A REVIEWOF INFORMATION OVERLOAD WITHIN ORGANIZATIONS AND THE VIABILITY OF STRATEGIC COMMUNICATION PRINCIPLES 231 David Remund and Debashis “Deb” Aikat 11.1 Introduction 232 11.2 Defining Information Overload within Organizations 232 11.3 Evolution of the Information Overload Concept in Organizations 234 11.4 Implications of Information Overload within Organizations 235 11.4.1 Organizational Implications 235 11.4.2 Employee Implications 237 11.5 Traditional Strategies for Addressing Information Overload 238 11.5.1 Organizational Strategies 238 11.5.2 Individual Strategies 239 11.6 Strategic Communication Principles: A Viable Solution? 240 11.7 Putting Strategic Communication into Practice 242 11.8 Further Research 243 11.9 Conclusion 243 References 243 PRACTICAL INSIGHTS FROM THE DUTCH EMPLOYERS’ ASSOCIATION 247 Acting as an Information Resource 248 Focusing on the Added Value of Information 248 Co-Creating Added Value in Interaction with Companies 249 A Final Observation 250 References 250 12 BLINDFOLDED THROUGH THE INFORMATION HURRICANE? A REVIEW OF A MANAGER’S STRATEGY TO COPE WITH THE INFORMATION PARADOX 251 Arjen Verhoeff 12.1 Introduction 252 12.2 Decomposing the Information Paradox 253 12.2.1 The Control of the Internal Information Process 253 12.2.2 The Control of the External Information Process 254 12.3 A Framework to Analyze the Information Paradox 255 12.3.1 Do Managers Experience Issues Regarding Information? 257 12.3.2 Do Managers Use an Information Strategy? 257 12.3.3 Do Managers Use a Strategy to Transform Information into Added Value? 257 12.4 Illustrating the Framework with Some Dutch Empirical Evidence 258 12.4.1 The Importance of an Information Strategy 258 12.4.2 Preliminary Survey Among Dutch Managers 259 12.5 Discussion and Conclusion: Lessons in Information Strategy 260 12.5.1 Discussion 260 12.5.2 Methodological Grounding 261 12.5.3 Learning Points 261 12.5.4 Applied Innovative Directions 262 12.5.5 Toward an Innovative Research Agenda 264 12.5.6 General Conclusion 264 References 265 List of References for Boxed Quotations 267 Author Index 269 Subject Index 275
£44.06
John Wiley & Sons Inc Communication Practices in Engineering
Book SynopsisSafety continues to be a primary concern in the food, water, and pharmaceutical industries. Written by experts in food, drug, and water safety, this book examines some of the ways in which communication has affected safety issues in the recent past and encourages discussions about what improvements can be made.Table of ContentsA Note from the Series Editor ix Preface xi List of Contributors xiii Acknowledgments xv 1 Cowboys and Computers: Communicating National Animal Identification in the Beef Industry 1David Wright 1.1 Industries Collide 1 1.1.1 Resistance to Technology in the Beef Industry 3 1.1.2 Having a Cow over Mad Cow Disease 3 1.1.3 Change Is Slow in the Beef Industry 6 1.1.4 Communication Breakdowns and Coffee Shop Policymaking 7 1.1.5 Can We All Just Get Along? 9 1.1.6 USDA Strategies for Communication 10 1.2 A New Approach to Studying Complex Communication Issues 11 1.2.1 Ethnography and Diffusion in the Beef Supply Chain 13 1.2.2 Communication Theory Linguistics and Diffusion in the Beef Supply Chain 16 1.2.3 Linguistic Textual Analysis 19 1.2.4 Diffusing Innovations in the Real World 23 1.2.5 Diffusion and Communication Networks 24 1.3 Results of My Investigation 25 1.3.1 Alice at the Auction 26 1.3.2 Backstage at the Sale Barn 27 1.3.3 Buying the NAIS 29 1.3.4 Down on the Farm 30 1.3.5 Interviews with Members of the Beef Industry 32 1.3.6 Interviews with Livestock Market Owners 33 1.3.7 Rules from the Road 38 1.3.8 Communication Gaps and Communication Theory 40 1.3.9 Textual Analysis with Implicature and Pragmatics 48 1.4 Lessons of Beef and Bandwidth 49 1.4.1 No Pardon for Jargon 51 1.4.2 Alice Is Not in Wonderland 52 1.4.3 The Telephone Game Still Happens 53 1.4.4 It All Comes Down to Doin’ Business 54 1.4.5 What We Have Here Is a Failure to Communicate 56 1.4.6 Culture Is King 58 1.4.7 The Situation Now 59 References 60 2 Children Communicating Food Safety/Teaching Technical Communication to Children: Opportunities Gleaned from the FIRST® LEGO® League 2011 Food Factor Challenge 63Edward A. Malone and Havva Tezcan-Malone 2.1 Enhancing the Visibility and Recognition of Technical Communication 63 2.2 Literature Review: Teaching Technical Communication Engineering and Food Safety to Children 65 2.3 Background: The League the Challenge and the Team 67 2.3.1 First Lego League 67 2.3.2 The Food Factor Challenge 69 2.3.3 The Team: Global Dreamers 70 2.4 Examples of Technical Communication Activities in FLL Projects 71 2.4.1 Branding (Creating a Name and Logo) 72 2.4.2 Conducting Primary and Secondary Research 72 2.4.3 Giving Presentations and Demonstrations 74 2.4.4 Designing a Document 77 2.5 The Food Factor Challenge as a Model of Food-Safety Education 77 2.5.1 Fostering Food-Safety Habits in Children 78 2.5.2 Promoting Dialogue Rather Than Monologue 79 2.5.3 Generating Interest in Food-Safety Careers 79 2.6 Conclusion 80 Acknowledgments 81 References 81 3 The Role of Public (Mis)perceptions in the Acceptance of New Food Technologies: Implications for Food Nanotechnology Applications 89Mary L. Nucci and William K. Hallman 3.1 Accepting New Foods: Consumers Technology and Media 89 3.1.1 Food Technology Acceptance 90 3.1.2 The Role of the Media in Public Perceptions of Food Technologies 92 3.2 Nanotechnology: Unseen Unknown 95 3.2.1 Nanotechnology in the Media 96 3.2.2 Public Perceptions of Nanotechnology 96 3.2.3 Perceptions and Acceptance of Nanotechnology 97 3.3 Discussing New Food Technologies 101 Acknowledgments 103 References 103 4 The New Limeco Story: How One Produce Company Used Third-Party Food Safety Audit Scores to Improve Its Operation 119Roy E. Costa 4.1 Food Safety in Modern Food Supply Operations 119 4.2 Safety Audits Cause Some Level of Controversy 122 4.3 New Limeco’s Journey to Safety 122 4.3.1 Implementing Changes 124 4.3.2 Sanitation Issues 125 4.3.3 Gradual Safety Improvement 125 References 126 5 Communication Practices by Way of Permits and Policy: Do Environmental Regulations Promote Sustainability in the Real World? 129Becca Cammack 5.1 Communication in the Modern Environmental Movement 129 5.2 Background 130 5.2.1 Who Is on the Receiving End of Environmental Regulation? 131 5.2.2 What Are the Effects of Construction and Storm Water on the Environment? 131 5.3 Studying Groundwater Regulation 133 5.3.1 Textual Analysis 133 5.3.2 Case Study 134 5.4 Results of My Investigation 134 5.4.1 The CGP Fact Sheet Background Section 135 5.4.2 The CGP Rationale Section 136 5.4.3 Construction General Permit (CGP) 136 5.4.4 A Targeted Case Study of CGP 137 5.5 Discussion of Study Results 142 References 144 6 Influences of Technical Documentation and Its Translation on Efficiency and Customer Satisfaction 145Elena Sperandio 6.1 Considering Technical Documentation 145 6.1.1 The Problem with Integrating Systems 146 6.1.2 Enterprise Resource Planning Systems 147 6.1.3 Production Information Management Systems 148 6.1.4 Document Management Systems/Content Management Systems 148 6.1.5 Translation Memory Systems/Computer-Aided Translation 149 6.2 Data Management in Technical Communication 150 6.2.1 Development and Diffusion of Data Management Tools 150 6.3 Technical Communication in Small Companies 153 6.3.1 Workflow Advantages in Small Companies 153 6.3.2 Workflow Disadvantages in Small Companies 154 6.4 Technical Communication in Medium-Sized Companies 154 6.4.1 Workflow Advantages in Medium-Sized Companies 155 6.4.2 Workflow Disadvantages in Medium-Sized Companies 156 6.5 Technical Communication in Large Companies 156 6.5.1 Workflow Advantages in Large Companies 158 6.5.2 Workflow Disadvantages in Large Companies 159 6.6 Translation of Technical Information 159 6.6.1 Translations in Small Companies 160 6.6.2 Translations in Medium-Sized Companies 162 6.6.3 Translations in Large Companies 163 6.7 Consequences for Technical Communication 165 6.8 Assumptions About Technical Communication 166 6.9 Outlook 168 References 169 7 Communicating Food Through Muckraking: Ethics Food Engineering and Culinary Realism 171Kathryn C. Dolan 7.1 Muckraking and Promoting Food Safety 172 7.2 Culinary Realism and Food Safety 173 7.2.1 Tubercular Beef in The Jungle 174 7.3 High Fructose Corn Syrup in The Omnivore’s Dilemma and In Defense of Food 179 7.4 Literature as a Watchdog in Food Safety 184 7.5 The Effects of Literature on Everyday Practices 186 References 186 Index 189
£38.66
John Wiley & Sons Inc Red Hat Enterprise Linux 6 Administration
Book SynopsisThe definitive guide to administering a Red Hat Enterprise Linux 6 network Linux professionals who need a go-to guide on version 6 of Red Hat Enterprise Linux (RHEL) will find what they need in this comprehensive Sybex book. It covers RHEL administration in detail, including how to set up and manage web and mail services, use RHEL in enterprise environments, secure it, optimize storage, configure for virtualization and high availability, and much more. It also provides a great study aid for those preparing for either the RHCSA or RHCE certification exam. Red Hat is the Linux market leader, and Red Hat administrators are in demand This Sybex guide is a comprehensive resource on Red Hat Enterprise Linux administration and useful for those preparing for one of the Red Hat certification exams Covers setting up and managing web and mail services, using RHEL in enterprise environments, securing RHEL, and optimizing storage to fit your environmeTable of ContentsIntroduction xxvii Assessment Test xxxiii Part I Getting Familiar with Red Hat Enterprise Linux 1 Chapter 1 Getting Started with Red Hat Enterprise Linux 3 Chapter 2 Finding Your Way on the Command Line 41 Part II Administering Red Hat Enterprise Linux 67 Chapter 3 Performing Daily System Administration Tasks 69 Chapter 4 Managing Software 99 Chapter 5 Configuring and Managing Storage 121 Chapter 6 Connecting to the Network 155 Part III Securing Red Hat Enterprise Linux 187 Chapter 7 Working with Users, Groups, and Permissions 189 Chapter 8 Understanding and Configuring SELinux 229 Chapter 9 Working with KVM Virtualization 245 Chapter 10 Securing Your Server with iptables 269 Chapter 11 Setting Up Cryptographic Services 293 Part IV Networking Red Hat Enterprise Linux 313 Chapter 12 Configuring OpenLDAP 315 Chapter 13 Configuring Your Server for File Sharing 333 Chapter 14 Configuring DNS and DHCP 355 Chapter 15 Setting Up a Mail Server 375 Chapter 16 Configuring Apache on Red Hat Enterprise Linux 385 Part V Advanced Red Hat Enterprise Linux Configuration 411 Chapter 17 Monitoring and Optimizing Performance 413 Chapter 18 Introducing Bash Shell Scripting 467 Chapter 19 Understanding and Troubleshooting the Boot Procedure 505 Chapter 20 Introducing High-Availability Clustering 529 Chapter 21 Setting Up an Installation Server 561 Glossary 577 Appendix A Hands-On Labs 595 Appendix B Answers to Hands-On Labs 607 Index 625
£40.38
John Wiley & Sons Inc Evolutionary Algorithms for Mobile Ad Hoc
Book SynopsisThis comprehensive guide describes how evolutionary algorithms (EA) may be used to identify, model, and optimize day-to-day problems that arise for researchers in optimization and mobile networking.Table of ContentsPreface xiii PART I BASIC CONCEPTS AND LITERATURE REVIEW 1 1 INTRODUCTION TO MOBILE AD HOC NETWORKS 3 1.1 Mobile Ad Hoc Networks 6 1.2 Vehicular Ad Hoc Networks 9 1.2.1 Wireless Access in Vehicular Environment (WAVE) 11 1.2.2 Communication Access for Land Mobiles (CALM) 12 1.2.3 C2C Network 13 1.3 Sensor Networks 14 1.3.1 IEEE 1451 17 1.3.2 IEEE 802.15.4 17 1.3.3 ZigBee 18 1.3.4 6LoWPAN 19 1.3.5 Bluetooth 19 1.3.6 Wireless Industrial Automation System 20 1.4 Conclusion 20 References 21 2 INTRODUCTION TO EVOLUTIONARY ALGORITHMS 27 2.1 Optimization Basics 28 2.2 Evolutionary Algorithms 29 2.3 Basic Components of Evolutionary Algorithms 32 2.3.1 Representation 32 2.3.2 Fitness Function 32 2.3.3 Selection 32 2.3.4 Crossover 33 2.3.5 Mutation 34 2.3.6 Replacement 35 2.3.7 Elitism 35 2.3.8 Stopping Criteria 35 2.4 Panmictic Evolutionary Algorithms 36 2.4.1 Generational EA 36 2.4.2 Steady-State EA 36 2.5 Evolutionary Algorithms with Structured Populations 36 2.5.1 Cellular EAs 37 2.5.2 Cooperative Coevolutionary EAs 38 2.6 Multi-Objective Evolutionary Algorithms 39 2.6.1 Basic Concepts in Multi-Objective Optimization 40 2.6.2 Hierarchical Multi-Objective Problem Optimization 42 2.6.3 Simultaneous Multi-Objective Problem Optimization 43 2.7 Conclusion 44 References 45 3 SURVEY ON OPTIMIZATION PROBLEMS FOR MOBILE AD HOC NETWORKS 49 3.1 Taxonomy of the Optimization Process 51 3.1.1 Online and Offline Techniques 51 3.1.2 Using Global or Local Knowledge 52 3.1.3 Centralized and Decentralized Systems 52 3.2 State of the Art 53 3.2.1 Topology Management 53 3.2.2 Broadcasting Algorithms 58 3.2.3 Routing Protocols 59 3.2.4 Clustering Approaches 63 3.2.5 Protocol Optimization 64 3.2.6 Modeling the Mobility of Nodes 65 3.2.7 Selfish Behaviors 66 3.2.8 Security Issues 67 3.2.9 Other Applications 67 3.3 Conclusion 68 References 69 4 MOBILE NETWORKS SIMULATION 79 4.1 Signal Propagation Modeling 80 4.1.1 Physical Phenomena 81 4.1.2 Signal Propagation Models 85 4.2 State of the Art of Network Simulators 89 4.2.1 Simulators 89 4.2.2 Analysis 92 4.3 Mobility Simulation 93 4.3.1 Mobility Models 93 4.3.2 State of the Art of Mobility Simulators 96 4.4 Conclusion 98 References 98 PART II PROBLEMS OPTIMIZATION 105 5 PROPOSED OPTIMIZATION FRAMEWORK 107 5.1 Architecture 108 5.2 Optimization Algorithms 110 5.2.1 Single-Objective Algorithms 110 5.2.2 Multi-Objective Algorithms 115 5.3 Simulators 121 5.3.1 Network Simulator: ns-3 121 5.3.2 Mobility Simulator: SUMO 123 5.3.3 Graph-Based Simulations 126 5.4 Experimental Setup 127 5.5 Conclusion 131 References 131 6 BROADCASTING PROTOCOL 135 6.1 The Problem 136 6.1.1 DFCN Protocol 136 6.1.2 Optimization Problem Definition 138 6.2 Experiments 140 6.2.1 Algorithm Configurations 140 6.2.2 Comparison of the Performance of the Algorithms 141 6.3 Analysis of Results 142 6.3.1 Building a Representative Subset of Best Solutions 143 6.3.2 Interpretation of the Results 145 6.3.3 Selected Improved DFCN Configurations 148 6.4 Conclusion 150 References 151 7 ENERGY MANAGEMENT 153 7.1 The Problem 154 7.1.1 AEDB Protocol 154 7.1.2 Optimization Problem Definition 156 7.2 Experiments 159 7.2.1 Algorithm Configurations 159 7.2.2 Comparison of the Performance of the Algorithms 160 7.3 Analysis of Results 161 7.4 Selecting Solutions from the Pareto Front 164 7.4.1 Performance of the Selected Solutions 167 7.5 Conclusion 170 References 171 8 NETWORK TOPOLOGY 173 8.1 The Problem 175 8.1.1 Injection Networks 175 8.1.2 Optimization Problem Definition 176 8.2 Heuristics 178 8.2.1 Centralized 178 8.2.2 Distributed 179 8.3 Experiments 180 8.3.1 Algorithm Configurations 180 8.3.2 Comparison of the Performance of the Algorithms 180 8.4 Analysis of Results 183 8.4.1 Analysis of the Objective Values 183 8.4.2 Comparison with Heuristics 185 8.5 Conclusion 187 References 188 9 REALISTIC VEHICULAR MOBILITY 191 9.1 The Problem 192 9.1.1 Vehicular Mobility Model 192 9.1.2 Optimization Problem Definition 196 9.2 Experiments 199 9.2.1 Algorithms Configuration 199 9.2.2 Comparison of the Performance of the Algorithms 200 9.3 Analysis of Results 202 9.3.1 Analysis of the Decision Variables 202 9.3.2 Analysis of the Objective Values 204 9.4 Conclusion 206 References 206 10 SUMMARY AND DISCUSSION 209 10.1 A New Methodology for Optimization in Mobile Ad Hoc Networks 211 10.2 Performance of the Three Algorithmic Proposals 213 10.2.1 Broadcasting Protocol 213 10.2.2 Energy-Efficient Communications 214 10.2.3 Network Connectivity 214 10.2.4 Vehicular Mobility 215 10.3 Global Discussion on the Performance of the Algorithms 215 10.3.1 Single-Objective Case 216 10.3.2 Multi-Objective Case 217 10.4 Conclusion 218 References 218 INDEX 221
£86.36
John Wiley & Sons Inc Professional SharePoint 2013 Administration
Book SynopsisSharePoint admin author gurus return to prepare you for working with the new features of SharePoint 2013! The new iteration of SharePoint boasts exciting new features. However, any new version also comes with its fair share of challenges and that's where this book comes in.Table of ContentsINTRODUCTION xxix CHAPTER 1: WHAT’S NEW IN SHAREPOINT 2013 1 Installation Changes 2 System Requirements 2 The Installation Process 2 Upgrading from SharePoint 2010 3 Patching 3 Central Administration 4 Service Applications 5 Claims and Authentication 8 Managing SharePoint 2013 with Windows PowerShell 10 SharePoint Apps 10 Workflow Manager 11 New User Experience 12 Faster 12 Prettier 13 Getting Social 14 Summary 15 CHAPTER 2: ARCHITECTURE AND CAPACITY PLANNING 17 Names, Names, My Kingdom for a Consistent Name! 19 SharePoint Foundation 19 SharePoint Server 2013 20 Search Server Express 22 FAST Search Server 2010 22 SharePoint Online 23 Additional Server Planning 24 Windows Server and Required Additional Software 24 Windows Vista, 7, and 8 25 SQL Server 26 E-mail Servers and SMS Options 26 Hardware Requirements 28 Web Servers 29 Application Servers 30 SQL Servers 40 Mixing and Matching Servers 41 Other Hardware Notes 46 Virtualization 47 Terminology 48 Controlling Deployments 52 HTTP Throttling 52 Large List Throttling 53 Recycle Bin Architectural Implications 54 Software Boundaries and Limits for SharePoint 2013 55 Summary 56 CHAPTER 3: INSTALLING AND CONFIGURING SHAREPOINT 57 Preparing the Environment 57 Logging In and Mounting the File 58 Running the Prerequisite Installer 59 Adding Forgotten Patches 60 Windows Server 2008 R2 61 Windows Server 2012 61 Running Setup 61 Automating Setup 62 Creating the Farm 63 Adding More Servers to the Farm 65 Configuring the Farm 66 Creating Web Applications and More 90 Terminology 90 Web Applications 91 Site Collections and Webs 93 Summary 95 CHAPTER 4: UNDERSTANDING SERVICE APPLICATIONS 97 A History of Service Applications in SharePoint 98 Service Application Fundamentals 99 The Connection Structure 100 Connecting Across Farms 105 Service Applications As a Framework 107 Service Application Administration 107 Creating a New Instance of a Service Application 107 Using the Ribbon to Manage Service Applications 109 Managing Service Application Proxy Groups 112 Multi-Tenancy in SharePoint 2013 118 Managing Service Application Groups 118 Creating a Site Subscription 120 Multi-Tenant Use Cases 121 Partitioning in the Enterprise 121 Summary 123 CHAPTER 5: UPGRADING TO SHAREPOINT 2013 125 Upgrade Considerations 125 What You Can Upgrade 125 What You Can’t Upgrade 130 Don’t Upgrade Crap 131 Upgrading Content 135 Creating the Web Application 135 Testing the Content Database 137 Attaching the Content Database 143 Upgrading Site Collections 146 Throttling and Governance 156 Upgrading Service Applications 157 Business Connectivity Services 158 Managed Metadata 158 Performance Point 159 Search 160 Secure Store 161 User Profile Service 162 Using Third-Party Tools to Migrate Content 163 Upgrading from Older Versions 163 Restructuring Your Farm 163 Choosing Third-Party Migration Software 164 Summary 164 CHAPTER 6: CLAIMS AUTHENTICATION AND OAUTH 165 What’s New with Claims and Authorization? 166 Migrating from Classic to SharePoint 2013 Claims 166 Authentication Infrastructure 167 OAuth 167 Server-to-Server Authentication 168 User Authentication 168 Claims-Based Identity 169 Using Claims-Based Identity 171 Application Authentication 180 Cloud App Model 180 OAuth 181 App Authentication 182 Server-to-Server Authentication 188 SharePoint to SharePoint S2S 189 SharePoint to Exchange and Lync S2S 189 Summary 190 CHAPTER 7: ADMINISTERING SHAREPOINT WITH WINDOWS POWERSHELL 191 Introduction to Windows PowerShell 192 Microsoft SharePoint 2013 Management Shell and Other Hosts 192 Microsoft SharePoint 2013 Management Shell 192 Using Other Windows PowerShell Hosts 193 Commands 195 Cmdlets 195 Functions 196 Scripts 197 Native Commands 198 Basic PowerShell Usage 198 Listing the SharePoint Commands 198 PowerShell Help 200 PowerShell Variables 201 PowerShell Objects 203 PowerShell Pipeline 203 Controlling Output 204 Using SharePoint Commands 207 Working with the Farm 207 Working with the Farm Configuration 208 Web Applications 209 Working with Site Collections 212 Working with Webs 217 Working with Objects Below the Web Level 219 Disposing of SharePoint Variables 223 Some Sample PowerShell Scripts 225 Creating Your SharePoint 2013 Farm with PowerShell 225 Creating Managed Accounts and Service Application Pools 227 Creating the Search Service Application in SharePoint 2013 Server 227 Creating a Claims Web Application 228 Getting Site Collection Size 229 Summary 229 CHAPTER 8: CONFIGURING SHAREPOINT FOR BUSINESS INTELLIGENCE 231 Installing SQL Server Analysis Services 232 Installing SSAS and Data Tools 232 Deploying AdventureWorks 237 Creating a Business Intelligence Center 242 Configuring Excel Services 243 Configuring the Excel Services Service Application 244 Configuring Excel Services to Use the Secure Store 245 Testing the Excel Services Unattended Service Account 248 PowerPivot 2012 250 Installing PowerPivot 251 Configuring PowerPivot Integration 255 Adding Permissions to Central Administration 258 Creating and Confi guring a PowerPivot Workbook 259 SQL Server Reporting Services for SharePoint 2013 264 Creating the Service Application 268 Creating and Deploying an SSRS Report 268 PowerView 274 Configuring PerformancePoint Services 275 Configuring PerformancePoint Services to Use the Secure Store 277 Testing the PerformancePoint Services Unattended Service Account 279 Configuring Visio Services 285 Configuring the Visio Unattended Service Account 285 Configuring the Visio Graphics Service Application 286 Introduction to Access 2013 290 Prerequisites 291 Items to Consider for Access 2013 291 Configuring an Isolated App Domain 291 Microsoft SQL Server 2012 Required Features for Access Services 2013 292 Microsoft SQL Server 2012 Options Required for Use with Access Services 2013 292 Service Account Permissions 295 Creating the Access Services 2013 Service Application 296 Setting SQL Permissions for Your Service Account 298 Configuring IIS 299 Creating a Custom Web App Using Access 2013 Client 300 Summary 302 CHAPTER 9: CONFIGURING SHAREPOINT FOR HIGH-AVAILABILITY BACKUPS 303 Determining Your Business Requirements 303 Content Recovery 305 Content Storage Overview 306 Version History 306 The Recycle Bin 310 Exporting and Importing Sites, Lists, and Libraries 313 Backing Up and Restoring Site Collections 318 Recovering from SQL Server Snapshots 324 Backing Up and Recovering from Disaster 325 Backing Up and Restoring Content Databases 326 Backing Up and Restoring Service Applications 333 Backing Up the Farm 335 Backing Up IIS 337 Backing Up Customizations 338 High-Availability Configurations 339 Load-Balancing 339 SQL AlwaysOn Failover-Clustering 340 SQL Server AlwaysOn Availability Groups 340 HTTP Request Throttling 341 Gradual Site Deletion 343 Summary 343 CHAPTER 10: MANAGING SHAREPOINT DEVELOPER SOLUTIONS AND FEATURES 345 Defining Solutions and Features 345 Understanding Farm Solutions 346 Managing Farm Solutions 348 Managing Farm Solutions via the User Interface 349 Managing Farm Solutions via the Command Line 353 Understanding Sandbox Solutions 355 Managing Sandbox Solutions 356 Understanding Features 358 Feature Manifest 359 Defining Scope 360 Feature Receivers 360 Managing Features 361 Managing Features via the User Interface 361 Managing Features via the Command Line 365 Summary 368 CHAPTER 11: MANAGING AND CONFIGURING APPS 369 Understanding the SharePoint 2013 App 371 Architecture 371 SharePoint 2013 App Marketplaces 372 SharePoint 2013 App Hosting Options 373 App Model Security 376 Setting Up an App-Enabled SharePoint Environment 377 Configuring a Forward Lookup Zone in DNS 378 Configuring SSL for the App Domain (Optional) 381 Configuring the Service Applications 381 Configuring App URLs 382 Setting Up a High-Trust App Environment 384 Managing SharePoint 2013 Apps 392 Configuring an App Catalog 392 Adding an App to a SharePoint Site 394 Removing an App from a SharePoint Site 399 Monitoring SharePoint Apps 400 Monitoring and Managing App Licenses 403 Summary 406 CHAPTER 12: BRANDING SHAREPOINT 407 What Is Branding? 407 Branding Considerations 409 SharePoint and Publishing 410 Components of SharePoint Branding 412 Master Pages 413 Page Layouts and Wiki Pages 414 HTML, Cascading Style Sheets, and More 416 What’s New in Branding for SharePoint 2013 416 Composed Looks 416 Device Channels 419 Image Renditions 424 Display Templates 427 Improving Speed with Minimal Download Strategy 428 Design Manager 429 Understanding the SharePoint 2013 Branding Process 430 Using the Design Manager 430 Deploying Branding Assets 444 Customizing SharePoint Files 444 Upgrading Branding to SharePoint 2013 445 Controlling Access to SharePoint Branding 446 Summary 447 CHAPTER 13: CONFIGURING AND MANAGING ENTERPRISE SEARCH 449 What’s New in Enterprise Search 449 Single Search Architecture 450 Search Center and Search UI 450 Relevancy Improvements 450 Search Architecture 451 Topology 452 Managing the Crawl Process and Crawled Properties 453 Content Processing 454 Analytics Processing 456 Index Processing 459 Query Processing, Query Rules, and Result Sources 460 Administration 460 Configuring Enterprise Search 461 Scaling Out Topology 461 Continuous Crawl and Content Sources 469 Result Sources 474 Managing the Search UI 477 Search Center 477 Customizing the UI 486 Summary 500 CHAPTER 14: CONFIGURING USER PROFILES AND SOCIAL COMPUTING 503 What’s New in Enterprise Social? 504 My Sites 504 Distributed Cache 506 Communities 506 User Profile Synchronization 506 User Profile Replication Engine 507 Managing and Configuring Profile Synchronization 507 Profile Synchronization 508 Choosing a Synchronization Method 508 Active Directory Import 509 SharePoint Profile Synchronization 511 Organization Profiles 522 Audiences 522 Managing and Configuring My Sites 527 Configuring My Sites 527 SkyDrive Pro 536 Managing and Configuring Communities 540 Community Templates 540 Creating and Using Community Sites 541 Summary 544 CHAPTER 15: THE OFFICE WEB APPLICATIONS FOR SHAREPOINT 545 Functionality Overview 546 New Features in SharePoint OWA 2013 546 Additional Functionality for Multiple SharePoint Farms, Lync, Exchange 2013, and File Shares (via Open-Form URL) 547 Integrating OWA with Exchange 2013 547 Integrating OWA with Lync 2013 547 Licensing and Versions 548 Desktop Enhancements 549 User Experience Improvements 549 PowerPoint Broadcasting 549 Excel Web App vs. Excel Services 550 Change Tracking 550 Comments 551 Co-Authoring 551 Embedding 551 Ink Support 552 Quick Preview 553 Sharing a Document 553 Office Web Apps URLs 554 Default Open Behavior for Documents 554 Mobile Device Support 555 PowerPoint Changes 555 Enhanced User Experience 555 Technologies Used 555 Platform and Browser Compatibility 556 Topology 557 Authentication Requirements 560 Migrating from Classic-Mode to Claims-Based Authentication 560 Preparing the Server and Installing OWA via the GUI 561 Installing Prerequisites for Windows Server 2012 561 Installing Prerequisites for Windows 2008 R2 564 Installing Office Web Apps 564 Office Web Apps Confi guration Options 565 Creating Your Own Certificate for Testing 565 Configuring the Security Token Service 570 Using the HTTP Protocol 570 Using the HTTPS Protocol 572 Binding to a SharePoint Farm Using HTTPS 574 Removing a Binding 575 Scaling Office Web Apps 575 Office Web Apps Patching 575 New PowerShell OWA Cmdlets 576 Summary 577 CHAPTER 16: INSTALLING AND CONFIGURING AZURE WORKFLOW SERVER 579 Enchancements in Workflow 579 Workflow in SharePoint 2010 580 Workflow in SharePoint 2013 581 New Workflow Architecture in SharePoint 2013 581 SharePoint Designer Enhancements 583 Installing and Configuring Windows Azure Workflow Server 584 Hardware and Software Requirements 584 Workflow Manager Install 586 Step-by-Step Install 587 Managing Web Application Settings 597 Creating SharePoint 2013 Workfl ows 598 Templates 598 Creating a Custom Workflow Using SharePoint Designer 2013 600 Workflow Visualization Using Visio 2013 609 Creating Custom Workfl ows Using Visual Studio 2012 610 Summary 611 CHAPTER 17: INTEGRATING OFFICE CLIENTS WITH SHAREPOINT 613 What Office 2013 and SharePoint 2013 Share in Common 614 Connecting to SharePoint from within Microsoft Offi ce 2013 Applications 614 Determining When a Document Is Being Actively Co-Authored 615 Live Co-Authoring Compatibility with Other Offi ce Versions 616 Backstage View 616 Taking a Look at the Document Panel 618 Connecting to Office 2013 from SharePoint 2013 620 Integrating SharePoint 2013 with Word 2013 622 Comparing Document Versions 622 Working with Document Barcodes 623 Using Quick Parts 623 Blogging in Microsoft Word 624 Integrating SharePoint 2013 with Excel 626 Importing Spreadsheets into SharePoint 626 Exporting to Excel 627 Displaying Charts 627 Using the Excel Web Access Web Part 627 Integrating SharePoint 2013 with PowerPoint 628 Working with Slide Libraries 628 Broadcasting Slides 628 Integrating SharePoint 2013 with Outlook 628 Managing SharePoint Alerts 629 Connecting SharePoint Lists and Libraries to Outlook 629 Connecting Calendars and Meetings to Outlook 630 Integrating SharePoint 2013 with InfoPath 630 Deploying InfoPath Forms Services in Central Administration 632 InfoPath Form Web Part 633 Customizing the Document Information Panel 633 Customizing SharePoint List Forms 635 Integrating SharePoint 2013 with Visio 636 Setting Up the Visio Graphics Service 636 Adding a Visio Web Access Web Part 637 Integrating SharePoint 2013 with OneNote 638 Integrating SharePoint with Access 2013 and Access Services 639 SharePoint Data as a Table 640 Creating Microsoft Access Views in SharePoint 641 Access Services Overview 642 Publishing Links to Office Client Applications 644 Managing Office 2013 and SharePoint through Group Policy 645 Summary 647 CHAPTER 18: WORKING WITH SHAREPOINT DESIGNER 649 Introduction to SharePoint Designer 2013 650 Requirements for Using SPD 2013 651 Integrating SP 2013 and SPD 2013 652 SPD 2013 and SPD 2010 Interoperability 653 SharePoint Server 2013 Workflow Platform 654 Enabling SharePoint Designer Restrictions 655 Overview of the New User Interface 659 Managing SharePoint Sites with SharePoint Designer 661 The Navigation Pane 662 Creating Subsites with SharePoint Designer 2013 663 Branding with SharePoint Designer 2013 664 Versioning 665 SharePoint Master Pages 666 Editing the Master Page 667 Page Layouts 668 Implementing Workfl ows with SharePoint Designer 2013 670 Summary 673 CHAPTER 19: TROUBLESHOOTING SHAREPOINT 675 The Unified Logging Service 676 Windows Event Logs 676 Trace Logs 680 Powerful PowerShell Tweaks 681 Viewing the ULS Logs with the ULS Viewer 683 Using PowerShell to Tame the ULS Logs 685 The Correlation ID: Your New Best Friend 688 The Developer Dashboard 690 More Troubleshooting Techniques 693 Using Fiddler to Watch Your Web Traffic 693 Creating a New Web Application 695 Making All Your Service Accounts Local Administrators 695 Checking for Failed Timer Jobs 696 Starting Fresh with IISReset 696 Reboots for Everyone! 697 Shoot Trouble Before it Happens! 697 See the Bigger Picture: IIS and SQL 697 Additional Tools and Resources 698 Summary 699 CHAPTER 20: MONITORING AND ANALYTICS 701 Configuring Monitoring in Central Administration 701 Unified Logging Service 702 Configuring ULS via Central Admin 702 Configuring ULS via PowerShell 705 Using and Configuring the Health Analyzer 707 Usage and Health Data Collection 709 Configuring Usage and Health Data Collection 710 Log Collection and Processing 711 Timer Jobs in SharePoint 2013 713 Managing Timer Jobs in Central Admin 714 Managing Timer Jobs in PowerShell 715 Search Service Application Monitoring 716 The Crawl Log 716 Crawl and Query Health Reports 718 Usage Reports 718 Summary 718 CHAPTER 21: CONFIGURING AND MANAGING WEB CONTENT MANAGEMENT AND INTERNET SITES 719 What’s New with WCM? 720 Cross-Site Publishing 720 Catalogs and Category Pages 720 Managed Navigation 721 Content Search 721 Internet Site Improvements 722 Variations and Translation Services 723 Design Manager 723 Snippet Gallery 723 Device Channels 724 Content Authoring Improvements 724 Architecting Internet Sites 725 What Is SharePoint for Internet Sites? 725 Preparing the Farm for WCM 726 Planning and Confi guring WCM Capability 732 Site Publishing Models 745 Configuring and Creating WCM Internet Sites 747 Configuring Cross-Site Publishing 748 Using the New Catalogs Capability 748 Branding 752 Design Manager 753 Navigation 756 Search-Driven Content 762 Search Engine Optimization 766 Authoring Content Improvements 767 Rich Text Editor Improvements 768 Using Video Support Enhancements 769 Image Renditions 769 Summary 771 INDEX 773
£30.39
John Wiley & Sons Inc Microsoft Windows Server 2012 Administration
Book SynopsisFast, accurate answers for common Windows Server questions Serving as a perfect companion to all Windows Server books, this reference provides you with quick and easily searchable solutions to day-to-day challenges of Microsoft's newest version of Windows Server.Table of ContentsIntroduction xvii Part I Getting Started 1 Chapter 1: Getting Started with Windows Server 2012 3 Plan for Windows Server 2012 4 Understand Hardware Requirements 5 Understand Windows Server 2012 Editions and Roles 6 Understand Server Core 9 Consider Your Licensing Options 11 Install Windows Server 2012 12 Perform a Windows Server 2012 Full Installation 12 Perform a Windows Server 2012 Server Core Installation 19 Use sconfig to Configure Your Windows Server 2012 Server Core 19 Upgrade to Windows Server 2012 22 Install Windows Server 2012 Server Unattended 26 Migrate to Windows Server 2012 32 Install Windows Server 2012 Migration Tools 33 Migrate to Windows Server 2012 38 A New Server Manager 38 Chapter 2: Adding Server Roles and Functionality 43 Plan for Windows Server 2012 Roles 44 Plan for Active Directory 45 Plan for Hyper-V 49 Understand Remote Desktop Services 50 Understand Windows Server 2012 Features 52 Install Windows Server 2012 Roles 57 Install Roles on a Windows Server 2012 Full Server Installation 58 Install Roles on a Windows Server 2012 Server Core Installation 71 Chapter 3: Automating Administrative Tasks with Windows Server 2012 77 Understand the Basics of Windows PowerShell v3 78 Understand Windows PowerShell v3 Terminology and Structure 78 Enable Windows PowerShell v3 82 Understand Security in Windows PowerShell 82 Learn to Help Yourself to PowerShell 84 Take the Next Step 91 Use PowerShell Remoting 99 Enable PowerShell Remoting 99 Run Remote Commands 100 Understand PowerShell Integrated Scripting Environment (ISE) 103 Work with the PowerShell ISE 103 Part II Manage Active Directory and Local Users 109 Chapter 4: Maintaining Users and Groups 111 Understand Local Users and Groups 112 Learn Default Local Users and Groups 112 Administer Local Users and Groups 115 Understand Local User Rights 127 Work with Local Account Policies 129 Understand Active Directory Users and Groups 135 Learn Active Directory Users and Groups Terminology 135 Join an Active Directory Domain as a Member 137 Work with Active Directory and Local Groups 138 Manage Users and Groups in Active Directory 139 Automate User and Group Management 146 Load AD PowerShell Modules 147 Work with Users and Groups in PowerShell 147 Use the AD Recycle Bin 151 Chapter 5: Managing and Replicating Active Directory 157 Manage the Active Directory Database 158 Maintain FSMO Roles 159 Transfer FSMO Roles 161 Defragment the Directory Database 166 Audit Active Directory Service 168 Use Fine-Grained Password Policy 172 Create PSOs 173 Understand Active Directory Replication 177 Understand the Components of Replication 177 Understand the Physical Constructs of Replication 179 Chapter 6: Maintaining and Controlling the Centralized Desktop 183 Understand Group Policy 184 Know the Difference Between Policy and Preferences 186 Understand the Scope of Group Policy Management 188 Understand and Control the Order of Precedence 189 Learn Group Policy Processing 191 Administer Group Policy 198 Use the Group Policy Management Editor 208 Automate Group Policy Administrator Tasks 212 Troubleshoot Group Policy 213 Use the Group Policy Modeling Wizard 214 Use Tools to See the RSOP 216 Part III Data Access and Management 221 Chapter 7: Configuring Folder Security, Access, and Replication 223 Implement Permissions 224 Set Standard NTFS Permissions 225 Set Special NTFS Permissions 226 View Effective NTFS Permissions 228 Take Ownership of an NTFS Folder 229 Share Folders 231 Create a Shared Folder 231 Implement Advanced Sharing 232 Resolve Permission Conflicts 234 Configure Offline File Caching 237 Secure Folders and Files 239 Configure the Encrypting File System 239 Configure BitLocker Drive Encryption 241 Install and Enable BitLocker 242 Recover BitLocker 247 Use the BitLocker To Go Tool 248 Implement the Distributed File System 250 Configure a DFS Namespace 251 Configure Replication Groups 254 Enable Previous Versions of Files 257 Restore a Previous Version 258 Chapter 8: Backing Up and Recovering Your Server 261 Understand Backup and Recovery 262 Understand Backup and Recovery Terminology 263 Use Backup and Recovery Tools 264 Manage Backup and Recovery 270 Back Up Your Server 271 Recover Your Data 282 Recover via Shadow Copy 292 Perform Backup and Recovery with Command Tools 294 Use wbadmin.exe 294 Use PowerShell 297 Chapter 9: Managing Disks and Disk Storage 301 Understand the Basics 302 Learn Disk Management and Storage Terminology 302 Work with Your Storage 305 Work with Partitions 312 Use DiskPart 315 Work with RAID Volumes 318 Understand RAID Levels 318 Implement RAID 321 Manage Disk Storage 327 Manage Disk Storage Quotas 327 Work with Data Deduplication 331 Work with Storage Spaces 336 Understand Storage Spaces 336 Create and Configure Storage Spaces 338 Part IV Network Configuration and Communication 345 Chapter 10: Maintaining Your Web Server 347 Install Internet Information Services 348 Understand Internet Information Services Role Services 348 Install IIS on Windows Server 2012 Full Server Installation 354 Install IIS on Windows Server 2012 Core Server 355 Manage Internet Information Services 358 Work with the IIS Management Console 359 Remotely Manage IIS Servers 365 Manage IIS with PowerShell 370 Work with Websites 374 Understand the Basics of IIS Websites 374 Work with Applications 377 Integrate PHP Applications in IIS 379 Chapter 11: Administering DNS 383 Add and Remove DNS Servers 384 Add a DNS Server 384 Configure a New DNS Server 386 Add Query Forwarding 388 Configure a Caching-Only DNS Server 390 Remove a DNS Server 392 Manage a DNS Server 393 Change the Address of a DNS Server 393 Configure a DNS Server to Listen Only on a Selected Address 394 Scavenge Properties for DNS 395 Manage DNS Integration with Active Directory 397 Change Zone Replication 401 Manage Zone Database Files 402 Configure Single-Label DNS Resolution 410 Troubleshoot DNS 412 Chapter 12: Troubleshooting TCP/IP 415 Understand TCP/IP Basics 416 Troubleshoot TCP/IP 417 Understand Troubleshooting Tools 418 Troubleshoot IPv6 420 Verify Connectivity for IPv6 421 Verify Responsiveness 423 Check the Routing Table for IPv6 425 Validate DNS Name Resolution for IPv6 Addresses 426 Flush the DNS Cache 426 Test IPv6 TCP Connections 427 Troubleshoot IPv4 428 Use the Network Connection Repair Tool 428 Verify IPv4 Connectivity 429 Verify Responsiveness 430 Check the Routing Table for IPv4 432 Validate DNS Name Resolution for IPv4 Addresses 432 Flush the DNS Cache 433 Test IPv4 TCP Connections 434 Part V Manage Desktop and Server Virtualization 435 Chapter 13: Managing Remote Access to Your Server 437 Understand Remote Desktop Services 438 Understand the Remote Desktop Services Role 438 Install Remote Desktop Services Role Services 439 Manage Remote Desktop Services 445 Administer Remote Desktop Session Host 445 Activate Remote Desktop Licensing Server 449 Configure Remote Desktop Gateway 450 Configure Remote Desktop Connection Broker 452 Configure Remote Desktop Web Access 453 Work with Virtual Desktop Infrastructure 456 Work with Remote Clients 457 Install and Configure Windows Server 2012 VPNs 457 Install and Configure DirectAccess 463 Chapter 14: Maintaining Virtual Machines 465 Understand Virtualization with Hyper-V 466 Install Hyper-V 466 Work with Virtual Networks 468 Build Virtual Machines 471 Create a Virtual Machine 472 Create Virtual Hard Disks 473 Work with Virtual Machine Settings 476 Install an Operating System 486 Connect to a Virtual Machine 488 Use Snapshots 489 Import a Virtual Machine 491 Export a Virtual Machine 493 Replicate a Virtual Machine 495 Part VI Server Tuning and Maintenance 497 Chapter 15: Tuning and Monitoring Performance 499 Analyze Server Roles 500 Understand the Best Practices Analyzer 500 Use the Best Practices Analyzer 503 Use PowerShell with the Best Practices Analyzer 507 View Server Performance Data 509 Create a System Health Report 510 Understand Performance Monitor 514 View Server Events 522 Work with the Event Viewer 522 Chapter 16: Keeping Your Servers Up-to-Date 531 Work with Windows Updates 532 Find Out What Updates Are 532 Use Windows Update 533 Enable Automatic Updates 535 View Installed Updates 537 Remove an Update 538 Install Automatic Updates Between Scheduled Times 540 Use Group Policy to Configure Automatic Updates 540 Work with Windows Server Update Services 544 Do a Simple WSUS Deployment 544 Get WSUS Updates on Disconnected Networks 548 Use WSUS with Branch Cache 549 Learn the WSUS Requirements 550 Get More Information on WSUS 551 Index 553
£21.59
John Wiley & Sons Inc Unmasking the Social Engineer
Book SynopsisLearn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets.Table of ContentsForeword xv Acknowledgments and Preface xvii Introduction xxi I Building the Foundation 1 1 What Is Nonverbal Communication? 3 The Different Aspects of Nonverbal Communication 8 Kinesics 9 Proxemics 13 Touch 14 Eye Contact 15 Olfactics 16 Adornment 17 Facial Expressions 19 How to Use This Information 20 Summary 23 2 What Is Social Engineering? 25 Information Gathering 28 Pretexting 29 Elicitation 30 Rapport 30 Influence/Manipulation 32 Framing 33 Nonverbal Communications 34 The Three Basic Forms of Social Engineering 34 Become Phishers of Men 35 When The Phone Is More Dangerous Than Malware 39 I Am Not the Social Engineer You Are Looking For 43 Using Social Engineering Skills 45 The Good 46 The Bad 47 The Ugly 48 Summary 48 II Decoding the Language of the Body 51 3 Understanding the Language of the Hands 53 Communicating with Your Hands 55 Origin 57 Coding 57 Usage 58 High-Confidence Hand Displays 66 Low-Confidence and Stress Hand Displays 75 Getting a Handle on the Hands 78 Summary 79 4 The Torso, Legs, and Feet 81 Legs and Feet 83 Torso and Arms 89 Summary 97 5 The Science Behind the Face 99 Just the FACS 103 What Is a Truth Wizard? 105 Emotions versus Feelings 108 Fear 109 Surprise 113 Sadness 116 Contempt 121 Disgust 125 Anger 128 Happiness 132 Perfect Practice Makes Perfect 136 Summary 137 6 Understanding Nonverbal Displays of Comfort and Discomfort 139 Neck and Face Pacifying 143 What to Watch For 144 Mouth Covers 146 What to Watch For 147 Lips 147 What to Watch For 151 Eye Blocking 153 What to Watch For 154 Self-Comforting and Head Tilts 154 What to Watch For 157 Summary 158 III Deciphering the Science 159 7 The Human Emotional Processor 161 Introducing the Amygdala 164 How the Amygdala Processes Information 165 Hijacking the Amygdala 167 Human See, Human Do 169 Reading Other People’s Expressions 170 Your Own Emotional Content 171 Nonverbal Social Proof 171 Using Amygdala Hijacking as a Social Engineer 172 Summary 174 8 The Nonverbal Side of Elicitation 177 Artificial Time Constraints 181 Sympathy/Assistance Themes 182 Ego Suspension 184 Ask How, When, and Why Questions 186 Conversational Signals 187 Action Unit 1: Inner Brow Raiser 188 Action Unit 2: Outer Brow Raiser 188 Action Unit 4: Brow Lowerer 189 Conversational Signals of Emotions 190 Breaking Down Conversational Signals 191 Batons 191 Underliner r 192 Punctuation 192 Question Mark 193 Word Search 193 Nonverbal Conversational Signals 193 Conversational Signals as a Social Engineer 195 Summary 196 IV Putting It All Together 197 9 Nonverbal Communication and the Social Engineer Human Being 199 Applying This Information as a Professional Social Engineer 202 Using This Book to Defend 206 Becoming a Critical Thinker 207 Summary 210 Index 213
£23.80
John Wiley & Sons Inc Digital Signal Processing with Kernel Methods
Book SynopsisA realistic and comprehensive review of joint approaches to machine learning and signal processing algorithms, with application to communications, multimedia, and biomedical engineering systems Digital Signal Processing with Kernel Methods reviews the milestones in the mixing of classical digital signal processing models and advanced kernel machines statistical learning tools. It explains the fundamental concepts from both fields of machine learning and signal processing so that readers can quickly get up to speed in order to begin developing the concepts and application software in their own research. Digital Signal Processing with Kernel Methods provides a comprehensive overview of kernel methods in signal processing, without restriction to any application field. It also offers example applications and detailed benchmarking experiments with real and synthetic datasets throughout. Readers can find further worked examples with Matlab source code on a website developed by the authors: hTable of ContentsAbout the Authors xiii Preface xvii Acknowledgements xxi List of Abbreviations xxiii Part I Fundamentals and Basic Elements 1 1 From Signal Processing to Machine Learning 3 1.1 A New Science is Born: Signal Processing 3 1.1.1 Signal Processing Before Being Coined 3 1.1.2 1948: Birth of the Information Age 4 1.1.3 1950s: Audio Engineering Catalyzes Signal Processing 4 1.2 From Analog to Digital Signal Processing 5 1.2.1 1960s: Digital Signal Processing Begins 5 1.2.2 1970s: Digital Signal Processing Becomes Popular 6 1.2.3 1980s: Silicon Meets Digital Signal Processing 6 1.3 Digital Signal Processing Meets Machine Learning 7 1.3.1 1990s: New Application Areas 7 1.3.2 1990s: Neural Networks, Fuzzy Logic, and Genetic Optimization 7 1.4 Recent Machine Learning in Digital Signal Processing 8 1.4.1 Traditional Signal Assumptions Are No Longer Valid 8 1.4.2 Encoding Prior Knowledge 8 1.4.3 Learning and Knowledge from Data 9 1.4.4 From Machine Learning to Digital Signal Processing 9 1.4.5 From Digital Signal Processing to Machine Learning 10 2 Introduction to Digital Signal Processing 13 2.1 Outline of the Signal Processing Field 13 2.1.1 Fundamentals on Signals and Systems 14 2.1.2 Digital Filtering 21 2.1.3 Spectral Analysis 24 2.1.4 Deconvolution 28 2.1.5 Interpolation 30 2.1.6 System Identification 31 2.1.7 Blind Source Separation 36 2.2.3 Sparsity, Compressed Sensing, and Dictionary Learning 44 2.3 Multidimensional Signals and Systems 48 2.3.1 Multidimensional Signals 49 2.3.2 Multidimensional Systems 51 2.4 Spectral Analysis on Manifolds 52 2.4.1 Theoretical Fundamentals 52 2.4.2 Laplacian Matrices 54 2.5 Tutorials and Application Examples 57 2.5.1 Real and Complex Signal Processing and Representations 57 2.5.2 Convolution, Fourier Transform, and Spectrum 63 2.5.3 Continuous-Time Signals and Systems 67 2.5.4 Filtering Cardiac Signals 70 2.5.5 Nonparametric Spectrum Estimation 74 2.5.6 Parametric Spectrum Estimation 77 2.5.7 Source Separation 81 2.5.8 Time–Frequency Representations and Wavelets 84 2.5.9 Examples for Spectral Analysis on Manifolds 87 2.6 Questions and Problems 94 3 Signal Processing Models 97 3.1 Introduction 97 3.2 Vector Spaces, Basis, and Signal Models 98 3.2.1 Basic Operations for Vectors 98 3.2.2 Vector Spaces 100 3.2.3 Hilbert Spaces 101 3.2.4 Signal Models 102 3.2.5 Complex Signal Models 104 3.2.6 Standard Noise Models in Digital Signal Processing 105 3.2.7 The Role of the Cost Function 107 3.2.8 The Role of the Regularizer 109 3.3 Digital Signal Processing Models 111 3.3.1 Sinusoidal Signal Models 112 3.3.2 System Identification Signal Models 113 3.3.3 Sinc Interpolation Models 116 3.3.4 Sparse Deconvolution 120 3.3.5 Array Processing 121 3.4 Tutorials and Application Examples 122 3.4.1 Examples of Noise Models 123 3.4.2 Autoregressive Exogenous System Identification Models 132 3.4.3 Nonlinear System Identification Using Volterra Models 138 3.4.4 Sinusoidal Signal Models 140 3.4.5 Sinc-based Interpolation 144 3.4.6 Sparse Deconvolution 152 3.4.7 Array Processing 157 3.5 Questions and Problems 160 3.A MATLABsimpleInterp Toolbox Structure 161 4 Kernel Functions and Reproducing Kernel Hilbert Spaces 165 4.1 Introduction 165 4.2 Kernel Functions and Mappings 169 4.2.1 Measuring Similarity with Kernels 169 4.2.2 Positive-Definite Kernels 169 4.2.3 Reproducing Kernel in Hilbert Space and Reproducing Property 170 4.2.4 Mercer’s Theorem 173 4.3 Kernel Properties 174 4.3.1 Tikhonov’s Regularization 175 4.3.2 Representer Theorem and Regularization Properties 176 4.3.3 Basic Operations with Kernels 178 4.4 Constructing Kernel Functions 179 4.4.1 Standard Kernels 179 4.4.2 Properties of Kernels 180 4.4.3 Engineering Signal Processing Kernels 181 4.5 Complex Reproducing Kernel in Hilbert Spaces 184 4.6 Support Vector Machine Elements for Regression and Estimation 186 4.6.1 Support Vector Regression Signal Model and Cost Function 186 4.6.2 Minimizing Functional 187 4.7 Tutorials and Application Examples 191 4.7.1 Kernel Calculations and Kernel Matrices 191 4.7.2 Basic Operations with Kernels 194 4.7.3 Constructing Kernels 197 4.7.4 Complex Kernels 199 4.7.5 Application Example for Support Vector Regression Elements 202 4.8 Concluding Remarks 205 4.9 Questions and Problems 205 Part II Function Approximation and Adaptive Filtering 209 5 A Support Vector Machine Signal Estimation Framework 211 5.1 Introduction 211 5.2 A Framework for Support Vector Machine Signal Estimation 213 5.3 Primal Signal Models for Support Vector Machine Signal Processing 216 5.3.1 Nonparametric Spectrum and System Identification 218 5.3.2 Orthogonal Frequency Division Multiplexing Digital Communications 220 5.3.3 Convolutional Signal Models 222 5.3.4 Array Processing 225 5.4 Tutorials and Application Examples 227 5.4.1 Nonparametric Spectral Analysis with Primal Signal Models 227 5.4.2 System Identification with Primal Signal Model ;;-filter 228 5.4.3 Parametric Spectral Density Estimation with Primal Signal Models 230 5.4.4 Temporal Reference Array Processing with Primal Signal Models 231 5.4.5 Sinc Interpolation with Primal Signal Models 233 6 Reproducing Kernel Hilbert Space Models for Signal Processing 241 6.1 Introduction 241 6.2 Reproducing Kernel Hilbert Space Signal Models 242 6.2.1 Kernel Autoregressive Exogenous Identification 244 6.2.2 Kernel Finite Impulse Response and the ;;-Filter 247 6.2.3 Kernel Array Processing with Spatial Reference 248 6.2.4 Kernel Semiparametric Regression 249 6.3 Tutorials and Application Examples 258 6.3.1 Nonlinear System Identification with Support Vector Machine–Autoregressive and Moving Average 258 6.3.2 Nonlinear System Identification with the ;;-filter 260 6.3.3 Electric Network Modeling with Semiparametric Regression 264 6.3.4 Promotional Data 272 6.3.5 Spatial and Temporal Antenna Array Kernel Processing 275 6.4 Questions and Problems 279 7 Dual Signal Models for Signal Processing 281 7.1 Introduction 281 7.2 Dual Signal Model Elements 281 7.3 Dual Signal Model Instantiations 283 7.3.1 Dual Signal Model for Nonuniform Signal Interpolation 283 7.3.2 Dual Signal Model for Sparse Signal Deconvolution 284 7.3.3 Spectrally Adapted Mercer Kernels 285 7.4 Tutorials and Application Examples 289 7.4.1 Nonuniform Interpolation with the Dual Signal Model 290 7.4.2 Sparse Deconvolution with the Dual Signal Model 292 7.4.3 Doppler Ultrasound Processing for Fault Detection 294 7.4.4 Spectrally Adapted Mercer Kernels 296 7.4.5 Interpolation of Heart Rate Variability Signals 304 7.4.6 Denoising in Cardiac Motion-Mode Doppler Ultrasound Images 309?m 7.4.7 Indoor Location from Mobile Devices Measurements 316 7.4.8 Electroanatomical Maps in Cardiac Navigation Systems 322 7.5 Questions and Problems 331 8 Advances in Kernel Regression and Function Approximation 333 8.1 Introduction 333 8.2 Kernel-Based Regression Methods 333 8.2.1 Advances in Support Vector Regression 334 8.2.2 Multi-output Support Vector Regression 338 8.2.3 Kernel Ridge Regression 339 8.2.4 Kernel Signal-To-Noise Regression 341 8.2.5 Semisupervised Support Vector Regression 343 8.2.6 Model Selection in Kernel Regression Methods 345 8.4.1 Comparing Support Vector Regression, Relevance Vector Machines, and Gaussian Process Regression 360 8.4.2 Profile-Dependent Support Vector Regression 362 8.4.3 Multi-output Support Vector Regression 364 8.4.4 Kernel Signal-to-Noise Ratio Regression 366 8.4.5 Semisupervised Support Vector Regression 368 8.4.6 Bayesian Nonparametric Model 369 8.4.7 Gaussian Process Regression 370 8.4.8 Relevance Vector Machines 379 8.5 Concluding Remarks 382 8.6 Questions and Problems 383 9 Adaptive Kernel Learning for Signal Processing 387 9.1 Introduction 387 9.2 Linear Adaptive Filtering 387 9.2.1 Least Mean Squares Algorithm 388 9.2.2 Recursive Least-Squares Algorithm 389 9.3 Kernel Adaptive Filtering 392 9.4 Kernel Least Mean Squares 392 9.4.1 Derivation of Kernel Least Mean Squares 393 9.4.2 Implementation Challenges and Dual Formulation 394 9.5.3 Prediction of the Mackey–Glass Time Series with Kernel Recursive Least Squares 401 9.5.4 Beyond the Stationary Model 402 9.5.5 Example on Nonlinear Channel Identification and Reconvergence 405 9.6 Explicit Recursivity for Adaptive Kernel Models 406 9.6.1 Recursivity in Hilbert Spaces 406 9.6.2 Recursive Filters in Reproducing Kernel Hilbert Spaces 408 9.7 Online Sparsification with Kernels 411 9.7.1 Sparsity by Construction 411 9.7.2 Sparsity by Pruning 413 9.8 Probabilistic Approaches to Kernel Adaptive Filtering 414 9.8.1 Gaussian Processes and Kernel Ridge Regression 415 9.8.2 Online Recursive Solution for Gaussian Processes Regression 416 9.8.3 Kernel Recursive Least Squares Tracker 417 9.8.4 Probabilistic Kernel Least Mean Squares 418 9.9 Further Reading 418 9.9.1 Selection of Kernel Parameters 418 9.9.2 Multi-Kernel Adaptive Filtering 419 9.9.3 Recursive Filtering in Kernel Hilbert Spaces 419 9.10 Tutorials and Application Examples 419 9.10.1 Kernel Adaptive Filtering Toolbox 420 9.10.2 Prediction of a Respiratory Motion Time Series 421 9.10.3 Online Regression on the KIN?h?eK Dataset 423 9.10.4 The Mackey–Glass Time Series 425 9.10.5 Explicit Recursivity on Reproducing Kernel in Hilbert Space and Electroencephalogram Prediction 427 9.10.6 Adaptive Antenna Array Processing 428 9.11 Questions and Problems 430 Part III Classification, Detection, and Feature Extraction 433 10 Support Vector Machine and Kernel Classification Algorithms 435 10.1 Introduction 435 10.2 Support Vector Machine and Kernel Classifiers 435 10.2.1 Support Vector Machines 435 10.2.2 Multiclass and Multilabel Support Vector Machines 441 10.2.3 Least-Squares Support Vector Machine 447 10.2.4 Kernel Fisher’s Discriminant Analysis 448 10.3 Advances in Kernel-Based Classification 452 10.3.1 Large Margin Filtering 452 10.3.2 Semisupervised Learning 454 10.3.3 Multiple Kernel Learning 460 10.3.4 Structured-Output Learning 462 10.3.5 Active Learning 468 10.4 Large-Scale Support Vector Machines 477 10.4.1 Large-Scale Support Vector Machine Implementations 477 10.4.2 Random Fourier Features 478 10.4.3 Parallel Support Vector Machine 480 10.4.4 Outlook 483 10.5 Tutorials and Application Examples 485 10.5.1 Examples of Support Vector Machine Classification 485 10.5.2 Example of Least-Squares Support Vector Machine 492 10.5.3 Kernel-Filtering Support Vector Machine for Brain–Computer Interface Signal Classification 493 10.5.4 Example of Laplacian Support Vector Machine 494 10.5.5 Example of Graph-Based Label Propagation 498 10.5.6 Examples of Multiple Kernel Learning 498 10.6 Concluding Remarks 501 10.7 Questions and Problems 502 11 Clustering and Anomaly Detection with Kernels 503 11.1 Introduction 503 11.2 Kernel Clustering 506 11.2.1 Kernelization of the Metric 506 11.2.2 Clustering in Feature Spaces 508 11.3 Domain Description Via Support Vectors 514 11.3.1 Support Vector Domain Description 514 11.3.2 One-Class Support Vector Machine 515 11.3.3 Relationship Between Support Vector Domain Description and Density Estimation 516 11.3.4 Semisupervised One-Class Classification 517 11.4 Kernel Matched Subspace Detectors 518 11.4.1 Kernel Orthogonal Subspace Projection 518 11.4.2 Kernel Spectral Angle Mapper 520 11.5 Kernel Anomaly Change Detection 522 11.5.1 Linear Anomaly Change Detection Algorithms 522 11.5.2 Kernel Anomaly Change Detection Algorithms 523 11.6 Hypothesis Testing with Kernels 525 11.6.1 Distribution Embeddings 526 11.6.3 Maximum Mean Discrepancy 527 11.6.3 One-Class Support Measure Machine 528 11.7 Tutorials and Application Examples 529 11.7.1 Example on Kernelization of the Metric 529 11.7.2 Example on Kernel k-Means 530 11.7.3 Domain Description Examples 531 11.7.4 Kernel Spectral Angle Mapper and Kernel Orthogonal Subspace Projection Examples 534 11.7.5 Example of Kernel Anomaly Change Detection Algorithms 536 11.7.6 Example on Distribution Embeddings and Maximum Mean Discrepancy 540 11.8 Concluding Remarks 541 11.9 Questions and Problems 542 12 Kernel Feature Extraction in Signal Processing 543 12.1 Introduction 543 12.2 Multivariate Analysis in Reproducing Kernel Hilbert Spaces 545 12.2.1 Problem Statement and Notation 545 12.2.2 Linear Multivariate Analysis 546 12.2.3 Kernel Multivariate Analysis 549 12.2.4 Multivariate Analysis Experiments 551 12.3 Feature Extraction with Kernel Dependence Estimates 555 12.3.1 Feature Extraction Using Hilbert–Schmidt Independence Criterion 556 12.3.2 Blind Source Separation Using Kernels 563 12.4 Extensions for Large-Scale and Semisupervised Problems 570 12.4.2 Efficiency with the Incomplete Cholesky Decomposition 570 12.4.3 Efficiency with Random Fourier Features 570 12.4.3 Sparse Kernel Feature Extraction 571 12.4.4 Semisupervised Kernel Feature Extraction 573 12.5 Domain Adaptation with Kernels 575 12.5.1 Kernel Mean Matching 578 12.5.2 Transfer Component Analysis 579 12.5.3 Kernel Manifold Alignment 581 12.5.4 Relations between Domain Adaptation Methods 585 12.5.5 Experimental Comparison between Domain Adaptation Methods 12.6 Concluding Remarks 587 12.7 Questions and Problems 588 References 589Index 631
£100.76
John Wiley & Sons Inc The Browser Hackers Handbook
Book SynopsisHackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker''s Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer program in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker''s Handbook thoroughly covers complex security issues and explores relevant topics such as: BypassTable of ContentsIntroduction xv Chapter 1 Web Browser Security 1 A Principal Principle 2 Exploring the Browser 3 Symbiosis with the Web Application 4 Same Origin Policy 4 HTTP Headers 5 Markup Languages 5 Cascading Style Sheets 6 Scripting 6 Document Object Model 7 Rendering Engines 7 Geolocation 9 Web Storage 9 Cross-origin Resource Sharing 9 Html 5 10 Vulnerabilities 11 Evolutionary Pressures 12 HTTP Headers 13 Reflected XSS Filtering 15 Sandboxing 15 Anti-phishing and Anti-malware 16 Mixed Content 17 Core Security Problems 17 Attack Surface 17 Surrendering Control 20 TCP Protocol Control 20 Encrypted Communication 20 Same Origin Policy 21 Fallacies 21 Browser Hacking Methodology 22 Summary 28 Questions 28 Notes 29 Chapter 2 Initiating Control 31 Understanding Control Initiation 32 Control Initiation Techniques 32 Using Cross-site Scripting Attacks 32 Using Compromised Web Applications 46 Using Advertising Networks 46 Using Social Engineering Attacks 47 Using Man-in-the-Middle Attacks 59 Summary 72 Questions 73 Notes 73 Chapter 3 Retaining Control 77 Understanding Control Retention 78 Exploring Communication Techniques 79 Using XMLHttpRequest Polling 80 Using Cross-origin Resource Sharing 83 Using WebSocket Communication 84 Using Messaging Communication 86 Using DNS Tunnel Communication 89 Exploring Persistence Techniques 96 Using IFrames 96 Using Browser Events 98 Using Pop-Under Windows 101 Using Man-in-the-Browser Attacks 104 Evading Detection 110 Evasion using Encoding 111 Evasion using Obfuscation 116 Summary 125 Questions 126 Notes 127 Chapter 4 Bypassing the Same Origin Policy 129 Understanding the Same Origin Policy 130 Understanding the SOP with the DOM 130 Understanding the SOP with CORS 131 Understanding the SOP with Plugins 132 Understanding the SOP with UI Redressing 133 Understanding the SOP with Browser History 133 Exploring SOP Bypasses 134 Bypassing SOP in Java 134 Bypassing SOP in Adobe Reader 140 Bypassing SOP in Adobe Flash 141 Bypassing SOP in Silverlight 142 Bypassing SOP in Internet Explorer 142 Bypassing SOP in Safari 143 Bypassing SOP in Firefox 144 Bypassing SOP in Opera 145 Bypassing SOP in Cloud Storage 149 Bypassing SOP in CORS 150 Exploiting SOP Bypasses 151 Proxying Requests 151 Exploiting UI Redressing Attacks 153 Exploiting Browser History 170 Summary 178 Questions 179 Notes 179 Chapter 5 Attacking Users 183 Defacing Content 183 Capturing User Input 187 Using Focus Events 188 Using Keyboard Events 190 Using Mouse and Pointer Events 192 Using Form Events 195 Using IFrame Key Logging 196 Social Engineering 197 Using TabNabbing 198 Using the Fullscreen 199 Abusing UI Expectations 204 Using Signed Java Applets 223 Privacy Attacks 228 Non-cookie Session Tracking 230 Bypassing Anonymization 231 Attacking Password Managers 234 Controlling the Webcam and Microphone 236 Summary 242 Questions 243 Notes 243 Chapter 6 Attacking Browsers 247 Fingerprinting Browsers 248 Fingerprinting using HTTP Headers 249 Fingerprinting using DOM Properties 253 Fingerprinting using Software Bugs 258 Fingerprinting using Quirks 259 Bypassing Cookie Protections 260 Understanding the Structure 261 Understanding Attributes 263 Bypassing Path Attribute Restrictions 265 Overflowing the Cookie Jar 268 Using Cookies for Tracking 270 Sidejacking Attacks 271 Bypassing HTTPS 272 Downgrading HTTPS to HTTP 272 Attacking Certificates 276 Attacking the SSL/TLS Layer 277 Abusing Schemes 278 Abusing iOS 279 Abusing the Samsung Galaxy 281 Attacking JavaScript 283 Attacking Encryption in JavaScript 283 JavaScript and Heap Exploitation 286 Getting Shells using Metasploit 293 Getting Started with Metasploit 294 Choosing the Exploit 295 Executing a Single Exploit 296 Using Browser Autopwn 300 Using BeEF with Metasploit 302 Summary 305 Questions 305 Notes 306 Chapter 7 Attacking Extensions 311 Understanding Extension Anatomy 312 How Extensions Differ from Plugins 312 How Extensions Differ from Add-ons 313 Exploring Privileges 313 Understanding Firefox Extensions 314 Understanding Chrome Extensions 321 Discussing Internet Explorer Extensions 330 Fingerprinting Extensions 331 Fingerprinting using HTTP Headers 331 Fingerprinting using the DOM 332 Fingerprinting using the Manifest 335 Attacking Extensions 336 Impersonating Extensions 336 Cross-context Scripting 339 Achieving OS Command Execution 355 Achieving OS Command Injection 359 Summary 364 Questions 365 Notes 365 Chapter 8 Attacking Plugins 371 Understanding Plugin Anatomy 372 How Plugins Differ from Extensions 372 How Plugins Differ from Standard Programs 374 Calling Plugins 374 How Plugins are Blocked 376 Fingerprinting Plugins 377 Detecting Plugins 377 Automatic Plugin Detection 379 Detecting Plugins in BeEF 380 Attacking Plugins 382 Bypassing Click to Play 382 Attacking Java 388 Attacking Flash 400 Attacking ActiveX Controls 403 Attacking PDF Readers 408 Attacking Media Plugins 410 Summary 415 Questions 416 Notes 416 Chapter 9 Attacking Web Applications 421 Sending Cross-origin Requests 422 Enumerating Cross-origin Quirks 422 Preflight Requests 425 Implications 425 Cross-origin Web Application Detection 426 Discovering Intranet Device IP Addresses 426 Enumerating Internal Domain Names 427 Cross-origin Web Application Fingerprinting 429 Requesting Known Resources 430 Cross-origin Authentication Detection 436 Exploiting Cross-site Request Forgery 440 Understanding Cross-site Request Forgery 440 Attacking Password Reset with XSRF 443 Using CSRF Tokens for Protection 444 Cross-origin Resource Detection 445 Cross-origin Web Application Vulnerability Detection 450 SQL Injection Vulnerabilities 450 Detecting Cross-site Scripting Vulnerabilities 465 Proxying through the Browser 469 Browsing through a Browser 472 Burp through a Browser 477 Sqlmap through a Browser 480 Browser through Flash 482 Launching Denial-of-Service Attacks 487 Web Application Pinch Points 487 DDoS Using Multiple Hooked Browsers 489 Launching Web Application Exploits 493 Cross-origin DNS Hijack 493 Cross-origin JBoss JMX Remote Command Execution 495 Cross-origin GlassFish Remote Command Execution 497 Cross-origin m0n0wall Remote Command Execution 501 Cross-origin Embedded Device Command Execution 502 Summary 508 Questions 508 Notes 509 Chapter 10 Attacking Networks 513 Identifying Targets 514 Identifying the Hooked Browser’s Internal IP 514 Identifying the Hooked Browser’s Subnet 520 Ping Sweeping 523 Ping Sweeping using XMLHttpRequest 523 Ping Sweeping using Java 528 Port Scanning 531 Bypassing Port Banning 532 Port Scanning using the IMG Tag 537 Distributed Port Scanning 539 Fingerprinting Non-HTTP Services 542 Attacking Non-HTTP Services 545 NAT Pinning 545 Achieving Inter-protocol Communication 549 Achieving Inter-protocol Exploitation 564 Getting Shells using BeEF Bind 579 The BeEF Bind Shellcode 579 Using BeEF Bind in your Exploits 585 Using BeEF Bind as a Web Shell 596 Summary 599 Questions 600 Notes 601 Chapter 11 Epilogue: Final Thoughts 605 Index 609
£42.75
John Wiley & Sons Inc Whois Running the Internet
Book SynopsisDiscusses the evolution of WHOIS and how policy changes will affect WHOIS' place in IT today and in the futureThis book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and how WHOIS fits in the overall structure of the Domain Name System (DNS). Other technical topics covered include WHOIS query code and WHOIS server details. The book also discusses current policy developments and implementations, reviews critical policy documents, and explains how they will affect the future of the Internet and WHOIS. Additional resources and content updates will be provided through a supplementary website. Includes an appendix with information on current and authoritative WHOIS services around the world Provides illustrations of actual WHOIS records and screenshots of web-based WHOIS query interfaces with inTable of ContentsIntroduction: What is WHOIS? 1 I.1 Conventions Used in this Text 4 I.2 Flow of this Text 5 I.3 WHOIS from versus WHOIS about 5 I.4 Origin of the Term WHOIS 6 I.5 Why WHOIS Is Important (or Should Be) to Everyone 7 I.6 What Kind of Use and Contact is Permitted for WHOIS 7 I.7 Where is the WHOIS Data? 8 I.8 Identifying Remote Communication Sources 8 I.9 Getting Documentation 11 1 The History of WHOIS 13 1.1 In the Beginning 13 1.2 The Sands of Time 14 1.2.1 Seals 15 1.2.2 From Signal Fires on the Great Wall to Telegraphy 15 1.2.3 The Eye of Horus 17 1.3 1950s: On the Wires and in the Air 18 1.3.1 Sputnik Changes Everything 18 1.3.2 Telegraphs, Radio, Teletype, and Telephones 19 1.3.3 WRU: The First WHOIS 20 1.4 1960s: Sparking the Internet to Life 26 1.4.1 SRI, SAIL, and ITS 26 1.4.2 Doug Engelbart: The Father of Office Automation 27 1.5 1970s: Ok, Now That We Have an Internet, How Do We Keep Track of Everyone? 27 1.5.1 Elizabeth “Jake” Feinler 27 1.5.2 The ARPANET Directory as Proto‐WHOIS 27 1.5.3 The Site Status List 28 1.5.4 Distribution of the HOSTS Table 30 1.5.5 Finger 30 1.5.6 Sockets 31 1.5.7 Into the VOID with NLS IDENTFILE 32 1.5.8 NAME/FINGER RFC 742 (1977) 33 1.5.9 Other Early Models 35 1.6 1980s: WHOIS Gets Its Own RFC 36 1.6.1 The DNS 37 1.6.2 WHOIS Updated for Domains (1985) 38 1.6.3 Oops! The Internet Goes Public 39 1.7 1990s: The Internet as We Know It Emerges 40 1.7.1 Referral WHOIS or RWhois RFC 1714 (1994) 41 1.7.2 WHOIS++ RFCs 1834 and 1835 (1995) 41 1.7.3 ICANN Takes over WHOIS (1998) 42 1.8 2000s: WHOIS Standards 42 1.8.1 ICANN’s Registrar Accreditation Agreement and WHOIS (2001) 43 1.8.2 WHOIS Protocol Specification 2004 RFC 3912 (2004) 43 1.8.3 Creaking of Politics 44 References 45 2 Using WHOIS 47 2.1 Domain WHOIS Data 48 2.1.1 Record Terminology 48 2.2 Domain WHOIS Fields 52 2.2.1 Status 54 2.2.2 Registrar 54 2.2.3 Nameservers 55 2.2.4 Registrant, Administrative, Technical, and Billing 56 2.2.5 Names and Organizations 56 2.2.6 Emails 57 2.2.7 Addresses 58 2.2.8 Phone Numbers 58 2.2.9 Record Dates 59 2.2.10 DNSSEC 59 2.2.11 Other Information 60 2.3 Getting Records about Various Resources 60 2.3.1 Starting at the Top: The Empty Domain 60 2.3.2 Query WHOIS for a TLD as a Domain 61 2.3.3 WHOIS for a Registrar or Registry 62 2.3.4 Nameservers 63 2.3.5 Registrar and Registry 64 2.3.6 Special Cases 65 2.3.7 Dealing with Weird Results 73 2.4 IP WHOIS 74 2.4.1 Five Regional NICs 75 2.4.2 CIDR and ASN 80 2.4.3 IPv4 and IPv6 81 2.5 ccTLDs and IDNs 82 2.5.1 ccTLDs 82 2.5.2 IDNs 84 2.5.3 Language versus Script 85 2.5.4 ASCII 85 2.5.5 Unicode 86 2.5.6 Getting WHOIS Records for IDNs 87 2.6 WHOIS Services 87 2.6.1 Port 43 Command Line or Terminal 88 2.6.2 Clients 89 2.6.3 Representational State Transfer (RESTFul) WHOIS 97 2.6.4 Web‐Based WHOIS 97 2.6.5 Telnet to WHOIS Server 99 2.6.6 More Services, Software, and Packages 100 2.6.7 WHOIS Functions, Switches, and Tricks 102 2.6.8 Obscure, Archaic, and Obsolete WHOIS Services 104 References 105 3 Research and Investigations 107 3.1 Completely Disassembling a WHOIS Record 108 3.1.1 A Normal, Safe Domain: cnn.com 108 3.1.2 Deconstructing the WHOIS for a Spammed Domain 116 3.1.3 Illicit Domain WHOIS 120 3.1.4 Virus Domain WHOIS 121 3.1.5 Tracking Cybersquatters and Serial Trademark Violators 123 3.1.6 Network Security Administrator Issues 124 3.1.7 Protecting Your Domain with Accurate WHOIS 125 3.2 More Tools 126 3.2.1 Ping 126 3.2.2 Traceroute 126 3.2.3 Secondary Sources, Historical Data, and Additional Tools 126 References 129 4 WHOIS in the Domain Name System (DNS) 131 4.1 The Big Mistake 131 4.2 Basics of the DNS 133 4.2.1 TCP/IP, Layers, and Resolvers 133 4.2.2 How a Domain Becomes a Website 134 4.2.3 WHOIS Pervades the DNS 134 4.2.4 ICANN, IANA, Registries, and Registrars 135 4.2.5 .ARPA: Special Architectural TLD 138 4.2.6 Setting the Example with Reserved Domains 139 4.2.7 DNS RFCs 882, 883, 1033, and 1034 140 4.3 DNS RR 141 4.3.1 Berkeley Internet Name Domain 141 4.3.2 Shared WHOIS Project 141 4.3.3 Using the DiG 142 4.3.4 Graphic DNS Software and Websites 145 4.3.5 Finding Hidden Registrars and Tracking Roots 146 4.3.6 Traceroute 150 4.4 Outside the DNS: An Internet without WHOIS 153 4.4.1 The Onion Routing 153 4.4.2 .ONION and Other TLDs 155 Reference 157 5 WHOIS Code 159 5.1 Automating WHOIS with Batching and Scripting 159 5.1.1 DiG Example 159 5.1.2 DOS Batch File Example 160 5.1.3 VBScript Example 160 5.2 WHOIS Client Code 161 5.2.1 What a WHOIS Client Should Do 161 5.2.2 Early Versions 163 5.2.3 C/C++ 164 5.2.4 Perl 168 5.2.5 Java 169 5.2.6 Recursive Python WHOIS by Peter Simmons 169 5.2.7 Lisp WHOIS by Evrim Ulu 169 5.3 Web WHOIS Forms 170 5.3.1 Creating a WHOIS Web Interface with PHP 170 5.4 Parsing WHOIS Records 171 5.4.1 Ruby WHOIS by Simone Carletti 171 5.4.2 Regular Expressions 173 6 WHOIS Servers 175 6.1 Historical Servers 176 6.2 Server Standards and ICANN Requirements 177 6.3 Finding the Right Server 178 6.4 Installing and Configuring WHOIS Servers 180 6.4.1 JWhoisServer by Klaus Zerwes 180 6.4.2 WHOIS Daemon 186 6.5 WHOIS Database 186 7 WHOIS Policy Issues 189 7.1 The WHOIS Policy Debate 189 7.1.1 Basic Policy 191 7.1.2 ICANN Registrar Accreditation Agreement WHOIS Standards 191 7.1.3 Lack of Language Support in WHOIS 193 7.1.4 Abuses 193 7.1.5 Privacy 195 7.1.6 Source of Concerns 197 7.1.7 Creating Balance 197 7.1.8 European Privacy Laws and WHOIS 200 7.1.9 Drawing the Line 201 7.1.10 Uniform Domain‐Name Dispute‐Resolution Policy 203 7.1.11 WHOIS Inaccuracy, Falsification, Obfuscation, and Access Denial 209 7.2 Studies, Reports, and Activities on WHOIS 209 7.2.1 SSAC (2002) 210 7.2.2 Benjamin Edelman Congressional Testimony on WHOIS (2003) 210 7.2.3 US Government Accountability Office Report on Prevalence of False Contact Information in WHOIS (2005) 211 7.2.4 WHOIS Study Hypotheses Group Report to the GNSO Council (2008) 211 7.2.5 National Opinion Research Center at the University of Chicago (2009) 212 7.2.6 WHOIS Policy Review Team Final Report (2012) 212 7.3 WHOIS Enforcement and Nonenforcement at ICANN 213 7.3.1 Tracking ICANN’s Response to WHOIS Inaccuracy 215 7.3.2 ICANN Compliance Designed for Failure 218 7.3.3 ICANN’s Contract with Registrars Not Enforceable on WHOIS Accuracy 219 References 223 8 The Future of WHOIS 225 8.1 New gTLDs 226 8.2 WHOIS‐Based Extensible Internet Registration Data Service (WEIRDS) 227 8.3 Aggregated Registry Data Services (ARDS) 230 8.4 Truly Solving the Problem 231 8.5 Conclusion: The Domain Money Wall—or Why ICANN Will Never Fix WHOIS 232 Appendix A: WHOIS Code 237 Appendix B: WHOIS Servers 293 Index 331
£78.26
John Wiley & Sons Inc Big Data
Book SynopsisLeverage big data to add value to your business Social media analytics, web-tracking, and other technologies help companies acquire and handle massive amounts of data to better understand their customers, products, competition, and markets.Table of ContentsPreface xix Introduction xxi 1 The Big Data Business Opportunity 1 The Business Transformation Imperative 3 Walmart Case Study 3 The Big Data Business Model Maturity Index 5 Business Monitoring 7 Business Insights 7 Business Optimization 9 Data Monetization 10 Business Metamorphosis 12 Big Data Business Model Maturity Observations 16 Summary 18 2 Big Data History Lesson 19 Consumer Package Goods and Retail Industry Pre-1988 19 Lessons Learned and Applicability to Today’s Big Data Movement 23 Summary 24 3 Business Impact of Big Data 25 Big Data Impacts: The Questions Business Users Can Answer 26 Managing Using the Right Metrics 27 Data Monetization Opportunities 30 Digital Media Data Monetization Example 30 Digital Media Data Assets and Understanding Target Users 31 Data Monetization Transformations and Enrichments 32 Summary 34 4 Organizational Impact of Big Data 37 Data Analytics Lifecycle 40 Data Scientist Roles and Responsibilities 42 Discovery 43 Data Preparation 43 Model Planning 44 Model Building 44 Communicate Results 45 Operationalize 46 New Organizational Roles 46 User Experience Team 46 New Senior Management Roles 47 Liberating Organizational Creativity 49 Summary 51 5 Understanding Decision Theory 53 Business Intelligence Challenge 53 The Death of Why 55 Big Data User Interface Ramifications 56 The Human Challenge of Decision Making 58 Traps in Decision Making 58 What Can One Do? 62 Summary 63 6 Creating the Big Data Strategy 65 The Big Data Strategy Document 66 Customer Intimacy Example 67 Turning the Strategy Document into Action 69 Starbucks Big Data Strategy Document Example 70 San Francisco Giants Big Data Strategy Document Example 73 Summary 77 7 Understanding Your Value Creation Process 79 Understanding the Big Data Value Creation Drivers 81 Driver #1: Access to More Detailed Transactional Data 82 Driver #2: Access to Unstructured Data 82 Driver #3: Access to Low-latency (Real-Time) Data 83 Driver #4: Integration of Predictive Analytics 84 Big Data Envisioning Worksheet 85 Big Data Business Drivers: Predictive Maintenance Example 86 Big Data Business Drivers: Customer Satisfaction Example 87 Big Data Business Drivers: Customer Micro-segmentation Example 89 Michael Porter’s Valuation Creation Models 91 Michael Porter’s Five Forces Analysis 91 Michael Porter’s Value Chain Analysis 93 Value Creation Process: Merchandising Example 94 Summary 104 8 Big Data User Experience Ramifications 105 The Unintelligent User Experience 106 Understanding the Key Decisions to Build a Relevant User Experience 107 Using Big Data Analytics to Improve Customer Engagement 108 Uncovering and Leveraging Customer Insights 110 Rewiring Your Customer Lifecycle Management Processes 112 Using Customer Insights to Drive Business Profitability 113 Big Data Can Power a New Customer Experience 116 B2C Example: Powering the Retail Customer Experience 116 B2B Example: Powering Small- and Medium-Sized Merchant Effectiveness 119 Summary 122 9 Identifying Big Data Use Cases 125 The Big Data Envisioning Process 126 Step 1: Research Business Initiatives 127 Step 2: Acquire and Analyze Your Data 129 Step 3: Ideation Workshop: Brainstorm New Ideas 132 Step 4: Ideation Workshop: Prioritize Big Data Use Cases 138 Step 5: Document Next Steps 139 The Prioritization Process 140 The Prioritization Matrix Process 142 Prioritization Matrix Traps 143 Using User Experience Mockups to Fuel the Envisioning Process 145 Summary 149 10 Solution Engineering 151 The Solution Engineering Process 151 Step 1: Understand How the Organization Makes Money 153 Step 2: Identify Your Organization’s Key Business Initiatives 155 Step 3: Brainstorm Big Data Business Impact 156 Step 4: Break Down the Business Initiative into Use Cases 157 Step 5: Prove Out the Use Case 158 Step 6: Design and Implement the Big Data Solution. 159 Solution Engineering Tomorrow’s Business Solutions 161 Customer Behavioral Analytics Example 162 Predictive Maintenance Example 163 Marketing Effectiveness Example 164 Fraud Reduction Example 166 Network Optimization Example 166 Reading an Annual Report 167 Financial Services Firm Example 168 Retail Example 169 Brokerage Firm Example 171 Summary 172 11 Big Data Architectural Ramifications 173 Big Data: Time for a New Data Architecture 173 Introducing Big Data Technologies 175 Apache Hadoop 176 Hadoop MapReduce 177 Apache Hive 178 Apache HBase 178 Pig 178 New Analytic Tools 179 New Analytic Algorithms 180 Bringing Big Data into the Traditional Data Warehouse World 181 Data Enrichment: Think ELT, Not ETL 181 Data Federation: Query is the New ETL 183 Data Modeling: Schema on Read 184 Hadoop: Next Gen Data Staging and Prep Area 185 MPP Architectures: Accelerate Your Data Warehouse 187 In-database Analytics: Bring the Analytics to the Data 188 Cloud Computing: Providing Big Data Computational Power 190 Summary 191 12 Launching Your Big Data Journey 193 Explosive Data Growth Drives Business Opportunities 194 Traditional Technologies and Approaches Are Insufficient 195 The Big Data Business Model Maturity Index 197 Driving Business and IT Stakeholder Collaboration 198 Operationalizing Big Data Insights 199 Big Data Powers the Value Creation Process 200 Summary 202 13 Call to Action 203 Identify Your Organization’s Key Business Initiatives 203 Start with Business and IT Stakeholder Collaboration 204 Formalize Your Envisioning Process 204 Leverage Mockups to Fuel the Creative Process 205 Understand Your Technology and Architectural Options 205 Build off Your Existing Internal Business Processes 206 Uncover New Monetization Opportunities 206 Understand the Organizational Ramifications 207 Index 209
£24.79
John Wiley & Sons Inc Cabling
Book SynopsisDevelop the skills you need to design and build a reliable, cost-effective cabling infrastructure Fully updated for the growing demand of fiber optics for large-scale communications networks and telecommunication standards, this new edition is organized into two parts.Table of ContentsIntroduction xxxiii Part I LAN Networks and Cabling Systems 1 Chapter 1 Introduction to Data Cabling 3 Chapter 2 Cabling Specifications and Standards 57 Chapter 3 Choosing the Correct Cabling 103 Chapter 4 Cable System and Infrastructure Constraints 133 Chapter 5 Cabling System Components 157 Chapter 6 Tools of the Trade 183 Chapter 7 Copper Cable Media 215 Chapter 8 Fiber-Optic Media 255 Chapter 9 Wall Plates 281 Chapter 10 Connectors 299 Chapter 11 Network Equipment 325 Chapter 12 Wireless Networks 343 Chapter 13 Cabling System Design and Installation 367 Chapter 14 Cable Connector Installation 401 Chapter 15 Cable System Testing and Troubleshooting 433 Chapter 16 Creating a Request for Proposal 467 Chapter 17 Cabling @ Work: Experience from the Field 493 Part II Fiber-Optic Cabling and Components 507 Chapter 18 History of Fiber Optics and Broadband Access 509 Chapter 19 Principles of Fiber-Optic Transmission 519 Chapter 20 Basic Principles of Light 539 Chapter 21 Optical Fiber Construction and Theory 555 Chapter 23 Safety 605 Chapter 24 Fiber-Optic Cables 621 Chapter 25 Splicing 653 Chapter 26 Connectors 693 Chapter 27 Fiber-Optic Light Sources and Transmitters 763 Chapter 28 Fiber-Optic Detectors and Receivers 793 Chapter 29 Passive Components and Multiplexers 819 Chapter 30 Passive Optical Networks 849 Chapter 31 Cable Installation and Hardware 869 Chapter 32 Fiber-Optic System Design Considerations 903 Chapter 33 Test Equipment and Link/Cable Testing 941 Chapter 34 Troubleshooting and Restoration 995 Appendices 1037 Appendix A The Bottom Line 1039 Appendix B Cabling Resources 1097 Appendix C Registered Communications Distribution Designer (RCDD) Certification 1103 Appendix D Home Cabling: Wiring Your Home for Now and the Future 1109 Appendix E Overview of IEEE 1394 and USB Networking 1115 Appendix F The Electronics Technicians Association, International (ETA) Certifications 1121 Glossary Index 1241
£70.30
John Wiley & Sons Inc Hacking Point of Sale
Book SynopsisMust-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately.Table of ContentsIntroduction xxiii Part I Anatomy of Payment Application Vulnerabilities 1 Chapter 1 Processing Payment Transactions 3 Chapter 2 Payment Application Architecture 25 Chapter 3 PCI 55 Part II Attacks on Point of Sale Systems 91 Chapter 4 Turning 40 Digits into Gold 93 Chapter 5 Penetrating Security Free Zones 125 Chapter 6 Breaking into PCI-protected Areas 147 Part III Defense 165 Chapter 7 Cryptography in Payment Applications 167 Chapter 8 Protecting Cardholder Data 195 Chapter 9 Securing Application Code 219 Conclusion 249 Appendix A POS Vulnerability Rank Calculator 251 Appendix B Glossary 257 Index 265
£45.12
John Wiley & Sons Inc The Art of Memory Forensics
Book SynopsisMemory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes.Table of ContentsIntroduction xvii I An Introduction to Memory Forensics 1 1 Systems Overview 3 Digital Environment 3 PC Architecture 4 Operating Systems 17 Process Management 18 Memory Management 20 File System 24 I/O Subsystem 25 Summary 26 2 Data Structures 27 Basic Data Types 27 Summary 43 3 The Volatility Framework 45 Why Volatility? 45 What Volatility Is Not 46 Installation 47 The Framework 51 Using Volatility 59 Summary 67 4 Memory Acquisition 69 Preserving the Digital Environment 69 Software Tools 79 Memory Dump Formats 95 Converting Memory Dumps 106 Volatile Memory on Disk 107 Summary 114 II Windows Memory Forensics 115 5 Windows Objects and Pool Allocations 117 Windows Executive Objects 117 Pool-Tag Scanning 129 Limitations of Pool Scanning 140 Big Page Pool 142 Pool-Scanning Alternatives 146 Summary 148 6 Processes, Handles, and Tokens 149 Processes 149 Process Tokens 164 Privileges 170 Process Handles 176 Enumerating Handles in Memory 181 Summary 187 7 Process Memory Internals 189 What’s in Process Memory? 189 Enumerating Process Memory 193 Summary 217 8 Hunting Malware in Process Memory 219 Process Environment Block 219 PE Files in Memory 238 Packing and Compression 245 Code Injection 251 Summary 263 9 Event Logs 265 Event Logs in Memory 265 Real Case Examples 275 Summary 279 10 Registry in Memory 281 Windows Registry Analysis 281 Volatility’s Registry API 292 Parsing Userassist Keys 295 Detecting Malware with the Shimcache 297 Reconstructing Activities with Shellbags 298 Dumping Password Hashes 304 Obtaining LSA Secrets 305 Summary 307 11 Networking 309 Network Artifacts 309 Hidden Connections 323 Raw Sockets and Sniffers 325 Next Generation TCP/IP Stack 327 Internet History 333 DNS Cache Recovery 339 Summary 341 12 Windows Services 343 Service Architecture 343 Installing Services 345 Tricks and Stealth 346 Investigating Service Activity 347 Summary 366 13 Kernel Forensics and Rootkits 367 Kernel Modules 367 Modules in Memory Dumps 372 Threads in Kernel Mode 378 Driver Objects and IRPs 381 Device Trees 386 Auditing the SSDT 390 Kernel Callbacks 396 Kernel Timers 399 Putting It All Together 402 Summary 406 14 Windows GUI Subsystem, Part I 407 The GUI Landscape 407 GUI Memory Forensics 410 The Session Space 410 Window Stations 416 Desktops 422 Atoms and Atom Tables 429 Windows 435 Summary 452 15 Windows GUI Subsystem, Part II 453 Window Message Hooks 453 User Handles 459 Event Hooks 466 Windows Clipboard 468 Case Study: ACCDFISA Ransomware 472 Summary 476 16 Disk Artifacts in Memory 477 Master File Table 477 Extracting Files 493 Defeating TrueCrypt Disk Encryption 503 Summary 510 17 Event Reconstruction 511 Strings 511 Command History 523 Summary 536 18 Timelining 537 Finding Time in Memory 537 Generating Timelines 539 Gh0st in the Enterprise 543 Summary 573 III Linux Memory Forensics 575 19 Linux Memory Acquisition 577 Historical Methods of Acquisition 577 Modern Acquisition 579 Volatility Linux Profiles 583 Summary 589 20 Linux Operating System 591 ELF Files 591 Linux Data Structures 603 Linux Address Translation 607 procfs and sysfs 609 Compressed Swap 610 Summary 610 21 Processes and Process Memory 611 Processes in Memory 611 Enumerating Processes 613 Process Address Space 616 Process Environment Variables 625 Open File Handles 626 Saved Context State 630 Bash Memory Analysis 630 Summary 635 22 Networking Artifacts 637 Network Socket File Descriptors 637 Network Connections 640 Queued Network Packets 643 Network Interfaces 646 The Route Cache 650 ARP Cache 652 Summary655 23 Kernel Memory Artifacts 657 Physical Memory Maps 657 Virtual Memory Maps 661 Kernel Debug Buffer 663 Loaded Kernel Modules 667 Summary 673 24 File Systems in Memory 675 Mounted File Systems 675 Listing Files and Directories 681 Extracting File Metadata 684 Recovering File Contents 691 Summary 695 25 Userland Rootkits 697 Shellcode Injection 698 Process Hollowing 703 Shared Library Injection 705 LD_PRELOAD Rootkits 712 GOT/PLT Overwrites 716 Inline Hooking 718 Summary 719 26 Kernel Mode Rootkits 721 Accessing Kernel Mode 721 Hidden Kernel Modules 722 Hidden Processes 728 Elevating Privileges 730 System Call Handler Hooks 734 Keyboard Notifiers 735 TTY Handlers 739 Network Protocol Structures 742 Netfilter Hooks 745 File Operations 748 Inline Code Hooks 752 Summary754 27 Case Study: Phalanx2 755 Phalanx2 755 Phalanx2 Memory Analysis 757 Reverse Engineering Phalanx2 763 Final Thoughts on Phalanx2 772 Summary 772 IV Mac Memory Forensics 773 28 Mac Acquisition and Internals 775 Mac Design 775 Memory Acquisition 780 Mac Volatility Profiles 784 Mach-O Executable Format 787 Summary 791 29 Mac Memory Overview 793 Mac versus Linux Analysis 793 Process Analysis 794 Address Space Mappings 799 Networking Artifacts 804 SLAB Allocator 808 Recovering File Systems from Memory 811 Loaded Kernel Extensions 815 Other Mac Plugins 818 Mac Live Forensics 819 Summary 821 30 Malicious Code and Rootkits 823 Userland Rootkit Analysis 823 Kernel Rootkit Analysis 828 Common Mac Malware in Memory 838 Summary 844 31 Tracking User Activity 845 Keychain Recovery 845 Mac Application Analysis 849 Summary 858 Index 859
£49.40
John Wiley & Sons Inc Professional Microsoft SQL Server 2014
Book SynopsisFill the gap between planning and doing with SSIS 2014 The 2014 release of Microsoft's SQL Server Integration Services provides enhancements for managing extraction, transformation, and load operations, plus expanded in-memory capabilities, improved disaster recovery, increased scalability, and much more.Trade ReviewThis book is suitable for both developers that are new to SSIS development, and experienced developers looking for a more complete understanding. I highly recommend it. (I Programmer, July 2014)Table of ContentsIntroduction xxvii Chapter 1: Welcome to SQL Server Integration Services 1 SQL Server SSIS Historical Overview 2 What’s New in SSIS 2 Tools of the Trade 3 Import and Export Wizard 3 The SQL Server Data Tools Experience 4 SSIS Architecture 5 Packages 5 Control Flow 5 Data Flow 9 Variables 14 Parameters 14 Error Handling and Logging 14 Editions of SQL Server 14 Summary 15 Chapter 2: The SSIS Tools 17 Import and Export Wizard 17 SQL Server Data Tools 24 The Solution Explorer Window 26 The SSIS Toolbox 27 The Properties Windows 28 The SSIS Package Designer 28 Control Flow 29 Connection Managers 32 Variables 33 Data Flow 34 Parameters 35 Event Handlers 35 Package Explorer 36 Executing a Package 37 Management Studio 37 Summary 37 Chapter 3: SSIS Tasks 39 SSIS Task Objects 40 Using the Task Editor 40 The Task Editor Expressions Tab 41 Looping and Sequence Tasks 41 Script Task (.NET) 41 Analysis Services Tasks 44 Analysis Services Execute DDL Task 44 Analysis Services Processing Task 44 Data Mining Query Task 46 Data Flow Task 47 Data Preparation Tasks 48 Data Profiler 48 File System Task 50 Archiving a File 52 FTP Task 53 Getting a File Using FTP 54 Web Service Task 56 Retrieving Data Using the Web Service Task and XML Source Component 59 XML Task 62 Validating an XML File 64 RDBMS Server Tasks 66 Bulk Insert Task 66 Using the Bulk Insert Task 69 Execute SQL Task 71 Workflow Tasks 82 Execute Package Task 82 Execute Process Task 84 Message Queue Task 86 Send Mail Task 87 WMI Data Reader Task 88 WMI Event Watcher Task 91 Polling a Directory for the Delivery of a File 91 SMO Administration Tasks 92 Transfer Database Task 93 Transfer Error Messages Task 94 Transfer Logins Task 94 Transfer Master Stored Procedures Task 95 Transfer Jobs Task 96 Transfer SQL Server Objects Task 96 Summary 97 Chapter 4: The Data Flow 99 Understanding the Data Flow 99 Data Viewers 100 Sources 101 OLE DB Source 102 Excel Source 104 Flat File Source 105 Raw File Source 110 XML Source 110 ADO.NET Source 111 Destinations 111 Excel Destination 112 Flat File Destination 112 OLE DB Destination 112 Raw File Destination 113 Recordset Destination 114 Data Mining Model Training 114 DataReader Destination 114 Dimension and Partition Processing 114 Common Transformations 115 Synchronous versus Asynchronous Transformations 115 Aggregate 115 Conditional Split 117 Data Conversion 118 Derived Column 119 Lookup 121 Row Count 121 Script Component 122 Slowly Changing Dimension 123 Sort 123 Union All 125 Other Transformations 126 Audit 126 Character Map 128 Copy Column 128 Data Mining Query 129 DQS Cleansing 130 Export Column 130 Fuzzy Lookup 132 Fuzzy Grouping 139 Import Column 143 Merge 145 Merge Join 146 Multicast 146 OLE DB Command 147 Percentage and Row Sampling 148 Pivot Transform 149 Unpivot 152 Term Extraction 154 Term Lookup 158 Data Flow Example 160 Summary 164 Chapter 5: Using Variables, Parameters, and Expressions 165 Dynamic Package Objects 166 Variable Overview 166 Parameter Overview 166 Expression Overview 167 Understanding Data Types 168 SSIS Data Types 168 Date and Time Type Support 170 How Wrong Data Types and Sizes Can Affect Performance 171 Unicode and Non-Unicode Conversion Issues 171 Casting in SSIS Expressions 173 Using Variables and Parameters 174 Defining Variables 174 Defining Parameters 175 Variable and Parameter Data Types 176 Working with Expressions 177 C#-Like? Close, but Not Completely 178 The Expression Builder 179 Syntax Basics 180 Using Expressions in SSIS Packages 194 Summary 204 Chapter 6: Containers 205 Task Host Containers 205 Sequence Containers 206 Groups 207 For Loop Container 207 Foreach Loop Container 210 Foreach File Enumerator Example 211 Foreach ADO Enumerator Example 213 Summary 218 Chapter 7: Joining Data 219 The Lookup Transformation 220 Using the Merge Join Transformation 221 Contrasting SSIS and the Relational Join 222 Lookup Features 224 Building the Basic Package 225 Using a Relational Join in the Source 227 Using the Merge Join Transformation 230 Using the Lookup Transformation 235 Full-Cache Mode 235 No-Cache Mode 239 Partial-Cache Mode 240 Multiple Outputs 243 Expressionable Properties 246 Cascaded Lookup Operations 247 Cache Connection Manager and Cache Transform 249 Summary 252 Chapter 8: Creating an End-to-End Package 253 Basic Transformation Tutorial 253 Creating Connections 254 Creating the Control Flow 257 Creating the Data Flow 257 Completing the Package 259 Saving the Package 260 Executing the Package 260 Typical Mainframe ETL with Data Scrubbing 261 Creating the Data Flow 263 Handling Dirty Data 263 Finalizing 268 Handling More Bad Data 269 Looping and the Dynamic Tasks 271 Looping 271 Making the Package Dynamic 272 Summary 274 Chapter 9: Scripting in SSIS 275 Introducing SSIS Scripting 276 Getting Started in SSIS Scripting 277 Selecting the Scripting Language 277 Using the VSTA Scripting IDE 278 Example: Hello World 279 Adding Code and Classes 281 Using Managed Assemblies 282 Example: Using Custom .NET Assemblies 283 Using the Script Task 286 Configuring the Script Task Editor 287 The Script Task Dts Object 288 Accessing Variables in the Script Task 289 Connecting to Data Sources in a Script Task 293 Raising an Event in a Script Task 303 Writing a Log Entry in a Script Task 309 Using the Script Component 310 Differences from a Script Task 310 Configuring the Script Component Editor 311 Accessing Variables in a Script Component 313 Connecting to Data Sources in a Script Component 314 Raising Events 314 Logging 315 Example: Data Validation 316 Synchronous versus Asynchronous 324 Essential Coding, Debugging, and Troubleshooting Techniques 327 Structured Exception Handling 327 Script Debugging and Troubleshooting 330 Summary 333 Chapter 10: Advanced Data Cleansing in SSIS 335 Advanced Derived Column Use 336 Text Parsing Example 338 Advanced Fuzzy Lookup and Fuzzy Grouping 340 Fuzzy Lookup 340 Fuzzy Grouping 347 DQS Cleansing 350 Data Quality Services 351 DQS Cleansing Transformation 355 Master Data Management 358 Master Data Services 359 Summary 362 Chapter 11: Incremental Loads in SSIS 363 Control Table Pattern 363 Querying the Control Table 364 Querying the Source Table 366 Updating the Control Table 366 SQL Server Change Data Capture 367 Benefits of SQL Server CDC 368 Preparing CDC 369 Capture Instance Tables 371 The CDC API 372 Using the SSIS CDC Tools 374 Summary 379 Chapter 12: Loading a Data Warehouse 381 Data Profiling 383 Initial Execution of the Data Profiling Task 383 Reviewing the Results of the Data Profiling Task 386 Turning Data Profile Results into Actionable ETL Steps 390 Data Extraction and Cleansing 391 Dimension Table Loading 391 Loading a Simple Dimension Table 392 Loading a Complex Dimension Table 397 Considerations and Alternatives to the SCD Transformation 408 Fact Table Loading 409 SSAS Processing 421 Using a Master ETL Package 426 Summary 428 Chapter 13: Using the Relational Engine 429 Data Extraction 430 SELECT * is Bad 430 WHERE is Your Friend 432 Transform during Extract 433 Many ANDs Make Light Work 437 SORT in the Database 437 Modularize 439 SQL Server Does Text Files Too 440 Using Set-Based Logic 444 Data Loading 446 Database Snapshots 446 The MERGE Operator 448 Summary 452 Chapter 14: Accessing Heterogeneous Data 453 Excel and Access 455 64-Bit Support 455 Working with Excel Files 457 Working with Access 462 Importing from Oracle 469 Oracle Client Setup 469 Importing Oracle Data 470 Using XML and Web Services 472 Configuring the Web Service Task 472 Working with XML Data as a Source 483 Flat Files 486 Loading Flat Files 487 Extracting Data from Flat Files 489 ODBC 491 Other Heterogeneous Sources 494 Summary 495 Chapter 15: Reliability and Scalability 497 Restarting Packages 498 Simple Control Flow 499 Containers within Containers and Checkpoints 501 Variations on a Theme 503 Inside the Checkpoint File 505 Package Transactions 507 Single Package, Single Transaction 508 Single Package, Multiple Transactions 509 Two Packages, One Transaction 511 Single Package Using a Native Transaction in SQL Server 512 Error Outputs 513 Scaling Out 516 Architectural Features 516 Scaling Out Memory Pressures 517 Scaling Out by Staging Data 517 Scaling Out with Parallel Loading 522 Summary 528 Chapter 16: Understanding and Tuning the Data Flow Engine 529 The SSIS Engine 530 Understanding the SSIS Data Flow and Control Flow 530 Handling Workflows with the Control Flow 533 Data Processing in the Data Flow 533 Memory Buffer Architecture 534 Types of Transformations 534 Advanced Data Flow Execution Concepts 543 SSIS Data Flow Design and Tuning 549 Data Flow Design Practices 550 Optimizing Package Processing 555 Troubleshooting Data Flow Performance Bottlenecks 558 Pipeline Performance Monitoring 559 Summary 562 Chapter 17: SS IS Software Development Life Cycle 563 Introduction to Software Development Life Cycles 565 SDLCs: A Brief History 566 Types of Software Development Life Cycles 566 Versioning and Source Code Control 567 Subversion (SVN) 568 Team Foundation Server, Team System, and SSIS 573 Summary 590 Chapter 18: Error and Event Handling 591 Using Precedence Constraints 592 Precedence Constraint Basics 592 Advanced Precedence Constraints and Expressions 593 Event Handling 601 Events 602 Using Event Handlers 603 Event Handler Inheritance 611 Breakpoints 612 Error Rows 616 Logging 622 Logging Providers 622 Log Events 623 Catalog Logging 627 Summary 629 Chapter 19: Programming and Extending SSIS 631 The Sample Components 632 Component 1: Source Adapter 632 Component 2: Transform 633 Component 3: Destination Adapter 634 The Pipeline Component Methods 634 Design-Time Functionality 635 Runtime 639 Connection Time 640 Building the Components 642 Preparation 642 Building the Source Component 648 Building the Transformation Component 660 Building the Destination Adapter 671 Using the Components 679 Installing the Components 679 Debugging Components 680 Design Time 680 Building the Complete Package 682 Runtime Debugging 682 Upgrading to SQL Server 2014 687 Summary 687 Chapter 20: Adding a User Interface to Your Component 689 Three Key Steps for Designing the UI: An Overview 690 Building the User Interface 690 Adding the Project 691 Implementing IDtsComponentUI 693 Setting the UITypeName 697 Building the Form 699 Extending the User Interface 704 Runtime Connections 704 Component Properties 707 Handling Errors and Warnings 708 Column Properties 711 Other UI Considerations 712 Summary 712 Chapter 21: External Management and WMI Task Implementation 715 External Management of SSIS with Managed Code 716 Setting Up a Test SSIS Package for Demonstration Purposes 716 The Managed Object Model Code Library 717 Catalog Management 718 Folder Management 719 Environments 720 The DTS Runtime Managed Code Library 722 SSIS Deployment Projects 722 Parameter Objects 723 Server Deployment 725 Executing SSIS Packages Deployed to the SSIS Catalog 726 Environment References 727 Package Operations 728 Application Object Maintenance Operations 729 Package Operations 729 Package Monitoring 732 Project, Folder, and Package Listing 734 A Package Management Example 735 Package Log Providers 745 Specifying Events to Log 747 Programming to Log Providers 748 SQL Server 2014 Operation Logs 749 Package Configurations 751 Creating a Configuration 752 Programming the Configuration Object 753 Configuration Object 754 Windows Management Instrumentation Tasks 755 WMI Reader Task Explained 755 WMI Data Reader Example 756 WMI Event Watcher Task 762 WMI Event Watcher Task Example 763 Summary 766 Chapter 22: Ad ministering SSIS 767 Using the SSIS Catalog 768 Setting the SSIS Catalog Properties 768 SSISDB 771 Deployment Models 772 Project Deployment Model 773 Package Deployment Model 775 Using T-SQL with SSIS 781 Executing Packages 781 Using Parameters 782 Querying Tables for Parameter Values 783 Using Environments 784 Using Data Taps 789 Creating a Central SSIS Server 790 Clustering SSIS 792 Package Configuration 794 Command-Line Utilities 798 DTExec 798 DTExecUI 799 DTUtil 804 Security 806 Securing the SSIS Catalog 806 Legacy Security 809 Scheduling Packages 811 SQL Server Agent 811 Proxy Accounts 813 64-Bit Issues 814 Monitoring Package Executions 815 Built-in Reporting 815 Custom Reporting 819 Performance Counters 819 Summary 820 Appendix A: SS IS Crib Notes 821 When to Use Control Flow Tasks 821 When to Use Data Flow Transforms 822 Common Expressions and Scripts 824 Appendix B: SS IS Internal Views and Stored Procedures 829 Views 829 Stored Procedures 830 Appendix C: Interviewing for an ETL Developer Position 833 Questions 833 Answers 834 Index 839
£37.40
John Wiley & Sons Inc Information Hiding in Communication Networks
Book SynopsisDescribes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. Highlights development trends and potential future directions of Information Hiding Introduces a new classification and taxonomy for modern data hiding techniques Presents different types of network steganography mechanisms Introduces several example applications of information hiding in communication networks including some recent covert communication techniques in popular Internet services Table of ContentsList of Figures xv List of Tables xxi Foreword xxiii Preface xxv Acknowledgments xxix Acronyms xxxi 1 Introduction 1 2 Background Concepts, Definitions, and Classification 39 3 Network Steganography 59 4 Control Protocols for Reliable Network Steganography 89 5 Traffic Type Obfuscation 117 6 Network Flow Watermarking 139 7 Examples of Information Hiding Methods for Popular Internet Services 163 8 Network Steganography Countermeasures 207 9 Closing Remarks 243 Glossary 247 Index 253
£78.26
John Wiley & Sons Inc Vehicular Ad Hoc Network Security and Privacy
Book SynopsisThis book provides an overview of vehicular networks, fromtraffic engineering to human factors. The book addresses theunique design requirements for security and privacy preservationfor vehicular communications to increase road safety.Table of ContentsList of Figures xi List of Tables xv Acronyms xvii Preface xix 1 INTRODUCTION 1 1.1 Background 1 1.2 DSRC AND VANET 2 1.2.1 DSRC 2 1.2.2 VANET 3 1.2.3 Characteristics of VANET 6 1.3 Security and Privacy Threats 7 1.4 Security and Privacy Requirements 8 1.5 Challenges and Prospects 9 1.5.1 Conditional Privacy Preservation in VANETs 9 1.5.2 Authentication with Efficient Revocation in VANETs 10 1.6 Standardization and Related Activities 11 1.7 Security Primitives 13 1.8 Outline of the Book 17 References 17 2 GSIS: GROUP SIGNATURE AND ID-BASED SIGNATURE-BASED SECURE AND PRIVACY-PRESERVING PROTOCOL 21 2.1 Introduction 21 2.2 Preliminaries and Background 23 2.2.1 Group Signature 23 2.2.2 Bilinear Pairing and ID-Based Cryptography 23 2.2.3 Threat Model 23 2.2.4 Desired Requirements 24 2.3 Proposed Secure and Privacy-Preserving Protocol 25 2.3.1 Problem Formulation 25 2.3.2 System Setup 27 2.3.3 Security Protocol between OBUs 29 2.3.4 Security Protocol between RSUs and OBUs 38 2.4 Performance Evaluation 41 2.4.1 Impact of Traffic Load 43 2.4.2 Impact of Cryptographic Signature Verification Delay 43 2.4.3 Membership Revocation and Tracing Efficiency 45 2.5 Concluding Remarks 47 References 47 3 ECPP: EFFICIENT CONDITIONAL PRIVACY PRESERVATION PROTOCOL 51 3.1 Introduction 51 3.2 System Model and Problem Formulation 52 3.2.1 System Model 52 3.2.2 Design Objectives 54 3.3 Proposed ECPP Protocol 55 3.3.1 System Initialization 55 3.3.2 OBU Short-Time Anonymous Key Generation 56 3.3.3 OBU Safety Message Sending 62 3.3.4 OBU Fast Tracking Algorithm 63 3.4 Analysis on Conditional Privacy Preservation 64 3.5 Performance Analysis 66 3.5.1 OBU Storage Overhead 66 3.5.2 OBU Computation Overhead on Verification 66 3.5.3 TA Computation Complexity on OBU Tracking 68 3.6 Concluding Remarks 69 References 69 4 PSEUDONYM-CHANGING STRATEGY FOR LOCATION PRIVACY 71 4.1 Introduction 71 4.2 Problem Definition 73 4.2.1 Network Model 73 4.2.2 Threat Model 74 4.2.3 Location Privacy Requirements 75 4.3 Proposed PCS Strategy for Location Privacy 75 4.3.1 KPSD Model for PCS Strategy 75 4.3.2 Anonymity Set Analysis for Achieved Location Privacy 79 4.3.3 Feasibility Analysis of PCS Strategy 85 4.4 Performance Evaluation 86 4.5 Concluding Remarks 89 References 89 5 RSU-AIDED MESSAGE AUTHENTICATION 91 5.1 Introduction 91 5.2 System Model and Preliminaries 93 5.2.1 System Model 93 5.2.2 Assumption 93 5.2.3 Problem Statement 94 5.2.4 Security Objectives 95 5.3 Proposed RSU-Aided Message Authentication Scheme 96 5.3.1 Overview 96 5.3.2 Mutual Authentication and Key Agreement between RSUs and Vehicles 96 5.3.3 Hash Aggregation 98 5.3.4 Verification 99 5.3.5 Privacy Enhancement 100 5.4 Performance Evaluation 101 5.4.1 Message Loss Ratio 102 5.4.2 Message Delay 102 5.4.3 Communication Overhead 104 5.5 Security Analysis 105 5.6 Concluding Remarks 106 References 107 6 TESLA-BASED BROADCAST AUTHENTICATION 109 6.1 Introduction 109 6.2 Timed Efficient and Secure Vehicular Communication Scheme 110 6.2.1 Preliminaries 110 6.2.2 System Formulation 112 6.2.3 Proposed TSVC Scheme 113 6.2.4 Enhanced TSVC with Nonrepudiation 118 6.2.5 Discussion 123 6.3 Security Analysis 129 6.4 Performance Evaluation 129 6.4.1 Impact of Vehicle Moving Speed 131 6.4.2 Impact of Vehicle Density 132 6.5 Concluding Remarks 134 References 134 7 DISTRIBUTED COOPERATIVE MESSAGE AUTHENTICATION 137 7.1 Introduction 137 7.2 Problem Formulation 138 7.2.1 Network Model 138 7.2.2 Security Model 139 7.3 Basic Cooperative Authentication Scheme 140 7.4 Secure Cooperative Authentication Scheme 141 7.4.1 Evidence and Token for Fairness 142 7.4.2 Authentication Proof 145 7.4.3 Flows of Proposed Scheme 146 7.5 Security Analysis 147 7.5.1 Linkability Attack 147 7.5.2 Free-Riding Attack without Authentication Efforts 147 7.5.3 Free-Riding Attack with Fake Authentication Efforts 148 7.6 Performance Evaluation 148 7.6.1 Simulation Settings 148 7.6.2 Simulation Results 149 7.7 Concluding Remarks 150 References 151 8 CONTEXT-AWARE COOPERATIVE AUTHENTICATION 153 8.1 Introduction 153 8.2 Message Trustworthiness in VANETs 156 8.3 System Model and Design Goal 159 8.3.1 Network Model 159 8.3.2 Attack Model 159 8.3.3 Design Goals 160 8.4 Preliminaries 160 8.4.1 Pairing Technique 160 8.4.2 Aggregate Signature and Batch Verification 160 8.5 Proposed AEMAT Scheme 161 8.5.1 System Setup 161 8.5.2 Registration 162 8.5.3 SER Generation and Broadcasting 162 8.5.4 SER Opportunistic Forwarding 162 8.5.5 SER Aggregated Authentication 163 8.5.6 SER Aggregated Trustworthiness 165 8.6 Security Discussion 168 8.6.1 Collusion Attacks 168 8.6.2 Privacy Protection of Witnesses 168 8.7 Performance Evaluation 169 8.7.1 Transmission Cost 169 8.7.2 Computational Cost 169 8.8 Concluding Remarks 170 References 170 9 FAST HANDOVER AUTHENTICATION BASED ON MOBILITY PREDICTION 173 9.1 Introduction 173 9.2 Vehicular Network Architecture 175 9.3 Proposed Fast Handover Authentication Scheme Based on Mobility Prediction 176 9.3.1 Multilayer Perceptron Classifier 176 9.3.2 Proposed Authentication Scheme 178 9.4 Security Analysis 183 9.4.1 Replay Attack 183 9.4.2 Forward Secrecy 183 9.5 Performance Evaluation 184 9.6 Concluding Remarks 185 References 186 Index 187
£97.16
John Wiley & Sons Inc Wireshark for Security Professionals
Book SynopsisMaster Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, aTable of ContentsIntroduction xiii Chapter 1 Introducing Wireshark 1 What Is Wireshark? 2 A Best Time to Use Wireshark? 2 Avoiding Being Overwhelmed 3 The Wireshark User Interface 3 Packet List Pane 5 Packet Details Pane 6 Packet Bytes Pane 8 Filters 9 Capture Filters 9 Display Filters 13 Summary 17 Exercises 18 Chapter 2 Setting Up the Lab 19 Kali Linux 20 Virtualization 22 Basic Terminology and Concepts 23 Benefits of Virtualization 23 Virtual Box 24 Installing VirtualBox 24 Installing the VirtualBox Extension Pack 31 Creating a Kali Linux Virtual Machine 33 Installing Kali Linux 40 The W4SP Lab 46 Requirements 46 A Few Words about Docker 47 What Is GitHub? 48 Creating the Lab User 49 Installing the W4SP Lab on the Kali Virtual Machine 50 Setting Up the W4SP Lab 53 The Lab Network 54 Summary 55 Exercises 56 Chapter 3 The Fundamentals 57 Networking 58 OSI Layers 58 Networking between Virtual Machines 61 Security 63 The Security Triad 63 Intrusion Detection and Prevention Systems 63 False Positives and False Negatives 64 Malware 64 Spoofing and Poisoning 66 Packet and Protocol Analysis 66 A Protocol Analysis Story 67 Ports and Protocols 71 Summary 73 Exercises 74 Chapter 4 Capturing Packets 75 Sniffing 76 Promiscuous Mode 76 Starting the First Capture 78 TShark 82 Dealing with the Network 86 Local Machine 87 Sniffing Localhost 88 Sniffing on Virtual Machine Interfaces 92 Sniffing with Hubs 96 SPAN Ports 98 Network Taps 101 Transparent Linux Bridges 103 Wireless Networks 105 Loading and Saving Capture Files 108 File Formats 108 Ring Buffers and Multiple Files 111 Recent Capture Files 116 Dissectors 118 W4SP Lab: Managing Nonstandard HTTP Traffic 118 Filtering SMB Filenames 120 Packet Colorization 123 Viewing Someone Else’s Captures 126 Summary 127 Exercises 128 Chapter 5 Diagnosing Attacks 129 Attack Type: Man-in-the-Middle 130 Why MitM Attacks Are Effective 130 How MitM Attacks Get Done: ARP 131 W4SP Lab: Performing an ARP MitM Attack 133 W4SP Lab: Performing a DNS MitM Attack 141 How to Prevent MitM Attacks 147 Attack Type: Denial of Service 148 Why DoS Attacks Are Effective 149 How DoS Attacks Get Done 150 How to Prevent DoS Attacks 155 Attack Type: Advanced Persistent Threat 156 Why APT Attacks Are Effective 156 How APT Attacks Get Done 157 Example APT Traffic in Wireshark 157 How to Prevent APT Attacks 161 Summary 162 Exercises 162 Chapter 6 Offensive Wireshark 163 Attack Methodology 163 Reconnaissance Using Wireshark 165 Evading IPS/IDS 168 Session Splicing and Fragmentation 168 Playing to the Host, Not the IDS 169 Covering Tracks and Placing Backdoors 169 Exploitation 170 Setting Up the W4SP Lab with Metasploitable 171 Launching Metasploit Console 171 VSFTP Exploit 172 Debugging with Wireshark 173 Shell in Wireshark 175 TCP Stream Showing a Bind Shell 176 TCP Stream Showing a Reverse Shell 183 Starting ELK 188 Remote Capture over SSH 190 Summary 191 Exercises 192 Chapter 7 Decrypting TLS, Capturing USB, Keyloggers, and Network Graphing 193 Decrypting SSL/TLS 193 Decrypting SSL/TLS Using Private Keys 195 Decrypting SSL/TLS Using Session Keys 199 USB and Wireshark 202 Capturing USB Traffic on Linux 203 Capturing USB Traffic on Windows 206 TShark Keylogger 208 Graphing the Network 212 Lua with Graphviz Library 213 Summary 218 Exercises 219 Chapter 8 Scripting with Lua 221 Why Lua? 222 Scripting Basics 223 Variables 225 Functions and Blocks 226 Loops 228 Conditionals 230 Setup 230 Checking for Lua Support 231 Lua Initialization 232 Windows Setup 233 Linux Setup 233 Tools 234 Hello World with TShark 236 Counting Packets Script 237 ARP Cache Script 241 Creating Dissectors for Wireshark 244 Dissector Types 245 Why a Dissector Is Needed 245 Experiment 253 Extending Wireshark 255 Packet Direction Script 255 Marking Suspicious Script 257 Snooping SMB File Transfers 260 Summary 262 Index 265
£31.88
John Wiley & Sons Inc VCADCV VMware Certified Associate on vSphere
Book SynopsisUse this expert guide to prepare for the VCA-DCV exam VCA-DCV VMware Certified Associate on vSphere Study Guide: VCAD-510 is a comprehensive study guide for the VMware Certified Associate Data Center Virtualization exam. Hands-on examples, real-world scenarios, and expert review questions cover the full exam blueprint, and the companion website offers a suite of tools to help you prepare for the exam including practice exams, electronic flashcards, and a glossary of key terms. In addition, the website includes videos that demonstrate how to complete the more challenging tasks. Focused on practical skills, this study guide not only prepares you for the certification exam, but also for the duties expected of a VCA. The VMware Certified Associate-Data Center Virtualization certification targets those with limited virtualization and VMware data center technology experience, providing a springboard to the popular VMware Certified Professional-Data Center VirtualizaTable of ContentsIntroduction xv Assessment Test xxi Chapter 1 Intro to Virtualization 1 What Is Data Center Virtualization? 2 Virtualization Then and Now 3 Physical and Virtual Data Center Components 4 Physical Data Center Components 4 Virtual Data Center Components 5 Physical and Virtual Component Differences 7 Benefits of Using Virtualization 9 Online Tools 13 Summary 14 Exam Essentials 15 Review Questions 16 Chapter 2 VMware Solutions 21 Availability Challenges 22 VMware Availability Products and Technologies 23 Management Challenges 27 VMware Management Products and Technologies 27 Scalability Challenges 28 VMware Scalability Products and Technologies 29 Optimization Challenges 31 VMware Optimization Products and Technologies 32 Summary 36 Exam Essentials 37 Review Questions 39 Chapter 3 vSphere Core Components 43 Virtual Machines 44 What Is a Virtual Machine, Anyway? 44 What Can You Do with Virtual Machines? 45 ESXi Hypervisor 47 vCenter Server 47 vMotion 48 Distributed Resource Scheduler 49 Distributed Power Management 49 Storage vMotion 50 Storage DRS 50 Ftoc.indd 03/24/2015 Page xi vSphere Data Protection 51 High‐Availability Configuration 51 Fault Tolerance 52 vSphere Replication 52 Migration 53 High Availability 54 Host HA 55 Virtual Machine HA 56 Applications HA 57 Fault Tolerance 57 Clusters and Resource Pools 58 Clusters 58 Resource Pools 59 Other VMware Data Center Products 61 vCenter Operations Manager 61 vSphere Data Protection 62 Nsx 62 Virtual SAN 62 vCenter Site Recovery Manager 62 Summary 63 Exam Essentials 64 Review Questions 65 Chapter 4 Storage in a VMware Environment 71 Physical vs. Virtual Storage 72 What Is Shared Storage? 73 VMware Storage Types 75 Local Storage 75 Fibre Channel 76 iSCSI 77 Network File System 77 Virtual Machine File System 78 The VMFS vs. the NFS 78 Disk Provisioning 78 Thick Provisioning 79 Thin Provisioning 80 VMware Virtual Storage Technologies 82 Summary 83 Exam Essentials 84 Review Questions 86 Chapter 5 Networking in a VMware Environment 91 Differentiate Physical and Virtual Networking 92 Physical Switches 92 Ftoc.indd 03/24/2015 Page xii Virtual Switches 94 Differences Between Physical and Virtual Switches 97 Differentiate VMware Virtual Switch Technologies 97 Standard Virtual Switches 98 Distributed Virtual Switches 98 Identify VMware Virtual Switch Components 101 Standard Virtual Switch 101 Distributed Virtual Switch 102 Identify Common Virtual Switch Policies 103 Port Group Policies 103 Distributed Virtual Switch Policies 106 Identify Capabilities of Network I/O Control 108 Summary 113 Exam Essentials 113 Review Questions 115 Chapter 6 Business Challenges Meet VMware Solutions 119 Availability Challenges and Solutions 120 vMotion 121 Storage vMotion 121 Virtual Machine Snapshots 122 High Availability 123 Fault Tolerance 123 vSphere Replication 124 vSphere Data Protection 124 Site Recovery Manager 125 Management Challenges and Solutions 126 Virtual Machines/Physical‐to‐Virtual Conversions 126 vCenter Server 126 vCenter Configuration Manager 127 Optimization Challenges and Solutions 128 vCenter Operations Manager 128 Thin Provisioning 129 Distributed Switches with QoS 130 Distributed Power Management 130 Storage I/O Control 131 vFlash 131 VM Storage Profiles 131 Memory Ballooning 132 Transparent Page Sharing 132 Scalability Challenges and Solutions 133 Virtual Machines 133 Virtual Machine Templates 134 Distributed Resource Scheduler 135 Ftoc.indd 03/24/2015 Page xiii Storage DRS 135 vSphere Storage Appliance 136 Hot Add 136 Distributed Virtual Switches 136 The Differences between SMB and Enterprise Challenges and Solutions 137 Summary 138 Exam Essentials 139 Review Questions 140 Appendices 145 Appendix A Answers to Review Questions 147 Appendix B Online Resources 159 Index 165
£25.60
John Wiley & Sons Inc Phishing Dark Waters
Book SynopsisAn essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness Table of ContentsForeword xxiii Introduction xxvii Chapter 1 An Introduction to the Wild World of Phishing 1 Phishing 101 2 How People Phish 4 Examples 7 High-Profi le Breaches 7 Phish in Their Natural Habitat 10 Phish with Bigger Teeth 22 Spear Phishing 27 Summary 29 Chapter 2 The Psychological Principles of Decision-Making 33 Decision-Making: Small Bits 34 Cognitive Bias 35 Physiological States 37 External Factors 38 The Bottom Line About Decision-Making 39 It Seemed Like a Good Idea at the Time 40 How Phishers Bait the Hook 41 Introducing the Amygdala 44 The Guild of Hijacked Amygdalas 45 Putting a Leash on the Amygdala 48 Wash, Rinse, Repeat 49 Summary 50 Chapter 3 Influence and Manipulation 53 Why the Difference Matters to Us 55 How Do I Tell the Difference? 56 How Will We Build Rapport with Our Targets? 56 How Will Our Targets Feel After They Discover They’ve Been Tested? 56 What Is Our Intent? 57 But the Bad Guys Will Use Manipulation . . . 57 Lies, All Lies 58 P Is for Punishment 59 Principles of Influence 61 Reciprocity 61 Obligation 62 Concession 63 Scarcity 63 Authority 64 Consistency and Commitment 65 Liking 66 Social Proof 67 More Fun with Influence 67 Our Social Nature 67 Physiological Response 68 Psychological Response 69 Things to Know About Manipulation 70 Summary 71 Chapter 4 Lessons in Protection 75 Lesson One: Critical Thinking 76 How Can Attackers Bypass This Method? 77 Lesson Two: Learn to Hover 77 What If I Already Clicked the Link and I Think It’s Dangerous? 80 How Can Attackers Bypass This Method? 81 Lesson Three: URL Deciphering 82 How Can Attackers Bypass This Method? 85 Lesson Four: Analyzing E-mail Headers 85 How Can Attackers Bypass This Method? 90 Lesson Five: Sandboxing 90 How Can Attackers Bypass This Method? 91 The “Wall of Sheep,” or a Net of Bad Ideas 92 Copy and Paste Your Troubles Away 92 Sharing Is Caring 93 My Mobile Is Secure 94 A Good Antivirus Program Will Save You 94 Summary 95 Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program 97 The Basic Recipe 99 Why? 99 What’s the Theme? 102 The Big, Fat, Not-So-Legal Section 105 Developing the Program 107 Setting a Baseline 108 Setting the Difficulty Level 109 Writing the Phish 121 Tracking and Statistics 122 Reporting 125 Phish, Educate, Repeat 127 Summary 128 Chapter 6 The Good, the Bad, and the Ugly: Policies and More 131 Oh, the Feels: Emotion and Policies 132 The Definition 132 The Bad 133 Making It “Good” 133 The Boss Is Exempt 133 The Definition 134 The Bad 134 Making It “Good” 134 I’ll Just Patch One of the Holes 135 The Definition 135 The Bad 136 Making It “Good” 136 Phish Just Enough to Hate It 136 The Definition 137 The Bad 137 Making It “Good” 138 If You Spot a Phish, Call This Number 138 The Definition 139 The Bad 139 Making It “Good” 140 The Bad Guys Take Mondays Off 140 The Definition 141 The Bad 141 Making It “Good” 141 If You Can’t See It, You Are Safe 142 The Definition 142 The Bad 143 Making It “Good” 143 The Lesson for Us All 143 Summary 144 Chapter 7 The Professional Phisher’s Tackle Bag 147 Commercial Applications 149 Rapid7 Metasploit Pro 149 ThreatSim 152 PhishMe 158 Wombat PhishGuru 161 PhishLine 165 Open Source Applications 168 SET: Social-Engineer Toolkit 168 Phishing Frenzy 171 Comparison Chart 174 Managed or Not 176 Summary 177 Chapter 8 Phish Like a Boss 179 Phishing the Deep End 180 Understand What You’re Dealing With 180 Set Realistic Goals for Your Organization 182 Plan Your Program 183 Understand the Stats 183 Respond Appropriately 184 Make the Choice: Build Inside or Outside 186 Summary 187 Index 189
£21.59
John Wiley & Sons Inc The Mobile Application Hackers Handbook
Book SynopsisSee your app through a hacker''s eyes to find the real sources of vulnerability The Mobile Application Hacker''s Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker''s point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensTrade Review“..there is a shocking lack of published material on the topic of mobile security. The Mobile Application Hacker’s Handbook seeks to change this and be a positive movement to educating others in the topic of mobile security awareness.” (Vigilance-Security Magazine, March 2015)Table of ContentsIntroduction xxxi Chapter 1 Mobile Application (In)security 1 The Evolution of Mobile Applications 2 Mobile Application Security 4 Summary 15 Chapter 2 Analyzing iOS Applications 17 Understanding the Security Model 17 Understanding iOS Applications 22 Jailbreaking Explained 29 Understanding the Data Protection API 43 Understanding the iOS Keychain 46 Understanding Touch ID 51 Reverse Engineering iOS Binaries 53 Summary 67 Chapter 3 Attacking iOS Applications 69 Introduction to Transport Security 69 Identifying Insecure Storage 81 Patching iOS Applications with Hopper 85 Attacking the iOS Runtime 92 Understanding Interprocess Communication 118 Attacking Using Injection 123 Summary 131 Chapter 4 Identifying iOS Implementation Insecurities 133 Disclosing Personally Identifi able Information 133 Identifying Data Leaks 136 Memory Corruption in iOS Applications 142 Summary 146 Chapter 5 Writing Secure iOS Applications 149 Protecting Data in Your Application 149 Avoiding Injection Vulnerabilities 156 Securing Your Application with Binary Protections 158 Summary 170 Chapter 6 Analyzing Android Applications 173 Creating Your First Android Environment 174 Understanding Android Applications 179 Understanding the Security Model 206 Reverse‐Engineering Applications 233 Summary 246 Chapter 7 Attacking Android Applications 247 Exposing Security Model Quirks 248 Attacking Application Components 255 Accessing Storage and Logging 304 Misusing Insecure Communications 312 Exploiting Other Vectors 326 Additional Testing Techniques 341 Summary 351 Chapter 8 Identifying and Exploiting Android Implementation Issues 353 Reviewing Pre‐Installed Applications 353 Exploiting Devices 365 Infiltrating User Data 416 Summary 426 Chapter 9 Writing Secure Android Applications 427 Principle of Least Exposure 427 Essential Security Mechanisms 429 Advanced Security Mechanisms 450 Slowing Down a Reverse Engineer 451 Summary 455 Chapter 10 Analyzing Windows Phone Applications 459 Understanding the Security Model 460 Understanding Windows Phone 8.x Applications 473 Developer Sideloading 483 Building a Test Environment 484 Analyzing Application Binaries 506 Summary 509 Chapter 11 Attacking Windows Phone Applications 511 Analyzing for Data Entry Points 511 Attacking Transport Security 525 Attacking WebBrowser and WebView Controls 534 Identifying Interprocess Communication Vulnerabilities 542 Attacking XML Parsing 560 Attacking Databases 568 Attacking File Handling 573 Patching .NET Assemblies 578 Summary 585 Chapter 12 Identifying Windows Phone Implementation Issues 587 Identifying Insecure Application Settings Storage 588 Identifying Data Leaks 591 Identifying Insecure Data Storage 593 Insecure Random Number Generation 601 Insecure Cryptography and Password Use 605 Identifying Native Code Vulnerabilities 616 Summary 626 Chapter 13 Writing Secure Windows Phone Applications 629 General Security Design Considerations 629 Storing and Encrypting Data Securely 630 Secure Random Number Generation 634 Securing Data in Memory and Wiping Memory 635 Avoiding SQLite Injection 636 Implementing Secure Communications 638 Avoiding Cross‐Site Scripting in WebViews and WebBrowser Components 640 Secure XML Parsing 642 Clearing Web Cache and Web Cookies 642 Avoiding Native Code Bugs 644 Using Exploit Mitigation Features 644 Summary 645 Chapter 14 Analyzing BlackBerry Applications 647 Understanding BlackBerry Legacy 647 Understanding BlackBerry 10 652 Understanding the BlackBerry 10 Security Model 660 BlackBerry 10 Jailbreaking 665 Using Developer Mode 666 The BlackBerry 10 Device Simulator 667 Accessing App Data from a Device 668 Accessing BAR Files 669 Looking at Applications 670 Summary 678 Chapter 15 Attacking BlackBerry Applications 681 Traversing Trust Boundaries 682 Summary 691 Chapter 16 Identifying BlackBerry Application Issues 693 Limiting Excessive Permissions 694 Resolving Data Storage Issues 695 Checking Data Transmission 696 Handling Personally Identifiable Information and Privacy 698 Ensuring Secure Development 700 Summary 704 Chapter 17 Writing Secure BlackBerry Applications 705 Securing BlackBerry OS 7.x and Earlier Legacy Java Applications 706 General Java Secure Development Principals 706 Making Apps Work with the Application Control Policies 706 Memory Cleaning 707 Controlling File Access and Encryption 709 SQLite Database Encryption 710 Persistent Store Access Control and Encryption 711 Securing BlackBerry 10 Native Applications 716 Securing BlackBerry 10 Cascades Applications 723 Securing BlackBerry 10 HTML5 and JavaScript (WebWorks) Applications 724 Securing Android Applications on BlackBerry 10 726 Summary 726 Chapter 18 Cross‐Platform Mobile Applications 729 Introduction to Cross‐Platform Mobile Applications 729 Bridging Native Functionality 731 Exploring PhoneGap and Apache Cordova 736 Summary 741 Index 743
£47.50
John Wiley & Sons Inc The Network Security Test Lab
Book SynopsisThe ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You''ll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and how to build the defenses that stop them. You''ll be introduced to tools like Wireshark, Networkminer, Nmap, Metasploit, and more as you discover techniques for defending against network attacks, social networking bugs, malware, and the most prevalent malicious traffic. You also get access to open source tools, demo software, and a bootable version of Linux to facilitate hands-on Table of ContentsIntroduction xxi Chapter 1 Building a Hardware and Software Test Platform 1 Why Build a Lab? 2 Hardware Requirements 4 Physical Hardware 5 Equipment You Already Have 6 New Equipment Purchases 7 Used Equipment Purchases 7 Online Auctions 8 Thrift Stores 9 Company Sales 10 Virtual Hardware 10 VMware 12 VirtualBox 15 Hacker Hardware 16 Software Requirements 18 Operating Systems 19 Microsoft Windows 19 Linux 20 Navigating in Linux 23 Linux Basics 25 Mac Os X 28 Software and Applications 28 Learning Applications 29 Hacking Software 31 Summary 32 Key Terms 33 Exercises 34 Equipment Checklist 34 Installing VMware Workstation 35 Exploring Linux Operating System Options 35 Using VMware to Build a Windows Image 35 Using VMware Converter to Create a Virtual Machine 36 Exploring Other Operating System Options 37 Running Kali from VMware 37 Installing Tools on Your Windows Virtual Machine 38 Chapter 2 Passive Information Gathering 39 Starting at the Source 40 Scrutinizing Key Employees 43 Dumpster Diving (Electronic) 45 Analyzing Web Page Coding 48 Exploiting Website Authentication Methods 51 Mining Job Ads and Analyzing Financial Data 53 Using Google to Mine Sensitive Information 56 Exploring Domain Ownership 57 Whois 59 Regional Internet Registries 61 Domain Name System 63 Identifying Web Server Software 66 Web Server Location 69 Summary 70 Key Terms 70 Exercises 72 IP Address and Domain Identification 72 Information Gathering 72 Google Hacking 74 Banner Grabbing 74 Telnet 75 Netcat 75 VisualRoute 76 Chapter 3 Analyzing Network Traffic 77 Why Packet Analysis Is Important 77 How to Capture Network Traffic 78 Promiscuous Mode 78 Hubs and Switches 79 Hubbing Out and Using Taps 79 Switches 79 Capturing Network Traffic 82 Managed and Unmanaged Switches 83 ARP Cache Poisoning 85 Flooding 91 DHCP Redirection 92 Redirection and Interception with ICMP 94 Preventing Packet Capture 94 Dynamic Address Inspection 95 DHCP Snooping 95 Preventing VLAN Hopping 96 Detecting Packet Capture 97 Wireshark 99 Wireshark Basics 99 Filtering and Decoding Traffic 102 Basic Data Capture—A Layer-by-Layer Review 108 Physical—Data-Link Layer 108 Network-Internet Layer 110 Transport—Host-Host Layer 111 Application Layer 115 Other Network Analysis Tools 115 Summary 118 Key Terms 118 Exercises 119 Fun with Packets 119 Packet Analysis with tcpdump 120 Packet Filters 121 Making a One-Way Data Cable 122 Chapter 4 Detecting Live Systems and Analyzing Results 125 TCP/IP Basics 125 The Network Access Layer 127 The Internet Layer 128 The Host-to-Host Layer 132 Transmission Control Protocol 132 User Datagram Protocol 134 The Application Layer 134 Detecting Live Systems with ICMP 138 ICMP—Ping 138 Traceroute 142 Port Scanning 147 TCP and UDP Port Scanning 147 Advanced Port-Scanning Techniques 151 Idle Scan 151 Analyzing Port Scans 155 Port-Scanning Tools 156 Nmap 157 SuperScan 160 Other Scanning Tools 161 OS Fingerprinting 161 Passive Fingerprinting 162 Active Fingerprinting 164 How Nmap OS Fingerprinting Works 165 Scanning Countermeasures 167 Summary 171 Key Terms 171 Exercises 172 Understanding Wireshark 172 Interpreting TCP Flags 174 Performing an ICMP Packet Decode 175 Port Scanning with Nmap 176 Traceroute 177 An Analysis of a Port Scan 178 OS Fingerprinting 179 Chapter 5 Enumerating Systems 181 Enumeration 181 Router and Firewall Enumeration 182 Router Enumeration 182 Firewall Enumeration 187 Router and Firewall Enumeration Countermeasures 191 Windows Enumeration 191 Server Message Block and Interprocess Communication 194 Enumeration and the IPC$ Share 195 Windows Enumeration Countermeasures 195 Linux/Unix Enumeration 196 Enumeration of Application Layer Protocols 197 Simple Network Management Protocol 197 SNMP Enumeration Countermeasures 200 Enumeration of Other Applications 200 Advanced Enumeration 202 SCADA Systems 202 User Agent Strings 210 Mapping the Attack Surface 213 Password Speculation and Cracking 213 Sniffing Password Hashes 216 Exploiting a Vulnerability 218 Protecting Passwords 221 Summary 221 Key Terms 222 Exercises 223 SNMP Enumeration 223 Enumerating Routing Protocols 225 Enumeration with DumpSec 227 Identifying User Agent Strings 227 Browser Enumeration 229 Chapter 6 Automating Encryption and Tunneling Techniques 231 Encryption 232 Secret Key Encryption 233 Data Encryption Standard 235 Triple DES 236 Advanced Encryption Standard 237 One‐Way Functions (Hashes) 237 md Series 238 Sha 238 Public Key Encryption 238 Rsa 239 Diffie‐Hellman 239 El Gamal 240 Elliptic Curve Cryptography 240 Hybrid Cryptosystems 241 Public Key Authentication 241 Public Key Infrastructure 242 Certificate Authority 242 Registration Authority 242 Certificate Revocation List 243 Digital Certificates 243 Certificate Distribution System 244 Encryption Role in Authentication 244 Password Authentication 245 Password Hashing 246 Challenge‐Response 249 Session Authentication 250 Session Cookies 250 Basic Authentication 251 Certificate‐Based Authentication 251 Tunneling Techniques to Obscure Traffic 252 Internet Layer Tunneling 252 Transport Layer Tunneling 254 Application Layer Tunneling 256 Attacking Encryption and Authentication 259 Extracting Passwords 259 Password Cracking 260 Dictionary Attack 261 Brute‐Force Attack 261 Rainbow Table 263 Other Cryptographic Attacks 263 Summary 264 Key Terms 264 Exercises 266 CrypTool 266 Extract an E‐mail Username and Password 268 RainbowCrack 268 John the Ripper 270 Chapter 7 Automated Attack and Penetration Tools 273 Why Attack and Penetration Tools Are Important 274 Vulnerability Assessment Tools 274 Source Code Assessment Tools 275 Application Assessment Tools 276 System Assessment Tools 276 Attributes of a Good System Assessment Tool 278 Nessus 279 Automated Exploit Tools 286 Metasploit 286 Armitage 287 Metasploit Console 288 Metasploit Command‐Line Interface 289 Updating Metasploit 290 BeEF 290 Core Impact 291 Canvas 292 Determining Which Tools to Use 292 Picking the Right Platform 292 Summary 293 Key Terms 294 Exercises 294 Exploring N‐Stalker, a Vulnerability Assessment Tool 294 Exploring Searchsploit on Kali Linux 295 Metasploit Kali 296 Chapter 8 Securing Wireless Systems 299 Wi-Fi Basics 300 Wireless Clients and NICs 301 Wireless Access Points 302 Wireless Communication Standards 302 Bluetooth Basics 304 Wi-Fi Security 305 Wired Equivalent Privacy 305 Wi-Fi Protected Access 307 802.1x Authentication 309 Wireless LAN Threats 310 Wardriving 310 NetStumbler 312 Kismet 314 Eavesdropping 314 Rogue and Unauthorized Access Points 318 Denial of Service 319 Exploiting Wireless Networks 320 Finding and Assessing the Network 320 Setting Up Airodump 321 Configuring Aireplay 321 Deauthentication and ARP Injection 322 Capturing IVs and Cracking the WEP KEY 322 Other Wireless Attack Tools 323 Exploiting Bluetooth 324 Securing Wireless Networks 324 Defense in Depth 325 Misuse Detection 326 Summary 326 Key Terms 327 Exercises 328 Using NetStumbler 328 Using Wireshark to Capture Wireless Traffic 329 Chapter 9 An Introduction to Malware 331 History of Malware 331 Types of Malware 334 Viruses 334 Worms 337 Logic Bombs 338 Backdoors and Trojans 338 Packers, Crypters, and Wrappers 340 Rootkits 343 Crimeware Kits 345 Botnets 347 Advanced Persistent Threats 350 Spyware and Adware 350 Common Attack Vectors 351 Social Engineering 351 Faking It! 352 Pretending through Email 352 Defenses against Malware 353 Antivirus 353 File Integrity Verification 355 User Education 355 Summary 356 Key Terms 356 Exercises 357 Virus Signatures 357 Building Trojans 358 Rootkits 358 Finding Malware 362 Chapter 10 Detecting Intrusions and Analyzing Malware 365 An Overview of Intrusion Detection 365 IDS Types and Components 367 IDS Engines 368 An Overview of Snort 370 Platform Compatibility 371 Limiting Access to the IDS 371 Verification of Configuration 372 Building Snort Rules 373 The Rule Header 374 Logging with Snort 375 Rule Options 376 Advanced Snort: Detecting Buffer Overflows 377 Responding to Attacks and Intrusions 379 Analyzing Malware 381 Tracking Malware to Its Source 382 Identifying Domains and Malicious Sites 382 Building a Testbed 386 Virtual and Physical Targets 386 Operating Systems 387 Network Isolation 387 Testbed Tools 388 Malware Analysis Techniques 390 Static Analysis 390 Dynamic Analysis 394 Summary 397 Key Terms 397 Exercises 398 Building a Snort Windows System 398 Analyzing Malware Communication 400 Analyzing Malware with VirusTotal 401 Chapter 11 Forensic Detection 403 Computer Forensics 404 Acquisition 405 Drive Removal and Hashing 407 Drive-Wiping 409 Logical and Physical Copies 410 Logical Copies 411 Physical Copies 411 Imaging the Drive 412 Authentication 413 Trace-Evidence Analysis 416 Browser Cache 418 Email Evidence 419 Deleted or Overwritten Files and Evidence 421 Other Trace Evidence 422 Hiding Techniques 422 Common File-Hiding Techniques 423 Advanced File-Hiding Techniques 425 Steganography 426 Detecting Steganographic Tools 429 Antiforensics 430 Summary 431 Key Terms 431 Exercises 432 Detecting Hidden Files 432 Basic File-Hiding 432 Advanced File-Hiding 433 Reading Email Headers 433 Use S-Tools to Embed and Encrypt a Message 435 Index 439
£37.05
John Wiley & Sons Inc Network Attacks and Exploitation
Book SynopsisIncorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. Assaults and manipulation of computer networks are rampant around the world. One of the biggeTable of ContentsIntroduction xvii Chapter 1 Computer Network Exploitation 1 Operations 4 Operational Objectives 5 Strategic Collection 6 Directed Collection 7 Non-Kinetic Computer Network Attack (CNA) 7 Strategic Access 9 Positional Access 9 CNE Revisited 11 A Framework for Computer Network Exploitation 11 First Principles 12 Principles 12 Themes 14 Summary 15 Chapter 2 The Attacker 17 Principle of Humanity 17 Life Cycle of an Operation 18 Stage 1: Targeting 19 Stage 2: Initial Access 22 Stage 3: Persistence 24 Stage 4: Expansion 25 Stage 5: Exfiltration 26 Stage 6: Detection 26 Principle of Access 27 Inbound Access 27 Outbound Access 29 Bidirectional Access 35 No Outside Access 35 Access Summary 36 Principle of Economy 37 Time 37 Targeting Capabilities 37 Exploitation Expertise 38 Networking Expertise 38 Software Development Expertise 39 Operational Expertise 40 Operational Analysis Expertise 40 Technical Resources 41 Economy Summary 41 Attacker Structure 41 Summary 43 Chapter 3 The Defender 45 Principle of Humanity 45 Humanity and Network Layout 46 Humanity and Security Policy 47 Principle of Access 48 The Defensive Life Cycle 49 Principle of Economy 51 The Helpful Defender 53 Summary 54 Chapter 4 Asymmetries 55 False Asymmetries 56 Advantage Attacker 59 Motivation 60 Initiative 61 Focus 62 Effect of Failure 62 Knowledge of Technology 64 Analysis of Opponent 64 Tailored Software 65 Rate of Change 66 Advantage Defender 67 Network Awareness 68 Network Posture 68 Advantage Indeterminate 69 Time 69 Efficiency 70 Summary 71 Chapter 5 Attacker Frictions 73 Mistakes 74 Complexity 74 Flawed Attack Tools 75 Upgrades and Updates 77 Other Attackers 78 The Security Community 80 Bad Luck 81 Summary 81 Chapter 6 Defender Frictions 83 Mistakes 83 Flawed Software 84 Inertia 86 The Security Community 87 Complexity 89 Users 91 Bad Luck 92 Summary 92 Chapter 7 Offensive Strategy 93 Principle 1: Knowledge 95 Measuring Knowledge 96 Principle 2: Awareness 97 Measuring Awareness 98 Principle 3: Innovation 98 Measuring Innovation 99 Defensive Innovation 100 Principle 4: Precaution 101 Measuring Precaution 103 Principle 5: Operational Security 105 Minimizing Exposure 106 Minimizing Recognition 107 Controlling Reaction 108 Measuring Operational Security 109 Principle 6: Program Security 110 Attacker Liabilities 110 Program Security Costs 112 Measuring Program Security 120 Crafting an Offensive Strategy 121 Modular Frameworks 124 A Note on Tactical Decisions 126 Summary 127 Chapter 8 Defensive Strategy 129 Failed Tactics 130 Antivirus and Signature-Based Detection 130 Password Policies 132 User Training 134 Crafting a Defensive Strategy 135 Cloud-Based Security 143 Summary 145 Chapter 9 Offensive Case Studies 147 Stuxnet 148 Access 148 Economy 149 Humanity 149 Knowledge 149 Awareness 149 Precaution 150 Innovation 151 Operational Security 151 Program Security 153 Stuxnet Summary 154 Flame 154 Gauss 157 Dragonfly 159 Red October 160 APT 1 162 Axiom 164 Summary 165 Epilogue 167 Appendix Attack Tools 169 Antivirus Defeats 169 Audio/Webcam Recording 170 Backdoor 170 Bootkit 171 Collection Tools 171 Exploits 171 Fuzzer 172 Hardware-based Trojan 172 Implant 173 Keystroke Logger 173 Network Capture 173 Network Survey 173 Network Tunnel 174 Password Dumpers and Crackers 174 Packer 175 Persistence Mechanism 175 Polymorphic Code Generator 177 Rootkit 178 Screen Scraper 178 System Survey 178 Vulnerability Scanner 178 References 179 Bibliography 189 Index 193
£34.20
John Wiley & Sons Inc Fundamentals of Big Data Network Analysis for
Book SynopsisPresents the methodology of big data analysis using examples from research and industry There are large amounts of data everywhere, and the ability to pick out crucial information is increasingly important. Contrary to popular belief, not all information is useful; big data network analysis assumes that data is not only large, but also meaningful, and this book focuses on the fundamental techniques required to extract essential information from vast datasets. Featuring case studies drawn largely from the iron and steel industries, this book offers practical guidance which will enable readers to easily understand big data network analysis. Particular attention is paid to the methodology of network analysis, offering information on the method of data collection, on research design and analysis, and on the interpretation of results. A variety of programs including UCINET, NetMiner, R, NodeXL, and Gephi for network analysis are covered in detail. Fundamentals of Big Data Network AnalTable of ContentsPreface ix About the Authors xi List of Figures xiii List of Tables xvii 1 Why Big Data? 1 1.1 Big Data 1 1.2 What Creates Big Data? 6 1.3 How Do We Use Big Data? 9 1.4 Essential Issues Related to Big Data 13 References 14 2 Basic Programs for Analyzing Networks 15 2.1 UCINET 15 2.2 NetMiner 20 2.3 R 22 2.4 Gephi 28 2.5 NodeXL 31 References 32 3 Understanding Network Analysis 35 3.1 Defining Social Network Analysis 35 3.2 Basic SNA Concepts 37 3.2.1 Basic Terminology 37 3.2.2 Representation of a Network 38 3.3 Social Network Data 40 3.3.1 One]Mode and Two]Mode Networks 40 3.3.2 Attributes and Weights 42 3.3.3 Network Data Form 42 References 44 4 Research Methods Using SNA 45 4.1 SNA Research Procedures 46 4.2 Identifying the Research Problem and Developing Hypotheses 47 4.2.1 Identifying the Research Problem 47 4.2.2 Developing Hypotheses 47 4.3 Research Design 49 4.3.1 Defining the Network Model 49 4.3.2 Establishing Network Boundaries 51 4.3.3 Measurement Evaluation 52 4.4 Acquisition of Network Data 54 4.4.1 Survey 54 4.4.2 Interview, Observation, and Experiment 55 4.4.3 Existing Data 56 4.5 Data Cleansing 58 4.5.1 Extraction of the Node and Link 59 4.5.2 Merging and Separation of Data 59 4.5.3 Directional Transformation in the Link 61 4.5.4 Transformation of the Weights in Links 64 4.5.5 Transformation of the Two]Mode Network to a One]Mode Network 66 References 69 5 Position and Structure 71 5.1 Position 71 5.1.1 Degree Centrality 72 5.1.2 Closeness Centrality 82 5.1.3 Betweenness Centrality 84 5.1.4 Prestige Centrality 85 5.1.5 Broker 88 5.2 Cohesive Subgroup 91 5.2.1 Component 91 5.2.2 Community 92 5.2.3 Clique 93 5.2.4 k]Core 95 References 96 6 Connectivity and Role 97 6.1 Connection Analysis 98 6.1.1 Connectivity 98 6.1.2 Reciprocity 99 6.1.3 Transitivity 102 6.1.4 Assortativity 104 6.1.5 Network Properties 104 6.2 Role 104 6.2.1 Structural Equivalence 105 6.2.2 Automorphic Equivalence 107 6.2.3 Role Equivalence 109 6.2.4 Regular Equivalence 111 6.2.5 Block Modeling 115 References 117 7 Data Structure in NetMiner 119 7.1 Sample Data 119 7.1.1 01.Org_Net_Tiny1 120 7.1.2 02.Org_Net_Tiny2 120 7.1.3 03.Org_Net_Tiny3 121 7.2 Main Concept 122 7.2.1 Data Structure 122 7.2.2 Creating Data 124 7.2.3 Inserting Data 125 7.2.4 Importing Data 129 7.3 Data Preprocessing 130 7.3.1 Change of Link 130 7.3.2 Extraction and Reordering of the Node and Link 133 7.3.3 Data Merge and Split 136 Reference 140 8 Network Analysis Using NetMiner 141 8.1 Centrality and Cohesive Subgroup 141 8.1.1 Centrality 141 8.1.2 Cohesive Subgroup 147 8.2 Connectivity and Equivalence 153 8.2.1 Connectivity 153 8.2.2 Equivalence 156 8.3 Visualization and Exploratory Analysis 161 8.3.1 Visualization 161 8.3.2 Transformation of the Two]Mode Network to a One]Mode Network 168 Appendix A Visualization 171 A.1 Spring Algorithm 171 A.2 Multidimensional Scaling Algorithm 173 A.3 Cluster Algorithm 173 A.4 Layered Algorithm 174 A.5 Circular Algorithm 174 A.6 Simple Algorithm 175 References 176 Appendix B Case Study: Knowledge Structure of Steel Research 179 Index 193
£45.86
John Wiley & Sons Inc Communicating in Risk Crisis and High Stress
Book SynopsisTable of ContentsA Note from the Series Editor xiii Acknowledgments xv Author Biography xvii 1 The Critical Role of Risk, High Concern, and Crisis Communication 1 1.1 Case Diary: A Collision of Facts and Perceptions 2 1.2 What Will Readers Find in This Book? 3 1.3 Why You Will Use This Book 4 1.4 The Need for This Book – Now 5 1.4.1 New Literature, New Research 5 1.4.2 Changes in the Communications Landscape 6 1.4.3 Changes in Journalism and the Perception of Facts 7 1.4.4 Changes in Laws, Regulations, and Societal Expectations 7 1.4.5 Changes in Concerns about Health, Safety, and the Environment 7 1.4.6 Changes in Levels of Trust 7 1.4.7 Changes in the Global Political Environment 8 1.4.8 The COVID- 19 Pandemic and the Changed Communication Landscape 8 2 Core Concepts 11 2.1 Case Diary: Recognizing Change as a High Concern Issue 11 2.2 Defining the Concept and Term Risk 13 2.3 Defining the Concept and Term Risk Communication 14 2.4 Risk Communication and Its Relationship to Risk Analysis 17 2.5 Defining the Concepts and Terms High Concern and High Concern Communication 19 2.6 Defining the Concept and Term Crisis 22 2.7 Defining the Concept and Term Crisis Communication 24 2.8 Chapter Resources 25 Endnotes 31 3 An Overview of Risk Communication 33 3.1 Case Diary: Complex Issues Destroy Homes 33 3.2 Challenges and Difficulties Faced in Communicating Risk Information 35 3.2.1 Characteristics and Limitations of Scientific and Technical Data about Risks 35 3.2.2 Characteristics and Limitations of Spokespersons in Communicating Information about Risks 35 3.2.2.1 Case Study: “Go Hard, Go Early”: Risk Communication Lessons from New Zealand’s Response to COVID-19 37 3.2.3 Characteristics and Limitations of Risk Management Regulations and Standards 41 3.2.3.1 Debates and Disagreements 41 3.2.3.2 Limited Resources for Risk Assessment and Management 41 3.2.3.3 Underestimating the Difficulty of and Need for Risk Communication 42 3.2.3.4 Lack of Coordination and Collaboration 42 3.2.4 Characteristics and Limitations of Traditional Media Channels in Communicating Information about Risks 42 3.2.5 Characteristics and Limitations of Social Media Channels in Communicating Information about Risks 43 3.2.6 Characteristics and Limitations of People in their Ability to Evaluate and Interpret Risk Information 44 3.3 Changes in How the Brain Processes Information Under Conditions of High Stress 48 3.4 Risk Communication Theory 49 3.4.1 Trust Determination Theory 49 3.4.2 Negative Dominance Theory 50 3.4.3 Mental Noise Theory 50 3.4.4 Risk Perception Theory 50 3.5 Risk Communication Principles and Guidelines 55 3.5.1 Principle 1. Accept and Involve All Interested and Affected Persons as Legitimate Partners 55 3.5.2 Principle 2. Plan Carefully and Evaluate Performance 55 3.5.3 Principle 3. Listen to Your Audience 57 3.5.4 Principle 4. Be Honest, Frank, and Open 57 3.5.5 Principle 5. Coordinate and Collaborate with Other Credible Sources 58 3.5.6 Principle 6. Meet the Needs of Traditional and Social Media 58 3.5.7 Principle 7. Speak Clearly and with Compassion 58 3.6 Key Takeaway Concepts and Conclusions from this Overview Chapter 59 3.7 Chapter Resources 59 Endnotes 66 4 Development of Risk Communication Theory and Practice 69 4.1 Case Diary: Origin Story 69 4.2 Introduction 70 4.2.1 Historical Phase 1: Presenting Risk Numbers 71 4.2.2 Historical Phase 2: Listening and Planning 71 4.2.3 Historical Phase 3: Stakeholder Engagement 72 4.2.4 Covello and Sandman’s Four Stages of Risk Communication 72 4.2.4.1 Stage 1: Ignore the Public 73 4.2.4.2 Stage 2: Explaining Risk Data Better 73 4.2.4.3 Stage 3: Stakeholder Engagement 77 4.2.4.4 Stage 4: Empowerment 78 4.3 Summary 79 4.4 Chapter Resources 79 Endnotes 83 5 Stakeholder Engagement and Empowerment 87 5.1 Case Diary: A Town Hall Public Meeting Goes Very Wrong 87 5.2 Introduction 89 5.3 Levels of Stakeholder Engagement 91 5.3.1 Types of Stakeholder Engagement 93 5.4 Benefits of Stakeholder Engagement 95 5.5 Limitations and Challenges of Stakeholder Engagement 96 5.6 Techniques and Approaches for Effective Stakeholder Engagement 97 5.7 Meetings with Stakeholders 100 5.7.1 Town Hall Meetings 101 5.7.2 Open House Meetings/Information Workshops 102 5.7.3 Tips for Meetings with Stakeholders 102 5.8 Chapter Resources 104 Endnotes 107 6 Communicating in a Crisis 111 6.1 Case Diary: The Challenge of Partnership in a Crisis 112 6.2 The Three Phases of a Crisis 113 6.3 Communication in the Precrisis Preparedness Phase 115 6.3.1 Precrisis Communication Activity: Identifying Potential Crises 117 6.3.2 Case Study: The 2010 BP Deepwater Horizon Oil Spill 118 6.3.3 Precrisis Communication Activity: Identify Goals and Objectives 120 6.3.4 Precrisis Communication Activity: Develop a Crisis Communication Plan 121 6.3.5 Precrisis Communication Activity: Identify, Train, and Test Crisis Communication Spokespersons 124 6.3.6 Precrisis Communication Activity: Engaging Stakeholders 124 6.3.7 Precrisis Communication Activity: Identifying Stakeholders’ Questions and Concerns 126 6.3.8 Drafting Messages for Anticipated Stakeholder Questions and Concerns 126 6.3.9 Precrisis Communication Activity: Conducting Exercises to Test the Crisis Communication Plan 128 6.3.10 Precrisis Communication Activity: Incident Command System (ICS) and the Joint Information Center (JIC) 129 6.4 Communications in the Crisis Response Phase 130 6.4.1 Case Study: Lac-Mégantic Rail Tragedy 134 6.4.2 Disaster and Emergency Warnings 136 6.4.2.1 Designing Effective Warnings 137 6.4.2.2 Steps in the Disaster and Emergency Warning Process 137 6.5 Communicating Effectively about Blame, Accountability, and Responsibility 139 6.6 Communicating an Apology 140 6.6.1 Case Study: Maple Leaf Foods and the Listeria Food Contamination Crisis 141 6.6.2 Case Study: Southwest Airlines Apology 144 6.7 Communications in the Postcrisis Recovery Phase 145 6.7.1 Case Study and Case Diary: New York City’s Communication Trials by Fire, from West Nile to 9/11 146 6.7.2 Case Study: Johnson & Johnson and the Tylenol Tampering Case 147 6.7.3 Case Study: Flint, Michigan and Contaminated Drinking Water 149 6.8 Chapter Resources 151 Endnotes 159 7 Foundational Principles: Perceptions, Biases, and Information Filters 165 7.1 Case Diary: “A” Is for “Apples” 165 7.2 Message Perception and Reception in High Concern Situations 168 7.3 Message Filter Theory: A Set of Principles Drawn from the Behavioral and Neuroscience Literature 169 7.4 Case Study: COVID- 19 and Risk Perception Factors 171 7.4.1 Social Amplification Filters 173 7.4.2 Mental Shortcut Filters 174 7.4.3 Knowledge and Belief Filters 176 7.4.4 Personality Filters 177 7.4.5 Negative Dominance/Loss Aversion Filters 177 7.5 Message Filters and the Brain 179 7.6 Message Filters, Perceptions, and Models of Human Behavior 179 7.7 Message Filters, Perceptions, and Persuasion 180 7.8 Message Filters, Perceptions, and Ethics 181 7.9 Message Filters and the Issue of Acceptable Risk 182 7.9.1 Factors in Determining Acceptable Risk 183 7.9.2 Strategies for Addressing Acceptable Risk 184 7.10 The Message is in the Mind of the Receiver 186 7.11 Chapter Resources 186 Endnotes 192 8 Foundational Principles: Trust, Culture, and Worldviews 197 8.1 Case Diary: A Disease Outbreak in Africa 198 8.2 Trust Determination 200 8.3 Characteristics and Attributes of Trust 201 8.3.1 Trust and First Impressions 203 8.3.2 Loss of Trust 204 8.3.3 Gaining Trust 206 8.3.3.1 Gaining Trust through Stakeholder Engagement 206 8.3.3.2 Gaining Trust through Trust Transference 206 8.3.3.3 Gaining Trust through Actions and Behavior 207 8.4 Case Study: Trust and the Chernobyl Nuclear Power Plant Accident 207 8.5 Case Diary: The Fukushima Japan Nuclear Power Plant Accident 208 8.6 Gaining Trust in High- Stakes Negotiations 210 8.7 Case Diary: Gaining Trust and the SARS Outbreak in Hong Kong 211 8.8 Trust and Culture 212 8.9 Cultural Competency 212 8.9.1 Different Communication Styles 213 8.9.2 Different Attitudes and Approaches toward Conflict 214 8.9.3 Different Nonverbal Communication 214 8.9.4 Different Attitudes and Approaches to Decision Making 214 8.9.5 Different Attitudes and Approaches toward Information Disclosure 215 8.9.6 Different Attitudes and Approaches to Knowing 215 8.9.7 Different Attitudes and Approaches toward Conversation and Discourse 215 8.9.8 Different Attitudes and Approaches toward the Use of Humor 215 8.10 Risk Perceptions, Trust, and Cultural Theory 215 8.11 Risk Perceptions, Trust, and Worldviews 217 8.12 Case Diary: Fame, Family, and Fear in Public Health Communications 218 8.13 Chapter Resources 221 Endnotes 227 9 Best Practices for Message Development in High Concern Situations 231 9.1 Case Diary: Mapping Through a Maze of COVID Confusion 231 9.2 Introduction 232 9.3 Crafting Messages in the Context of Stress and High Concern Decision- Making 233 9.3.1 Trust Determination and Messaging in High-Stress Situations 233 9.3.1.1 The CCO Best Practice 233 9.3.2 Impaired Comprehension and Messaging in High-Stress Situations 234 9.3.3 Negative Dominance and Messaging in High-Stress Situations 234 9.3.4 Emotional Impact and Messaging in High-Stress Situations 235 9.3.4.1 Case Study: Hoarding Toilet Paper at the Outset of the 2020 COVID-19 Pandemic 236 9.4 Message Mapping 238 9.4.1 Benefits of Message Maps 238 9.4.2 Message Maps and the Brain 241 9.4.3 The Development of Message Mapping 243 9.4.4 Case Study: Message Maps and Asbestos 244 9.4.5 Steps in Developing a Message Map 245 9.4.5.1 Step 1: Identify, Profile, and Prioritize Key Stakeholders 245 9.4.5.2 Step 2: Develop Lists of Stakeholder Questions and Concerns 248 9.4.5.3 Case Study: Stakeholder Questions, Terrorism, and Disasters 249 9.4.5.4 Step 3: Develop Key Messages 249 9.4.5.5 Step 4: Develop Supporting Information 252 9.4.5.6 Step 5: Testing the Message Map 253 9.4.5.7 Step 6: Repurpose Maps through Appropriate Information Channels 254 9.5 Summary 254 9.6 Chapter Resources 255 Endnotes 263 Appendices 265 Appendix 9.1 265 Appendix 9.2 267 Appendix 9.3 277 Appendix 9.4 280 10 Communicating Numbers, Statistics, and Technical Information about a Risk or Threat 285 10.1 Case Diary: A Civil Action 285 10.2 Introduction 288 10.3 Case Study: Numbers, Statistics, and COVID-19 289 10.4 Brain Processes That Filter How Technical Information about Risk or Threat Is Received and Understood 292 10.4.1 Risk and Threat Perception Filters 293 10.4.2 Thought Processing Filters 294 10.4.3 Mental Model Filters 294 10.4.4 Emotional Filters 295 10.4.5 Motivational Filters 295 10.5 Challenges in Explaining Technical Information About a Risk or Threat 296 10.6 Framing 297 10.7 Technical Jargon 298 10.8 Information Clarity 299 10.9 Units of Measurement 300 10.10 Case Study: Risk Numbers, Risk Statistics, and the Challenger Accident 303 10.11 Comparisons 304 10.12 Lessons Learned 308 10.13 Chapter Resources 308 Endnotes 315 11 Evaluating Risk, High Concern, and Crisis Communications 321 11.1 Case Diary: Finding the Road to Rio 321 11.1.1 The Mosquito Front 322 11.1.2 The Citizen Front 322 11.1.3 The Olympic Athlete and Visitor Front 323 11.1.4 Communication Strategy: The Citizen Front 323 11.1.5 Communication Strategy: Olympic Athlete and Visitor Front 323 11.2 Introduction 324 11.3 Benefits of Evaluation 326 11.4 Evaluation Practices for Risk, High Concern, and Crisis Communication 327 11.5 Case Studies of Evaluation Comparison to Best Practice: Hurricane Katrina, COVID-19 and Vaccination Hesitancy, and Outbreak of COVID-19 in Wuhan, China 329 11.5.1 Hurricane Katrina 329 11.5.2 COVID-19 and Vaccination Hesitancy 330 11.5.3 Outbreak of COVID-19 in Wuhan, China 330 11.6 Barriers and Challenges to Evaluation 332 11.6.1 Differences in Values 332 11.6.2 Differences in Goals 332 11.6.3 Competition for Resources 332 11.6.4 Ability to Learn from Results 333 11.7 Evaluation Measures 338 11.7.1 Process/Implementation Evaluation Measures 338 11.7.2 Outcome/Impact Evaluation Measures 339 11.7.3 Formative Evaluation Measures 340 11.8 An Integrated Approach to Evaluation 341 11.9 Resource: Case Study of Focus Group Testing of Mosquito-Control Messages, Florida, 2018–2019 342 11.10 Evaluation Tools 347 11.11 Chapter Resources 348 Endnotes 353 12 Communicating with Mainstream News Media 357 12.1 Case Diary: A High Stakes Chess Game with a News Media Outlet 357 12.2 Introduction 359 12.3 Characteristics of the Mainstream News Media 361 12.3.1 Content 361 12.3.2 Clarity 362 12.3.3 Avoiding Prejudice 362 12.3.4 Topicality 362 12.3.5 Diversity 363 12.3.6 Subject Matter Expertise 363 12.3.7 Resources 363 12.3.8 Career Advancement 364 12.3.9 Watchdogs 364 12.3.10 Amplifiers 364 12.3.11 Skepticism 364 12.3.12 Source Dependency 365 12.3.13 Professionalism and Independence 365 12.3.14 Covering Uncertainty 366 12.3.15 Legal Constraints 366 12.3.16 Special Populations 366 12.3.17 Competition 366 12.3.18 Confidentiality and Protection of Sources 367 12.3.19 Deadlines 367 12.3.20 Trust 367 12.3.21 Storytelling 368 12.3.22 Balance and Controversy 368 12.4 Guidelines and Best Practices for Interacting with Mainstream News Media 368 12.5 The Media Interview 370 12.6 Lessons and Trends 375 12.7 Case Diary: A Ten-Round Exercise 377 12.8 Chapter Resources 378 Endnotes 381 13 Social Media and the Changing Landscape for Risk, High Concern, and Crisis Communication 385 13.1 Case Diary: Myth-Busting: Mission Impossible? 385 13.2 Introduction 387 13.3 Benefits of Social Media Outlets for Risk, High Concern, and Crisis Communication 389 13.3.1 Speed 389 13.3.2 Access 390 13.3.3 Reach 390 13.3.4 Amplification 390 13.3.5 Transparency 390 13.3.6 Understanding 390 13.3.7 Changes in Behaviors 391 13.3.8 Relationship Building 391 13.3.9 Timeliness 391 13.3.10 Hyperlocal Specificity 391 13.3.11 Listening and Feedback 392 13.3.12 Taking Advantage of the Benefits of Social Media 392 13.4 Challenges of Social Media for Risk, High Concern, and Crisis Communication 393 13.4.1 Rising Expectations 393 13.4.2 Repostings/Redistribution 393 13.4.3 Permanent Storage 394 13.4.4 Hacking/Security 394 13.4.5 Rise and Fall of Social Media Platforms 394 13.4.6 Resources 394 13.4.7 Privacy and Confidentiality 394 13.4.8 Cognitive Overload 395 13.4.9 Players on the Field 395 13.4.10 Misinformation, Disinformation, and Rumors 395 13.5 Case Study: Social Media and the 2007 and 2011 Shooter Incidents at Virginia Polytechnic Institute and State University (Virginia Tech) 397 13.6 Case Study: Social Media and the 2013 Southern Alberta/Calgary Flood 398 13.7 Best Practices for Using Social Media in Risk, High Concern, and Crisis Situations 400 13.7.1 Create a Social Media Plan 400 13.7.2 Staff Appropriately for Social Media Communication 400 13.7.3 Ensure Continuous Updating 401 13.7.4 Identify Your Partners 401 13.7.5 Assess and Reassess Your Selection of Platforms 401 13.7.6 Create and Maintain as Many Social Media Accounts as You and Your Stakeholders Need 401 13.7.7 Be Prepared for the Special Social Media Requirements and Pressures in a Crisis 401 13.7.8 Provide Guidance for Employees and Engage Them in the Process 402 13.7.9 Don’t Skip Evaluation 403 13.8 Case Diary: Social Media and the Negative Power of“Junk”Information about Risks and Threats 403 13.9 Lessons Learned and Trends 404 13.10 Chapter Resources 404 Endnotes 408 Index 411
£39.85
John Wiley & Sons Inc Group Policy
Book SynopsisGet up to speed on the latest Group Policy tools, features, and best practices Group Policy, Fundamentals, Security, and the Managed Desktop, 3rd Edition helps you streamline Windows and Windows Server management using the latest Group Policy tools and techniques. This updated edition covers Windows 10 and Windows Server vNext, bringing you up to speed on all the newest settings, features, and best practices. Microsoft Group Policy MVP Jeremy Moskowitz teaches you the major categories of Group Policy, essential troubleshooting techniques, and how to manage your Windows desktops. This is your complete guide to the latest Group Policy features and functions for all modern Windows clients and servers, helping you manage more efficiently and effectively. Perform true desktop and server management with the Group Policy Preferences, ADMX files, and additional add-ons Use every feature of the GPMC and become a top-notch administratoTable of ContentsIntroduction xxv Chapter 1 Group Policy Essentials 1 Getting Ready to Use This Book 2 Getting Started with Group Policy 7 Group Policy Entities and Policy Settings 7 Active Directory and Local Group Policy 9 Understanding Local Group Policy 10 Group Policy and Active Directory 13 Linking Group Policy Objects 15 Final Thoughts on Local GPOs 20 An Example of Group Policy Application 21 Examining the Resultant Set of Policy 23 At the Site Level 23 At the Domain Level 24 At the OU Level 24 Bringing It All Together 25 Group Policy, Active Directory, and the GPMC 26 Implementing the GPMC on Your Management Station 27 Creating a One-Stop-Shop MMC 30 Group Policy 101 and Active Directory 32 Active Directory Users and Computers vs. GPMC 32 Adjusting the View within the GPMC 33 The GPMC-centric View 35 Our Own Group Policy Examples 37 More about Linking and the Group Policy Objects Container 38 Applying a Group Policy Object to the Site Level 41 Applying Group Policy Objects to the Domain Level 44 Applying Group Policy Objects to the OU Level 47 Testing Your Delegation of Group Policy Management 52 Understanding Group Policy Object Linking Delegation 54 Granting OU Admins Access to Create New Group Policy Objects 55 Creating and Linking Group Policy Objects at the OU Level 56 Creating a New Group Policy Object Affecting Computers in an OU 59 Moving Computers into the Human Resources Computers OU 61 Verifying Your Cumulative Changes 62 Final Thoughts 64 Chapter 2 Managing Group Policy with the GPMC and via PowerShell 67 Common Procedures with the GPMC and PowerShell 69 Raising or Lowering the Precedence of Multiple Group Policy Objects 75 Understanding GPMC’s Link Warning 76 Stopping Group Policy Objects from Applying 78 Block Inheritance 85 The Enforced Function 87 Security Filtering and Delegation with the GPMC 90 Filtering the Scope of Group Policy Objects with Security 91 User Permissions on Group Policy Objects 102 Granting Group Policy Object Creation Rights in the Domain 104 Special Group Policy Operation Delegations 105 Who Can Create and Use WMI Filters? 107 Performing RSoP Calculations with the GPMC 109 What’s-Going-On Calculations with Group Policy Results 110 What-If Calculations with Group Policy Modeling 116 Searching and Commenting Group Policy Objects and Policy Settings 118 Searching for GPO Characteristics 119 Filtering Inside a GPO for Policy Settings 121 Comments for GPOs and Policy Settings 132 Starter GPOs 137 Creating a Starter GPO 139 Editing a Starter GPO 139 Leveraging a Starter GPO 141 Delegating Control of Starter GPOs 142 Wrapping Up and Sending Starter GPOs 143 Should You Use Microsoft’s Pre-created Starter GPOs? 144 Back Up and Restore for Group Policy 145 Backing Up Group Policy Objects 146 Restoring Group Policy Objects 148 Backing Up and Restoring Starter GPOs 152 Backing Up and Restoring WMI Filters 153 Backing Up and Restoring IPsec Filters 153 Migrating Group Policy Objects between Domains 154 Basic Interdomain Copy and Import 154 Copy and Import with Migration Tables 162 GPMC At-a-Glance Icon View 166 Final Thoughts 167 Chapter 3 Group Policy Processing Behavior Essentials 169 Group Policy Processing Principles 170 Don’t Get Lost 172 Initial Policy Processing 172 Background Refresh Policy Processing 174 Security Background Refresh Processing 187 Special Case: Moving a User or a Computer Object 193 Windows 8, 8.1, and 10 Group Policy: Subtle Differences 194 Policy Application via Remote Access, Slow Links, and after Hibernation 200 When and How Does Windows Check for Slow Links? 200 What Is Processed over a Slow Network Connection? 201 Always Get Group Policy (Even on the Road, through the Internet) 202 Using Group Policy to Affect Group Policy 205 Affecting the User Settings of Group Policy 205 Affecting the Computer Settings of Group Policy 207 The Missing Group Policy Preferences Policy Settings 219 Final Thoughts 221 Chapter 4 Advanced Group Policy Processing 223 Fine-Tuning When and Where Group Policy Applies 223 Using WMI Filters to Filter the Scope of a Group Policy Object (Itself) 224 Using PolicyPak Admin Templates Manager to Filter the Scope of a Group Policy Object’s Contents 230 Group Policy Loopback Processing 231 Reviewing Normal Group Policy Processing 232 Group Policy Loopback—Merge Mode 233 Group Policy Loopback—Replace Mode 233 Loopback without Loopback (Switched Mode with PolicyPak Application Manager and PolicyPak Admin Templates Manager) 239 Group Policy with Cross-Forest Trusts 242 What Happens When Logging onto Different Clients across a Cross-Forest Trust? 243 Disabling Loopback Processing When Using Cross-Forest Trusts 245 Understanding Cross-Forest Trust Permissions 245 Final Thoughts 247 Chapter 5 Group Policy Preferences 249 Powers of the Group Policy Preferences 252 Computer Configuration ➢ Preferences 258 User Configuration ➢ Preferences 269 Group Policy Preferences Concepts 278 Preference vs. Policy 279 The Overlap of Group Policy vs. Group Policy Preferences and Associated Issues 281 The Lines and Circles and the CRUD Action Modes 293 Common Tab 301 Group Policy Preferences Tips, Tricks, and Troubleshooting 313 Quick Copy, Drag and Drop, Cut and Paste, and Sharing of Settings 313 Multiple Preference Items at a Level 315 Temporarily Disabling a Single Preference Item or Extension Root 317 Environment Variables 318 Managing Group Policy Preferences: Hiding Extensions from within the Editor 320 Troubleshooting: Reporting, Logging, and Tracing 321 Giving Group Policy Preferences a “Boost” (Using PolicyPak Preferences Manager and PolicyPak Cloud) 329 Using PolicyPak Preferences Manager to Maintain Group Policy Preferences while Offline 330 Using PolicyPak Preferences Manager to Deliver Group Policy Preferences Using “Not Group Policy” 330 Delivering Group Policy Preferences over the Internet Using PolicyPak Cloud (to Domain-Joined and Non–Domain-Joined Machines) 331 Final Thoughts 332 Chapter 6 Managing Applications and Settings Using Group Policy 335 Understanding Administrative Templates 336 Administrative Templates: Then and Now 336 Policy vs. Preference 337 Exploring ADM vs. ADMX and ADML Files 342 Looking Back at ADM Files 342 Understanding the Updated GPMC’s ADMX and ADML Files 342 Comparing ADM vs. ADMX Files 344 ADMX and ADML Files: What They Do and the Problems They Solve 345 Problem and Solution 1: Tackling SYSVOL Bloat 345 Problem 2: How Do We Deal with Multiple Languages? 346 Problem 3: How Do We Deal with “Write Overlaps”? 347 Problem 4: How Do We Distribute Updated Definitions to All Our Administrators? 349 The Central Store 349 The Windows ADMX/ADML Central Store 351 Creating and Editing GPOs in a Mixed Environment 355 Scenario 1: Start by Creating and Editing a GPO Using the Older GPMC; Edit Using Another Older GPMC Management Station 355 Scenario 2: Start by Creating and Editing a GPO with the Older GPMC; Edit Using the Updated GPMC 356 Scenario 3: Start by Creating and Editing a GPO Using the Updated GPMC; Edit Using Another Updated GPMC Management Station 358 Scenario 4: Start by Creating and Editing a GPO Using an Updated GPMC Management Station; Edit Using an Older GPMC Management Station 358 Using ADM and ADMX Templates from Other Sources 359 Using ADM Templates with the Updated GPMC 359 Using ADMX Templates from Other Sources 361 ADMX Migrator and ADMX Editor Tools 362 ADMX Migrator 363 ADMX Creation and Editor Tools 365 PolicyPak Application Manager 365 PolicyPak Concepts and Installation 367 Top PolicyPak Application Manager Pak Examples 369 Understanding PolicyPak Superpowers and What Happens When Computers Are Off the Network 373 Final Thoughts 376 Chapter 7 Troubleshooting Group Policy 379 Under the Hood of Group Policy 381 Inside Local Group Policy 381 Inside Active Directory Group Policy Objects 383 The Birth, Life, and Death of a GPO 385 How Group Policy Objects Are “Born” 386 How a GPO “Lives” 387 Death of a GPO 415 How Client Systems Get Group Policy Objects 416 The Steps to Group Policy Processing 416 Client-Side Extensions 419 Where Are Administrative Templates Registry Settings Stored? 427 Why Isn’t Group Policy Applying? 429 Reviewing the Basics 429 Advanced Inspection 432 Client-Side Troubleshooting 441 RSoP for Windows Clients 442 Advanced Group Policy Troubleshooting with the Event Viewer Logs 450 Group Policy Processing Performance 462 Final Thoughts 463 Chapter 8 Implementing Security with Group Policy 465 The Two Default Group Policy Objects 466 GPOs Linked at the Domain Level 467 Group Policy Objects Linked to the Domain Controllers OU 471 Oops, the “Default Domain Policy” GPO and/or “Default Domain Controllers Policy” GPO Got Screwed Up! 473 The Strange Life of Password Policy 475 What Happens When You Set Password Settings at an OU Level 475 Fine-Grained Password Policy 477 Inside Basic and Advanced Auditing 482 Basic Auditable Events Using Group Policy 482 Auditing File Access 487 Auditing Group Policy Object Changes 489 Advanced Audit Policy Configuration 491 Restricted Groups 495 Strictly Controlling Active Directory Groups 497 Strictly Applying Group Nesting 499 Which Groups Can Go into Which Other Groups via Restricted Groups? 500 Restrict Software Using AppLocker 500 Inside Software Restriction Policies 501 Software Restriction Policies’ “Philosophies” 502 Software Restriction Policies’ Rules 503 Restricting Software Using AppLocker 510 Controlling User Account Control with Group Policy 531 Just Who Will See the UAC Prompts, Anyway? 534 Understanding the Group Policy Controls for UAC 539 UAC Policy Setting Suggestions 548 Wireless (802.3) and Wired Network (802.11) Policies 551 802.11 Wireless Policy for Windows XP 552 802.11 Wireless Policy and 802.3 Wired Policy for Modern Windows 553 Configuring Windows Firewall with Group Policy 554 Manipulating the Windows Firewall (the Old Way) 557 Windows Firewall with Advanced Security WFAS 558 IPsec (Now in Windows Firewall with Advanced Security) 567 How Windows Firewall Rules Are Ultimately Calculated 572 Final Thoughts 576 Chapter 9 Profiles: Local, Roaming, and Mandatory 579 Setting the Stage for Multiple Clients 579 What Is a User Profile? 583 The NTUSER.DAT File 583 Profile Folders for Type 1 Computers (Windows XP and Windows 2003 Server) 584 Profile Folders for Type 2–5 Computers (Windows Vista and Later) 586 The Default Local User Profile 591 The Default Network User Profile 594 Roaming Profiles 599 Are Roaming Profiles “Evil”? And What Are the Alternatives? 601 Setting Up Roaming Profiles 604 Testing Roaming Profiles 608 Roaming and Nonroaming Folders 610 Managing Roaming Profiles 614 Manipulating Roaming Profiles with Computer Group Policy Settings 617 Manipulating Roaming Profiles with User Group Policy Settings 630 Mandatory Profiles 635 Establishing Mandatory Profiles for Windows XP 636 Establishing Mandatory Profiles for Modern Windows 638 Mandatory Profiles—Finishing Touches 639 Forced Mandatory Profiles (Super-Mandatory) 640 Final Thoughts 642 Chapter 10 The Managed Desktop, Part 1: Redirected Folders, Offline Files, and the Synchronization Manager 643 Redirected Folders 644 Available Folders to Redirect 644 Redirected Documents/My Documents 645 Redirecting the Start Menu and the Desktop 665 Redirecting the Application Data Folder 666 Group Policy Setting for Folder Redirection 667 Troubleshooting Redirected Folders 669 Offline Files and Synchronization 672 Making Offline Files Available 673 Inside Windows 10 File Synchronization 676 Handling Conflicts 684 Client Configuration of Offline Files 686 Using Folder Redirection and Offline Files over Slow Links 694 Synchronizing over Slow Links with Redirected My Documents 695 Synchronizing over Slow Links with Regular Shares 697 Teaching Windows 10 How to React to Slow Links 698 Using Group Policy to Configure Offline Files (User and Computer Node) 702 Troubleshooting Sync Center 710 Turning Off Folder Redirection’s Automatic Offline Caching for Desktops 712 Final Thoughts 720 Chapter 11 The Managed Desktop, Part 2: Software Deployment via Group Policy 723 Group Policy Software Installation (GPSI) Overview 724 The Windows Installer Service 726 Understanding .MSI Packages 726 Utilizing an Existing .MSI Package 727 Assigning and Publishing Applications 732 Assigning Applications 732 Publishing Applications 733 Rules of Deployment 734 Package-Targeting Strategy 734 Advanced Published or Assigned 745 The General Tab 746 The Deployment Tab 746 The Upgrades Tab 750 The Categories Tab 752 The Modifications Tab 752 The Security Tab 754 Default Group Policy Software Installation Properties 755 The General Tab 755 The Advanced Tab 756 The File Extensions Tab 757 The Categories Tab 757 Removing Applications 757 Users Can Manually Change or Remove Applications 758 Automatically Removing Assigned or Published .MSI Applications 758 Forcibly Removing Assigned or Published .MSI Applications 759 Using Group Policy Software Installation over Slow Links 761 MSI, the Windows Installer, and Group Policy 764 Inside the MSIEXEC Tool 764 Patching a Distribution Point 765 Affecting Windows Installer with Group Policy 767 Deploying Office 2010 and Later Using Group Policy (MSI Version) 771 Steps to Office 2013 and 2016 Deployment Using Group Policy 772 Result of Your Office Deployment Using Group Policy 782 Installing Office Using Click-to-Run 783 Getting Office Click-to-Run 784 Installing Office Click-to-Run by Hand 784 Deploying Office Click-to-Run via Group Policy 786 System Center Configuration Manager vs. Group Policy (and Alternatives) 793 Final Thoughts 796 Chapter 12 Finishing Touches with Group Policy: Scripts, Internet Explorer, Hardware Control, Printer Deployment, Local Admin Password Control 797 Scripts: Logon, Logoff, Startup, and Shutdown 798 Non-PowerShell-Based Scripts 798 Deploying PowerShell Scripts to Windows 7 and Later Clients 801 Managing Internet Explorer with Group Policy 802 Managing Internet Explorer with Group Policy Preferences 803 Internet Explorer’s Group Policy Settings 805 Understanding Internet Explorer 11’s Enterprise Mode 806 Managing Internet Explorer 11 Using PolicyPak Application Manager 808 Restricting Access to Hardware via Group Policy 808 Group Policy Preferences Devices Extension 809 Restricting Driver Access with Policy Settings 814 Getting a Handle on Classes and IDs 815 Restricting or Allowing Your Hardware via Group Policy 817 Understanding the Remaining Policy Settings for Hardware Restrictions 819 Assigning Printers via Group Policy 821 Zapping Down Printers to Users and Computers (a Refresher) 821 Implementing Rotating Local Passwords with LAPS 830 What to Install from LAPS 831 Extending the Schema and Setting LAPS Permissions 832 Using a Group Policy Object to Manage LAPS 835 Using LAPS Management’s Tools: Fat Client and PowerShell 836 Final Thoughts for This Chapter and for the Book 838 Appendix A Scripting Group Policy Operations with Windows PowerShell 839 Using PowerShell to Do More with Group Policy 840 Preparing for Your PowerShell Experience 841 Getting Started with PowerShell 842 Documenting Your Group Policy World with PowerShell 846 Setting GPO Permissions 867 Manipulating GPOs with PowerShell 870 Performing a Remote GPupdate (Invoking GPupdate) 880 Replacing Microsoft’s GPMC Scripts with PowerShell Equivalents 881 Final Thoughts 883 Appendix B Group Policy and VDI 885 Why Is VDI Different? 886 Tuning Your Images for VDI 887 Specific Functions to Turn Off for VDI Machines 888 Group Policy Settings to Set and Avoid for Maximum VDI Performance 889 Group Policy Tweaks for Fast VDI Video 891 Tweaking RDP Using Group Policy for VDI 891 Tweaking RemoteFX using Group Policy for VDI 892 Managing and Locking Down Desktop UI Tweaks 893 Final Thoughts for VDI and Group Policy 894 Appendix C Advanced Group Policy Management 897 The Challenge of Group Policy Change Management 898 Architecture and Installation of AGPM 899 AGPM Architecture 899 Installing AGPM 900 What Happens after AGPM Is Installed? 906 GPMC Differences with AGPM Client 906 What’s With All the Access Denied Errors? 908 Does the World Change Right Away? 908 Understanding the AGPM Delegation Model 908 AGPM Delegation Roles 909 AGPM Common Tasks 912 Understanding and Working with AGPM’s Flow 914 Controlling Your Currently Uncontrolled GPOs 915 Creating a GPO and Immediately Controlling It 918 Check Out a GPO 919 Viewing Reports about a Controlled GPO 921 Editing a Checked-Out Offline Copy of a GPO 921 Performing a Check In of a Changed GPO 923 Deploying a GPO into Production 924 Making Additional Changes to a GPO and Labeling a GPO 926 Using History and Differences to Roll Back a GPO 927 Using “Import from Production” to Catch Up a GPO 931 Uncontrolling, Restoring, and Destroying a GPO 932 Searching for GPOs Using the Search Box 934 AGPM Tasks with Multiple Admins 935 E‑mail Preparations and Configurations for AGPM Requests 936 Adding Someone to the AGPM System 939 Requesting the Creation of New Controlled GPO 943 Approving or Rejecting a Pending Request 944 Editing the GPO Offline via Check Out/Check In 946 Requesting Deployment of the GPO 946 Analyzing a GPO (as a Reviewer) 948 Advanced Configuration and Troubleshooting of AGPM 950 Production Delegation 950 Auto-Deleting Old GPO Versions 951 Export and Import of Controlled GPOs between Forests and/or Domains 951 Troubleshooting AGPM Permissions 953 Leveraging AGPM Templates 955 Changing Permissions on GPO Archives 958 Backing Up, Restoring, and Moving the AGPM Server 959 Changing the Port That AGPM Uses 962 Events from AGPM 963 Leveraging the Built-in AGPM ADMX Template 963 Final Thoughts 968 Appendix D Security Compliance Manager 969 SCM: Installation 970 SCM: Getting Around 972 SCM: Usual Use Case 974 Importing Existing GPOs 980 Comparing and Merging Baselines 980 LocalGPO Tool 983 Installing SCM’s LocalGPO Tool 984 Using SCM’s LocalGPO 985 Final Thoughts on LocalGPO and SCM 989 Appendix E Microsoft Intune and PolicyPak Cloud 991 Microsoft Intune 991 Getting Started with Microsoft Intune 992 Using Microsoft Intune 995 Setting Up Microsoft Intune Groups 995 Setting Up Policies Using Microsoft Intune 996 Microsoft Intune and Group Policy Conflicts 997 Final Thoughts on Microsoft Intune 998 PolicyPak Cloud 998 PolicyPak Cloud 101 999 Understanding PolicyPak Cloud Policies 999 Creating and Using PolicyPak Cloud Groups 1001 Joining PolicyPak Cloud 1001 Final Thoughts on PolicyPak Cloud 1003 Final Thoughts on Microsoft Intune and PolicyPak Cloud 1003 Index 1005
£38.00
John Wiley & Sons Inc Security in Fixed and Wireless Networks
Book SynopsisIntroduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms and protocols work.Table of ContentsAbout the authors xiii Preface to the second edition xv Preface to the first edition xvii I Foundations of Data Security Technology 1 1 Introduction 3 1.1 Content and Structure of this Book 4 1.2 Threats and Security Goals 6 1.3 Network Security Analysis 9 1.4 Information Security Measures 13 1.5 Important Terms Relating to Communication Security 14 2 Fundamentals of Cryptology 17 2.1 Cryptology, Cryptography and Cryptanalysis 17 2.2 Classification of Cryptographic Algorithms 18 2.3 Cryptanalysis 19 2.4 Estimating the Effort Needed for Cryptographic Analysis 21 2.5 Characteristics and Classification of Encryption Algorithms 23 2.6 Key Management 25 2.7 Summary 27 2.8 Supplemental Reading 28 2.9 Questions 29 3 Symmetric Cryptography 31 3.1 Encryption Modes of Block Ciphers 31 3.2 Data Encryption Standard 37 3.3 Advanced Encryption Standard 43 3.4 RC4 Algorithm 48 3.5 The KASUMI algorithm 51 3.6 Summary 53 3.7 Supplemental Reading 54 3.8 Questions 55 4 Asymmetric Cryptography 57 4.1 Basic Idea of Asymmetric Cryptography 57 4.2 Mathematical Principles 60 4.3 The RSA Algorithm 69 4.4 The Problem of the Discrete Logarithm 71 4.5 The Diffie–Hellman Key Exchange Algorithm 75 4.6 The ElGamal Algorithm 77 4.7 Security of Conventional Asymmetric Cryptographic Schemes 80 4.8 Principles of Cryptography Based on Elliptic Curves 81 4.9 Summary 93 4.10 Supplemental Reading 94 4.11 Questions 95 5 Cryptographic Check Values 97 5.1 Requirements and Classification 97 5.2 Modification Detection Codes 99 5.3 Message Authentication Codes 112 5.4 Message Authentication Codes Based on MDCs 116 5.5 Authenticated Encryption 117 5.6 Summary 121 5.7 Supplemental Reading 122 5.8 Questions 123 6 Random Number Generation 125 6.1 Random Numbers and Pseudo-Random Numbers 125 6.2 Cryptographically Secure Random Numbers 126 6.3 Statistical Tests for Random Numbers 128 6.4 Generation of Random Numbers 129 6.5 Generating Secure Pseudo-Random Numbers 130 6.6 Implementation Security 133 6.7 Summary 134 6.8 Supplemental Reading 135 6.9 Questions 136 7 Cryptographic Protocols 137 7.1 Properties and Notation of Cryptographic Protocols 137 7.2 Data Origin and Entity Authentication 139 7.3 Needham–Schroeder Protocol 143 7.4 Kerberos 147 7.5 International Standard X.509 155 7.6 Security of Negotiated Session Keys 160 7.7 Advanced Password Authentication Methods 161 7.8 Formal Validation of Cryptographic Protocols 166 7.9 Summary 176 7.10 Supplemental Reading 177 7.11 Questions 178 8 Secure Group Communication* 179 8.1 Specific Requirements for Secure Group Communication 179 8.2 Negotiation of Group Keys 181 8.3 Source Authentication 189 8.4 Summary 193 8.5 Supplemental Reading 194 8.6 Questions 194 9 Access Control 197 9.1 Definition of Terms and Concepts 197 9.2 Security Labels 199 9.3 Specification of Access Control Policies 201 9.4 Categories of Access Control Mechanisms 202 9.5 Summary 204 9.6 Supplemental Reading 204 9.7 Questions 205 II Network Security 207 10 Integration of Security Services in Communication Architectures 209 10.1 Motivation 209 10.2 A Pragmatic Model 211 10.3 General Considerations for the Placement of Security Services 213 10.4 Integration in Lower Protocol Layers vs Applications 216 10.5 Integration into End Systems or Intermediate Systems 217 10.6 Summary 219 10.7 Supplemental Reading 219 10.8 Questions 219 11 Link Layer Security Protocols 221 11.1 Virtual Separation of Data Traffic with IEEE 802.1Q 222 11.2 Securing a Local Network Infrastructure Using IEEE 802.1X 224 11.3 Encryption of Data Traffic with IEEE 802.1AE 226 11.4 Point-to-Point Protocol 228 11.5 Point-to-Point Tunneling Protocol 236 11.6 Virtual Private Networks 242 11.7 Summary 243 11.8 Supplemental Reading 245 11.9 Questions 246 12 IPsec Security Architecture 249 12.1 Short Introduction to the Internet Protocol Suite 249 12.2 Overview of the IPsec Architecture 253 12.3 Use of Transport and Tunnel Modes 261 12.4 IPsec Protocol Processing 263 12.5 The ESP Protocol 267 12.6 The AH Protocol 273 12.7 The ISAKMP Protocol 279 12.8 Internet Key Exchange Version 1 286 12.9 Internet Key Exchange Version 2 293 12.10 Other Aspects of IPsec 297 12.11 Summary 299 12.12 Supplemental Reading 300 12.13 Questions 301 13 Transport Layer Security Protocols 303 13.1 Secure Socket Layer 303 13.2 Transport Layer Security 315 13.3 Datagram Transport Layer Security 322 13.4 Secure Shell 323 13.5 Summary 332 13.6 Supplemental Reading 333 13.7 Questions 334 III Secure Wireless and Mobile Communications 335 14 Security Aspects of Mobile Communication 337 14.1 Threats in Mobile Communication Networks 337 14.2 Protecting Location Confidentiality 338 14.3 Summary 343 14.4 Supplemental Reading 343 14.5 Questions 343 15 Security in Wireless Local Area Networks 345 15.1 The IEEE 802.11 Standard for WLANs 345 15.2 Entity Authentication 347 15.3 Wired Equivalent Privacy 353 15.4 Robust Secure Networks 358 15.5 Security in Public WLANs 365 15.6 Summary 367 15.7 Supplemental Reading 368 15.8 Questions 369 16 Security in Mobile Wide-Area Networks 371 16.1 Global System for Mobile Communication 371 16.2 Universal Mobile Telecommunications System 378 16.3 Long-Term Evolution385 16.4 Summary 389 16.5 Supplemental Reading 390 16.6 Questions 391 IV Protecting Communications Infrastructures 393 17 Protecting Communications and Infrastructure in Open Networks 395 17.1 Systematic Threat Analysis 396 17.2 Security of End Systems 399 17.3 Summary 411 17.4 Supplemental Reading 411 17.5 Questions 412 18 Availability of Data Transport 413 18.1 Denial-of-Service Attacks 413 18.2 Distributed Denial-of-Service Attacks 420 18.3 Countermeasures 422 18.4 Summary 433 18.5 Supplemental Reading 434 18.6 Questions 435 19 Routing Security 437 19.1 Cryptographic Protection of BGP 441 19.2 Identification of Routing Anomalies* 450 19.3 Summary 455 19.4 Supplemental Reading 456 19.5 Questions 457 20 Secure Name Resolution 459 20.1 The DNS Operating Principle 459 20.2 Security Objectives and Threats 461 20.3 Secure Use of Traditional DNS 467 20.4 Cryptographic Protection of DNS 469 20.5 Summary 481 20.6 Supplemental Reading 482 20.7 Questions 483 21 Internet Firewalls 485 21.1 Tasks and Basic Principles of Firewalls 485 21.2 Firewall-Relevant Internet Services and Protocols 487 21.3 Terminology and Building Blocks 490 21.4 Firewall Architectures 491 21.5 Packet Filtering 495 21.6 Bastion Hosts and Proxy Servers 500 21.7 Other Aspects of Modern Firewall Systems 502 21.8 Summary 503 21.9 Supplemental Reading 504 21.10 Questions 505 22 Automated Attack Detection and Response 507 22.1 Operating Principle and Objectives of Intrusion Detection Systems 508 22.2 Design and operation of network-based IDSs 512 22.3 Response to Attacks and Automatic prevention 521 22.4 Techniques for Evading NIDSs 524 22.5 Summary 526 22.6 Supplemental Reading 527 22.7 Questions 528 23 Management of Complex Communication Infrastructures* 529 23.1 Automatic Certificate Management 529 23.2 Automatic VPN Configuration 536 23.3 Summary 550 23.4 Supplemental Reading 552 23.5 Questions 554 Bibliography 555 Abbreviations 585 Index 595
£79.16
John Wiley & Sons Inc Security Privacy and Digital Forensics in the
Book SynopsisIn a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and privacy has become a critical issue. Written by some of the top experts in the field, this book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services. The first half of the book enables readers to have a comprehensive understanding and background of cloud security, which will help them through the digital investigation guidance and recommendations found in the second half of the book. Part One ofSecurity, Privacy and Digital Forensics in theCloudcovers cloud infrastructure security; confidentiality of data; access control in cloud IaaS; clouTable of ContentsList of Contributors xv Part I Cloud Security and Privacy 1 1 Introduction to the Cloud and Fundamental Security and Privacy Issues of the Cloud 3Hassan Takabi and Mohammad GhasemiGol 1.1 Introduction 3 1.2 Cloud Computing and Security Issues 4 1.3 Identity Security in the Cloud 9 1.4 Information Security in the Cloud 9 1.5 Cloud Security Standards 16 1.6 Conclusion 20 References 20 2 Cloud Infrastructure Security 23Mohammad GhasemiGol 2.1 Introduction 23 2.2 Infrastructure Security in the Cloud 24 2.3 Infrastructure Security Analysis in Some Clouds 31 2.4 Protecting Cloud Infrastructure 45 2.5 Conclusion 49 References 49 3 Confidentiality of Data in the Cloud: Conflicts Between Security and Cost 51Nathalie Baracaldo and Joseph Glider 3.1 Introduction 51 3.2 Background 51 3.3 Confidentiality: Threats and Adversaries 54 3.4 Achieving Data Confidentiality in Cloud Storage Systems 55 3.5 Reducing Cloud Storage System Costs through Data‐Reduction Techniques 57 3.6 Reconciling Data Reduction and Confidentiality 59 3.7 Trusted Decrypter 62 3.8 Future Directions for Cloud Storage Confidentiality with Low Cost 74 3.9 Conclusions 76 References 77 4 Access Control in Cloud IaaS 81Yun Zhang, Ram Krishnan, Farhan Patwa, and Ravi Sandhu 4.1 Introduction 81 4.2 Background 82 4.3 Access Control in OpenStack Cloud IaaS 83 4.4 Access Control in AWS Cloud IaaS 90 4.5 Access Control in Azure Cloud IaaS 99 4.6 Conclusions 107 References 107 5 Cloud Security and Privacy Management 109Patrick Kamongi 5.1 Introduction and Background 109 5.2 Security and Privacy Analysis 111 5.3 Best Security Practices and Recommendation 117 5.4 Use Case Example: Microsoft Office 365, SaaS Version 118 5.5 Current Trends and Future Direction 125 5.6 Related Works 125 5.7 Conclusion 126 Acknowledgments 126 References 126 6 Hacking and Countermeasures in the Cloud 129Farzaneh Abazari, Hassan Takabi, and Morteza Analoui 6.1 Introduction 129 6.2 Background 130 6.3 Cloud Security Threats 130 6.4 Cloud Security Countermeasures 134 6.5 Hacking the Cloud: Reality Check 136 6.6 Future of Cloud Security 137 6.6.1 Cloud Security for the IoT 138 6.7 Conclusions 139 References 139 7 Risk Management and Disaster Recovery in the Cloud 143Saman Zonouz 7.1 Introduction 143 7.2 Background 143 7.3 Consequence‐ Centric Security Assessment 145 7.4 Future Directions 154 7.5 Conclusions 155 8 Cloud Auditing and Compliance 157Paolina Centonze 8.1 Introduction 157 8.2 Background 157 8.3 Cloud Auditing 162 8.4 Cloud Compliance 170 8.5 Future Research Directions for Cloud Auditing and Compliance 183 8.6 Conclusion 184 References 185 Further Reading 187 9 Security‐as‐a‐Service (SECaaS) in the Cloud 189Saman Taghavi Zargar, Hassan Takabi, and Jay Iyer 9.1 Introduction 189 9.2 Related Work 192 9.3 Security‐ as‐a‐Service Framework 194 9.4 Conclusions 199 References 199 Part II Cloud Forensics 201 10 Cloud Forensics: Model, Challenges, and Approaches 203Lei Chen, Nhien‐An Le‐Khac, Sebastian Schlepphorst, and Lanchuan Xu 10.1 Introduction 203 10.2 Background 204 10.3 Process and Model of Cloud Forensics 207 10.4 Cloud Forensics Methods, Approaches, and Tools 211 10.5 Challenges in Cloud Forensics 213 10.6 Conclusions 214 References 214 11 Cyberterrorism in the Cloud: Through a Glass Darkly 217Barry Cartwright, George R. S. Weir, and Richard Frank 11.1 Introduction 217 11.2 What is Terrorism? 218 11.3 Defining Cyberterrorism 220 11.4 Cyberterrorism vs. Terrorist Use of Cyberspace 221 11.5 Cyberterrorism in the Cloud 222 11.6 The Benefits of the Cloud to Cyberterrorists 225 11.7 Cyberlaw and Cyberterrorism 227 11.8 Conclusion: Through a Glass Darkly 230 References 232 12 Digital Forensic Process and Model in the Cloud 239Nhien‐An Le‐Khac, James Plunkett, M‐Tahar Kechadi, and Lei Chen 12.1 Introduction 239 12.2 Digital Forensics Models 240 12.3 Cloud Forensics Process and Model 243 12.4 Toward a New Cloud Forensics Model 246 12.5 Evaluation and Analysis 251 12.6 Conclusion 253 References 253 13 Data Acquisition in the Cloud 257Nhien‐An Le‐Khac, Michel Mollema, Robert Craig, Steven Ryder, and Lei Chen 13.1 Introduction 257 13.2 Background 258 13.3 Data Center as a Source of Evidence 259 13.4 Cloud Service Providers: Essential Requirements, Governance, and Challenges 260 13.4.1 Business Model 261 13.5 Cloud Storage Forensics 264 13.6 Case Study 1: Finding Data Centers on the Internet in Data‐Dense Environments 265 13.7 Case Study 2: Cloud Forensics for the Amazon Simple Storage Service 274 13.8 Conclusion 281 References 281 14 Digital Evidence Management, Presentation, and Court Preparation in the Cloud: A Forensic Readiness Approach 283Lucia De Marco, Nhien‐An Le‐Khac, and M‐Tahar Kechadi 14.1 Introduction 283 14.2 Cloud Forensics and Challenges 284 14.3 Digital Forensics Readiness 285 14.4 Cloud Forensics Readiness 287 14.5 Forensics Readiness in Evidence Management, Presentation, and Court Preparation 291 14.6 Conclusion 295 References 296 15 Analysis of Cloud Digital Evidence 301Irfan Ahmed and Vassil Roussev 15.1 Introduction 301 15.2 Background 305 15.3 Current Approaches 307 15.4 Proposed Comprehensive Approaches 312 15.5 Discussion 317 15.6 Conclusions 317 References 318 16 Forensics‐as‐a‐Service (FaaS) in the State‐of‐the‐Art Cloud 321Avinash Srinivasan and Frank Ferrese 16.1 Introduction 321 16.2 Background and Motivation 323 16.3 State of the Art in Parallel and Distributed Forensic Analysis 325 16.4 Conclusion and Future Research Direction 334 References 335 Index 339
£84.56
John Wiley & Sons Inc CISA Certified Information Systems Auditor Study
Book SynopsisThe ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing.Table of ContentsIntroduction xix Assessment Test xlii Chapter 1 Secrets of a Successful Auditor 1 Understanding the Demand for IS Audits 2 Executive Misconduct 3 More Regulation Ahead 5 Basic Regulatory Objective 7 Governance is Leadership 8 Three Types of Data Target Different Uses 9 Audit Results Indicate the Truth 10 Understanding Policies, Standards, Guidelines, and Procedures 11 Understanding Professional Ethics 14 Following the ISACA Professional Code 14 Preventing Ethical Conflicts 16 Understanding the Purpose of an Audit 17 Classifying General Types of Audits 18 Determining Differences in Audit Approach 20 Understanding the Auditor’s Responsibility 21 Comparing Audits to Assessments 21 Differentiating between Auditor and Auditee Roles 22 Applying an Independence Test 23 Implementing Audit Standards 24 Where Do Audit Standards Come From? 25 Understanding the Various Auditing Standards 27 Specific Regulations Defining Best Practices 31 Audits to Prove Financial Integrity 34 Auditor is an Executive Position 35 Understanding the Importance of Auditor Confidentiality 35 Working with Lawyers 36 Working with Executives 37 Working with IT Professionals 37 Retaining Audit Documentation 38 Providing Good Communication and Integration 39 Understanding Leadership Duties 39 Planning and Setting Priorities 40 Providing Standard Terms of Reference 41 Dealing with Conflicts and Failures 42 Identifying the Value of Internal and External Auditors 43 Understanding the Evidence Rule 43 Stakeholders: Identifying Whom You Need to Interview 44 Understanding the Corporate Organizational Structure 45 Identifying Roles in a Corporate Organizational Structure 45 Identifying Roles in a Consulting Firm Organizational Structure 47 Summary 49 Exam Essentials 49 Review Questions 52 Chapter 2 Governance 57 Strategy Planning for Organizational Control 61 Overview of the IT Steering Committee 64 Using the Balanced Scorecard 69 IT Subset of the BSC 74 Decoding the IT Strategy 74 Specifying a Policy 77 Project Management 79 Implementation Planning of the IT Strategy 90 Using COBIT 94 Identifying Sourcing Locations 94 Conducting an Executive Performance Review 99 Understanding the Auditor’s Interest in the Strategy 100 Overview of Tactical Management 100 Planning and Performance 100 Management Control Methods 101 Risk Management 105 Implementing Standards 108 Human Resources 109 System Life‐Cycle Management 111 Continuity Planning 111 Insurance 112 Overview of Business Process Reengineering 112 Why Use Business Process Reengineering 113 BPR Methodology 114 Genius or Insanity? 114 Goal of BPR 114 Guiding Principles for BPR 115 Knowledge Requirements for BPR 116 BPR Techniques 116 BPR Application Steps 117 Role of IS in BPR 119 Business Process Documentation 119 BPR Data Management Techniques 120 Benchmarking as a BPR Tool 120 Using a Business Impact Analysis 121 BPR Project Risk Assessment 123 Practical Application of BPR 125 Practical Selection Methods for BPR 127 Troubleshooting BPR Problems 128 Understanding the Auditor’s Interest in Tactical Management 129 Operations Management 129 Sustaining Operations 130 Tracking Actual Performance 130 Controlling Change 131 Understanding the Auditor’s Interest in Operational Delivery 131 Summary 132 Exam Essentials 132 Review Questions 134 Chapter 3 Audit Process 139 Understanding the Audit Program 140 Audit Program Objectives and Scope 141 Audit Program Extent 143 Audit Program Responsibilities 144 Audit Program Resources 144 Audit Program Procedures 145 Audit Program Implementation 146 Audit Program Records 146 Audit Program Monitoring and Review 147 Planning Individual Audits 148 Establishing and Approving an Audit Charter 151 Role of the Audit Committee 151 Preplanning Specific Audits 153 Understanding the Variety of Audits 154 Identifying Restrictions on Scope 156 Gathering Detailed Audit Requirements 158 Using a Systematic Approach to Planning 159 Comparing Traditional Audits to Assessments and Self‐Assessments 161 Performing an Audit Risk Assessment 162 Determining Whether an Audit is Possible 163 Identifying the Risk Management Strategy 165 Determining Feasibility of Audit 167 Performing the Audit 167 Selecting the Audit Team 167 Determining Competence and Evaluating Auditors 168 Ensuring Audit Quality Control 170 Establishing Contact with the Auditee 171 Making Initial Contact with the Auditee 172 Using Data Collection Techniques 174 Conducting Document Review 176 Understanding the Hierarchy of Internal Controls 177 Reviewing Existing Controls 179 Preparing the Audit Plan 182 Assigning Work to the Audit Team 183 Preparing Working Documents 184 Conducting Onsite Audit Activities 185 Gathering Audit Evidence 186 Using Evidence to Prove a Point 186 Understanding Types of Evidence 187 Selecting Audit Samples 187 Recognizing Typical Evidence for IS Audits 188 Using Computer‐Assisted Audit Tools 189 Understanding Electronic Discovery 191 Grading of Evidence 193 Timing of Evidence 195 Following the Evidence Life Cycle 195 Conducting Audit Evidence Testing 198 Compliance Testing 198 Substantive Testing 199 Tolerable Error Rate 200 Recording Test Results 200 Generating Audit Findings 201 Detecting Irregularities and Illegal Acts 201 Indicators of Illegal or Irregular Activity 202 Responding to Irregular or Illegal Activity 202 Findings Outside of Audit Scope 203 Report Findings 203 Approving and Distributing the Audit Report 205 Identifying Omitted Procedures 205 Conducting Follow‐up (Closing Meeting) 205 Summary 206 Exam Essentials 207 Review Questions 210 Chapter 4 Networking Technology Basics 215 Understanding the Differences in Computer Architecture 217 Selecting the Best System 221 Identifying Various Operating Systems 221 Determining the Best Computer Class 224 Comparing Computer Capabilities 227 Ensuring System Control 228 Dealing with Data Storage 230 Using Interfaces and Ports 235 Introducing the Open Systems Interconnection Model 237 Layer 1: Physical Layer 240 Layer 2: Data‐Link Layer 240 Layer 3: Network Layer 242 Layer 4: Transport Layer 248 Layer 5: Session Layer 249 Layer 6: Presentation Layer 250 Layer 7: Application Layer 250 Understanding How Computers Communicate 251 Understanding Physical Network Design 252 Understanding Network Cable Topologies 253 Bus Topologies 254 Star Topologies 254 Ring Topologies 255 Meshed Networks 256 Differentiating Network Cable Types 258 Coaxial Cable 258 Unshielded Twisted‐Pair (UTP) Cable 259 Fiber‐Optic Cable 260 Connecting Network Devices 260 Using Network Services 263 Domain Name System 263 Dynamic Host Configuration Protocol 265 Expanding the Network 266 Using Telephone Circuits 268 Network Firewalls 271 Remote VPN Access 276 Using Wireless Access Solutions 280 Firewall Protection for Wireless Networks 284 Remote Dial‐Up Access 284 WLAN Transmission Security 284 Achieving 802.11i RSN Wireless Security 287 Intrusion Detection Systems 288 Summarizing the Various Area Networks 291 Using Software as a Service (SaaS) 292 Advantages 292 Disadvantages 293 Cloud Computing 294 The Basics of Managing the Network 295 Automated LAN Cable Tester 295 Protocol Analyzers 295 Remote Monitoring Protocol Version 2 297 Summary 298 Exam Essentials 298 Review Questions 301 Chapter 5 Information Systems Life Cycle 307 Governance in Software Development 308 Management of Software Quality 310 Capability Maturity Model 310 International Organization for Standardization 312 Typical Commercial Records Classification Method 316 Overview of the Executive Steering Committee 317 Identifying Critical Success Factors 318 Using the Scenario Approach 318 Aligning Software to Business Needs 319 Change Management 323 Management of the Software Project 323 Choosing an Approach 323 Using Traditional Project Management 324 Overview of the System Development Life Cycle 327 Phase 1: Feasibility Study 331 Phase 2: Requirements Definition 334 Phase 3: System Design 339 Phase 4: Development 343 Phase 5: Implementation 354 Phase 6: Postimplementation 361 Phase 7: Disposal 363 Overview of Data Architecture 364 Databases 364 Database Transaction Integrity 368 Decision Support Systems 369 Presenting Decision Support Data 370 Using Artificial Intelligence 370 Program Architecture 371 Centralization vs. Decentralization 372 Electronic Commerce 372 Summary 374 Exam Essentials 374 Review Questions 376 Chapter 6 System Implementation and Operations 381 Understanding the Nature of IT Services 383 Performing IT Operations Management 385 Meeting IT Functional Objectives 385 Using the IT Infrastructure Library 387 Supporting IT Goals 389 Understanding Personnel Roles and Responsibilities 389 Using Metrics 394 Evaluating the Help Desk 396 Performing Service‐Level Management 397 Outsourcing IT Functions 398 Performing Capacity Management 399 Using Administrative Protection 400 Information Security Management 401 IT Security Governance 401 Authority Roles over Data 402 Data Retention Requirements 403 Document Physical Access Paths 404 Personnel Management 405 Physical Asset Management 406 Compensating Controls 408 Performing Problem Management 409 Incident Handling 410 Digital Forensics 412 Monitoring the Status of Controls 414 System Monitoring 415 Document Logical Access Paths 416 System Access Controls 417 Data File Controls 420 Application Processing Controls 421 Log Management 423 Antivirus Software 424 Active Content and Mobile Software Code 424 Maintenance Controls 427 Implementing Physical Protection 430 Data Processing Locations 432 Environmental Controls 432 Safe Media Storage 440 Summary 442 Exam Essentials 442 Review Questions 444 Chapter 7 Protecting Information Assets 449 Understanding the Threat 450 Recognizing Types of Threats and Computer Crimes 452 Identifying the Perpetrators 454 Understanding Attack Methods 458 Implementing Administrative Protection 469 Using Technical Protection 472 Technical Control Classification 472 Application Software Controls 474 Authentication Methods 475 Network Access Protection 488 Encryption Methods 489 Public‐Key Infrastructure 496 Network Security Protocols 502 Telephone Security 507 Technical Security Testing 507 Summary 509 Exam Essentials 509 Review Questions 511 Chapter 8 Business Continuity and Disaster Recovery 517 Debunking the Myths 518 Myth 1: Facility Matters 519 Myth 2: IT Systems Matter 519 From Myth to Reality 519 Understanding the Five Conflicting Disciplines Called Business Continuity 520 Defining Disaster Recovery 521 Surviving Financial Challenges 522 Valuing Brand Names 522 Rebuilding after a Disaster 523 Defining the Purpose of Business Continuity 524 Uniting Other Plans with Business Continuity 527 Identifying Business Continuity Practices 527 Identifying the Management Approach 529 Following a Program Management Approach 531 Understanding the Five Phases of a Business Continuity Program 532 Phase 1: Setting Up the BC Program 532 Phase 2: The Discovery Process 535 Phase 4: Plan Implementation 560 Phase 5: Maintenance and Integration 562 Understanding the Auditor Interests in BC/DR Plans 563 Summary 564 Exam Essentials 564 Review Questions 566 Appendix Answers to Review Questions 571 Index 591
£46.40
John Wiley & Sons Inc The IEEE Guide to Writing in the Engineering and
Book SynopsisHelps both engineers and students improve their writing skills by learning to analyze target audience, tone, and purpose in order to effectively write technical documents This book introduces students and practicing engineers to all the components of writing in the workplace. It teaches readers how considerations of audience and purpose govern the structure of their documents within particular work settings. The IEEE Guide to Writing in the Engineering and Technical Fields is broken up into two sections: Writing in Engineering Organizations and What Can You Do With Writing? The first section helps readers approach their writing in a logical and persuasive way as well as analyze their purpose for writing. The second section demonstrates how to distinguish rhetorical situations and the generic forms to inform, train, persuade, and collaborate. The emergence of the global workplace has brought with it an increasingly important role for effective technical communication. Engineers more Table of ContentsA Note from the Series Editor, ix About the Authors, xi PART I A TECHNIQUE FOR WRITING LIKE A PROFESSIONAL 1 Introduction, 3 1 The Social Situation of Text 7 The Social Contexts for Technical Writing, 8 Models of the Writing Environment, 9 Transmission Models, 10 Correctness Models, 11 Cognitive/Behavioral Models, 13 Social/Rhetorical Models, 14 This Guide's Approach, 16 The Rhetorical Situation: Purpose, 18 The Rhetorical Situation: Audience, 21 The Rhetorical Situation: Identity, 26 The Rhetorical Situation: Context, 28 The Pragmatic Situation: Community and Genre, 29 2 Making Writing Decisions 33 Introduction, 34 Document Structure and Granularity, 35 Arranging Text at the Macro Level, 37 Sectioning and Heading Sections, 39 Aids for Navigating and Understanding Document Structure, 43 Creating Effects with Lexis and Syntax at the Micro Level, 45 Lexical Technique: Word Choice, Technical Terms, and Hedges and Boosters, 47 Syntactic Technique: Modification, Clausal Arrangement, and Discursive Cueing, 53 Intermediate Structural Units and Argumentative Movement, 68 Paragraph Cohesion and Paragraphs as Structural Units of a Document, 69 Structures Other than Paragraphs, 72 Citations and Other Intertextual Statements, 73 Implications for the Process of Writing, 75 Additional Reading, 77 PART 2 WRITING DOCUMENTS 79 Introduction 81 3 Writing to Know: Informative Documents 85 Introduction, 86 The Purposes of Informative Documents, 86 Occasions for Preparing an Informative Document, 88 Audiences for an Informative Document, 88 Key Communication Strategies When Writing to Know, 90 Understanding What Constitutes Sufficient Evidence to Support a Claim, 90 Structuring Evidence in Your Document, 91 Establishing Expertise, 92 Questions for Analyzing Existing Documents, 93 Some Typical Informative Documents, 93 Reports, 93 Specifications, 104 4 Writing to Enable: Instructions and Guidance 109 Introduction, 110 The Purposes of Enabling Documents, 110 Occasions for Preparing an Enabling Document, 112 Audiences for an Enabling Document, 112 Key Communication Strategies When Writing to Enable, 113 Anticipating a Document's Use Context, 113 Deciding How Much Background Is Warranted, 115 Testing the Document with Users, 116 Questions for Analyzing Existing Documents, 119 Characteristic Enabling Documents, 119 Manuals/Guides and Other Documents That Primarily Contain Instructions/Directions/Procedures, 119 Tutorials/Training Materials, 128 Policies, 130 5 Writing to Convince: Persuasive Documents 133 Introduction, 134 The Purposes of Persuasive Documents, 134 Occasions for Preparing a Persuasive Document, 135 Audiences for the Persuasive Document, 136 Key Communication Strategies When Writing to Convince, 137 Designing Your Argument to Consider the Audience's Preexisting Beliefs, 137 Using the Terms and Values of the Audience to Articulate a Shared Goal, 140 Assuring Outcomes and Benefits without Seeming Unrealistic, 142 Questions for Analyzing Existing Documents, 143 Typical Examples of Persuasive Documents, 145 Proposals, 145 Business Plans, 149 6 Correspondence: Medium of Workplace Collaboration 155 Introduction, 156 The Purposes of Correspondence, 157 Occasions for Preparing Correspondence, 158 Audiences for Correspondence, 158 Key Communication Strategies When Corresponding, 160 Consider Workplace Roles and Official and Unofficial Relationships and Responsibilities, 160 Evaluate Target Size and Frequency of Communication for a Relationship, 162 Pause to Reconsider Composition, Time, and Tone before Sending, 163 Characteristics of Correspondence Documents, 165 Letters, Memoranda, and E-mails, 165 Types of Correspondence, 167 Pre- and Post-meeting Documents: Announcements, Agendas, and Minutes, 170 Social Media, 171 Appendix: IEEE Style for References, 173 Index, 183
£56.66
John Wiley & Sons Inc Multimedia Networks
Book SynopsisThe transportation of multimedia over the network requires timely and errorless transmission much more strictly than other data. This had led to special protocols and to special treatment in multimedia applications (telephony, IP-TV, streaming) to overcome network issues. This book begins with an overview of the vast market combined with the user's expectations. The base mechanisms of the audio/video coding (H.26x etc.) are explained to understand characteristics of the generated network traffic. Further chapters treat common specialized underlying IP network functions which cope with multimedia data in conjunction which special time adaption measures. Based on those standard functions these chapters can treat uniformly SIP, H.248, High-End IP-TV, Webcast, Signage etc. A special section is devoted to home networks which challenge high-end service delivery due to possibly unreliable management. The whole book treats concepts described in accessible IP-based standards and which are impleTable of ContentsPreface xi Acknowledgments xiii About the Authors xv Abbreviations xvii 1 Introduction 1 1.1 Types of Networks 2 1.1.1 Internet 2 1.1.2 Telecommunication Provider Networks 2 1.1.3 Company Networks 3 1.1.4 University Networks 3 1.1.5 Home Networks 3 1.1.6 Overview 4 1.2 Standard Organizations 4 1.3 Market 5 2 Requirements 7 2.1 Telephony 7 2.2 Streaming 10 2.3 IPTV 11 2.4 High-End Videoconferences 12 2.5 Webcast 15 2.6 Requirement Summary 16 3 Audio, Image, Video Coding, and Transmission 19 3.1 Audio 19 3.1.1 Companding 21 3.1.2 Differential Quantization 23 3.1.3 Vocoders 26 3.2 Basics of Video Coding 30 3.2.1 Simple Compression 34 3.2.2 Motion Estimation 35 3.2.3 Statistical Compression 36 3.2.4 Transform Functions 40 3.3 JPEG 43 3.4 MPEG/H.26x Video Compression 45 3.4.1 MPEG Data Streams 47 3.4.2 H.261 49 3.4.3 MPEG-4 52 3.4.4 H.264 52 3.4.5 Scalable Video Codec 58 3.4.6 H.265 59 3.5 Other Video Compression Standards 62 3.6 Three-Dimensional Video 64 3.7 Error Resilience 66 3.8 Transcoder 68 4 Underlying Network Functions 71 4.1 Real-Time Protocol (RTP) 71 4.1.1 Elements of RTP 73 4.1.2 Details of RTP 73 4.1.3 RTP Payload 74 4.1.4 Details of RTCP 79 4.2 Session Description Protocol (SDP) 86 4.2.1 SDP Overview 86 4.2.2 Extending SDP 89 4.2.3 Javascript Session Establishment Protocol (JSEP) 89 4.3 Streaming 90 4.3.1 Real-Time Streaming Protocol (RTSP) 90 4.4 Multicast 96 4.4.1 Multicast Overview 96 4.4.2 Multicast Addressing 97 4.4.3 Types of Multicast 98 4.4.4 Multicast End Delivery 99 4.4.5 Multicast Routing Protocols 102 4.4.6 Protocol Independent Multicast – Sparse Mode 103 4.4.7 Application Layer Multicast 107 4.5 Quality of Service 108 4.5.1 Integrated Services (Intserv) 109 4.5.2 Resource Reservation Protocol (RSVP) 110 4.5.3 Differentiated Services (DiffServ) 111 4.5.4 QoS on the LAN 116 4.5.5 QoS in the Real World 117 4.6 NTP 118 4.7 Caching 120 4.7.1 Caching Elements 120 4.7.2 Web Cache Communications Protocol (WCCP) 122 4.7.3 Content Delivery Networks 122 4.7.4 Use of Cache Servers in Private Networks 123 5 Synchronization and Adaptation 125 5.1 End-to-End Model 125 5.2 Jitter 128 5.3 Packet Loss 129 5.4 Play-Out Time 130 5.4.1 Hypothetical Decoder 131 5.4.2 Multiple Streams 132 5.4.3 Adaptive Play-Out 133 5.5 Congestion Control 133 5.6 Delay 135 5.7 Queuing 138 5.8 Media Player 140 5.9 Storage and Retrieval 141 5.10 Integration Scripting Languages 143 5.11 Optimization 144 6 Session Initiation Protocol 147 6.1 SIP Basics 148 6.1.1 First Steps with SIP 148 6.1.2 SIP Servers 152 6.1.3 More SIP Methods 156 6.2 PSTN Interconnection 158 6.3 Conferencing 161 6.4 Presence 166 6.5 Network Address Translation 169 6.6 APIs and Scripting 172 6.7 Security and Safety 172 6.8 Planning a VoIP Company Telephony System 175 6.8.1 Dial Plan 177 6.8.2 Emergency 178 6.8.3 VoIP Network Planning 179 7 Other Standard VoIP Protocols 183 7.1 H.323 VoIP Family 183 7.1.1 H.225 185 7.1.2 H.245 189 7.1.3 Comparing SIP and H.323 191 7.2 T.120 Data Applications 192 7.3 Gateway Control 194 7.3.1 H.248 195 7.3.2 Signal Control 198 7.4 Mobile VoIP 202 7.4.1 IP Multimedia Subsystem 202 7.4.2 VoLTE 208 7.5 Skype 211 8 WebRTC 213 8.1 WebRTC Transport 215 8.1.1 ICE Revisited 217 8.2 RTP/SDP Adaptations 219 8.3 Interworking 220 9 Streaming and Over-the-Top TV 223 9.1 HTTP Live Streaming – Apple 224 9.2 Smooth Streaming – Microsoft 226 9.3 HTTP Dynamic Streaming – Adobe 227 9.4 Dynamic Adaptive Streaming over HTTP – DASH 229 9.4.1 History of MPEG-DASH 229 9.4.2 Description of MPEG-DASH 229 9.5 DASH and Network Interaction 233 9.5.1 Player Reaction to Network Conditions 234 9.5.2 Fairness, Efficiency, and Stability 234 9.5.3 Bufferbloat 235 9.6 Content Delivery Networks 237 9.6.1 CDN Technology 237 9.6.2 Akamai 240 9.6.3 The Future of CDNs 240 9.7 Providers 242 9.7.1 Amazon Instant Video 242 9.7.2 YouTube 242 9.7.3 Netflix 243 9.7.4 Hulu 243 9.7.5 Common Issues for all Providers 244 10 Home Networks 245 10.1 IETF Home Standards 246 10.1.1 IP Address Assignment 247 10.1.2 Name Resolution 247 10.1.3 Service Discovery – Zeroconf and Others 249 10.1.4 Zeroconf Implementations 251 10.2 UPnP 251 10.2.1 Service Discovery – UPnP 253 10.2.2 AV Architecture and its Elements 254 10.3 DLNA 260 10.4 Residential Gateway 261 10.4.1 IMS Integration 262 10.4.2 Network Separation 262 11 High-End IPTV 265 11.1 Overview of DVB IPTV 266 11.2 Live Media Broadcast 268 11.2.1 Retransmission 268 11.2.2 Channel Switch 271 11.3 Datacast Protocols 274 11.3.1 Flute 274 11.3.2 DVB SD&S Transport Protocol 276 11.3.3 Digital Storage Media – Command and Control 278 11.4 Management Functions 279 11.4.1 Service Discovery and Selection 279 11.4.2 Broadband Content Guide 280 11.4.3 Remote and Firmware Management 280 11.5 Content Download Service 282 11.6 Deployments 283 11.7 Companion Screen Application 285 11.8 Set-Top-Box Functions 288 11.9 Integration into Other Systems 289 11.9.1 IPTV and IMS 289 11.9.2 IPTV and IMS and WebRTC 290 11.9.3 IPTV and Home Network 290 12 Solutions and Summary 291 12.1 Global Webcast 291 12.2 Digital Signage Broadcasting 295 12.3 Call Center 297 12.3.1 Functional Components 297 12.3.2 Technical Components 299 12.4 Videoconference and TelePresence 303 12.4.1 Cisco’s Telepresence 305 12.4.2 Cisco’s Telepresence Transport Specifics 306 12.4.3 Cisco’s Telepresence Network Setup 308 12.5 Summary of Requirements versus Solutions 310 References 313 Index 345
£73.76
John Wiley & Sons Inc Selfhealing Control Technology for Distribution
Book SynopsisSystematically introduces self-healing control theory for distribution networks, rigorously supported by simulations and applications A comprehensive introduction to self-healing control for distribution networks Details the construction of self-healing control systems with simulations and applications Provides key principles for new generation protective relay and network protection Demonstrates how to monitor and manage system performance Highlights practical implementation of self-healing control technologies, backed by rigorous research data and simulationsTable of ContentsForeword ix Preface xi 1 Overview 1 1.1 Proposal of Smart Grid 1 1.2 Development Status of China’s Power Distribution Network Automation 2 1.3 Development of Self‐healing Control Theory 3 2 Architecture of Self‐healing Control System for Distribution Network 7 2.1 Characteristics 7 2.2 Structure of Self‐healing Control System 8 3 Advanced Application Software of Smart Dispatching and Self‐healing Control for Power Distribution Network 11 3.1 Design Principles of Application Software for Smart Dispatching Platform 11 3.2 Overall Structure of Automation System for Power Distribution Network 13 3.2.1 Supporting Platform Layer 13 3.2.1.1 Integration Bus Layer 13 3.2.1.2 Data Bus Layer 15 3.2.1.3 Public Service Layer 15 3.2.2 Application System Layer 16 3.3 Smart Dispatching Platform Functions 16 3.3.1 Supporting Platform 16 3.3.2 Operation Monitoring of Power Distribution Network 17 3.3.3 Information Interaction with Other Systems 19 3.3.4 Advanced Application Software of Self‐healing Control 21 4 A New Generation of Relay Protection for Distribution Networks 27 4.1 Principles and Application of Network Protection for Distribution Networks 27 4.2 Adaptive Protection 28 4.2.1 Development History and Features of Adaptive Protection 29 4.2.2 Realization Mode of Adaptive Protection 31 4.2.2.1 Local Adaptive Protection (Non‐channel Adaptive Protection) 32 4.2.2.2 Area/Wide‐Area Adaptive Protection 34 4.3 Networking Protection for Distribution Network 36 4.3.1 Concept of Networking Protection for Distribution Network 37 4.3.1.1 Networking Protection 37 4.3.1.2 Area/Wide‐Area Adaptive Protection Based on Networking – Networking Protection for Distribution Network 38 4.3.1.3 Distribution Network Automation System – Fundamental Framework of Networking Protection 39 4.3.1.4 Networking: An Effective Method for Realizing Area/Wide‐Area Adaptive Protection for Distribution Networks 42 4.3.2 Realization of Networking Protection for Distribution Network 44 4.3.2.1 System Framework of Networking Protection for Distribution Network 44 4.3.2.2 Dispatching Control Layer of Distribution Network 44 4.3.2.3 Substation Layer 44 4.3.2.4 Networking Bus Protection 46 4.3.2.5 Network Backup Automatic Switching 47 4.3.2.6 Network Adaptive Current Protection 49 5 Distribution Network Communication Technology and Networking 57 5.1 Introduction to Distribution Communications 57 5.2 Backbone Communication Network 59 5.2.1 SDH Technology 59 5.2.2 MSTP Technology 59 5.3 Distribution Communication Technology 60 5.3.1 EPON 60 5.3.1.1 EPON Technology and Characteristics 60 5.3.1.2 EPON Interface 63 5.3.1.3 EPON Transmission System 63 5.3.2 Industrial Ethernet 64 5.3.3 Wireless Communication 65 5.3.4 Power‐Line Carrier 66 5.4 Communication Networking Method of Power Distribution 68 5.4.1 Basic Topology 68 5.4.1.1 Networking Application 70 5.4.2 Industrial Ethernet 72 5.4.3 Wireless Communication 72 5.4.3.1 Short‐Distance Communication 72 5.4.3.2 TD‐LTE 73 5.4.4 Hybrid Networking 74 5.4.4.1 Optical Fiber + Power‐Line Carrier 77 5.4.4.2 Optical Fiber + Wireless 77 5.4.4.3 Power‐Line Carrier + Wireless 77 6 Detection Management System for Distribution Network Devices 81 6.1 Significance of Distribution Equipment Condition‐Based Monitoring and Maintenance 81 6.1.1 Equipment Condition Monitoring Technology 83 6.1.1.1 Common Sensors 83 6.1.1.2 Distribution Transformer Condition Monitoring and Diagnosis Technology 84 6.1.1.3 HV Breaker Condition‐Based Monitor 94 6.1.1.4 Lighting Arrester Condition Monitoring 105 6.1.1.5 Capacitive Equipment Status‐Detection System 119 6.2 Distribution Network Device Monitoring System and Network Monitoring Management System 128 6.2.1 Distribution Network Equipment Supervisory Terminal and Distribution Network System Terminal Layer 129 6.2.2 Condition Monitoring System Relies on Automation System Communication Channel 130 6.2.3 Primary Station for Distribution Equipment Condition‐Based Maintenance and Integration of DMS 131 6.2.4 Geological Information‐Based Distribution Network Condition Monitoring and Maintenance 132 6.2.4.1 Integration Mode 133 6.2.4.2 Information Interaction 134 6.2.5 Distribution Equipment Assessment and Condition Maintenance 135 6.2.5.1 Information Support 136 6.2.5.2 Distribution Device Condition Assessment 138 6.2.5.3 Device Risk Assessment 140 6.2.5.4 Fault Diagnosis 143 6.2.5.5 Condition Improvement and Maintenance 144 7 Implementation of Self‐healing Control Technology 147 7.1 Principle of Implementation of Self‐healing Control 147 7.1.1 Characteristics of Self‐healing Function 147 7.1.2 Basic Principle of Self‐healing Control 147 7.2 Self‐healing Control Method 149 7.2.1 Urban Distribution Network Self‐healing Control Method Based on Quantity of State 149 7.2.2 Self‐healing Control Method for Distribution Network Based on Distributed Power and Micro‐grid 151 7.2.3 Distribution Network Self‐healing Control Based on Coordination Control Model 151 7.3 Implementation of Distribution Network Self‐healing 159 7.3.1 Self‐adaptive Relay Protection Units 160 7.3.2 Relay Protection 161 7.3.2.1 Basic Requirements 161 7.3.2.2 Self‐adaption 161 7.3.3 SCADA/RTU 163 7.3.3.1 History of SCADA 163 7.3.3.2 Development of SCADA 164 7.3.4 Wide‐Area Measuring System and Phasor Measuring Unit 165 7.3.4.1 WAMS System 167 7.3.4.2 PMU/WAMS and SCADA/EMS 167 7.3.4.3 Application of PMU or WAMS 168 7.3.5 Smart Grid and WAMS 169 8 Pilot Project 171 8.1 Simulation Analysis 171 8.1.1 Components 171 8.1.2 Test Items 171 8.1.3 Information Flow of Simulation System 171 8.1.4 Test Results 171 8.1.4.1 System States 171 8.1.4.2 System Management 171 8.1.4.3 Self‐healing Control 171 8.1.4.4 Simulation Analysis 172 8.1.4.5 History Query 172 8.1.5 Simulation Cases 174 8.1.5.1 Simulation Case 1 174 8.1.5.2 Simulation Case 2 174 8.1.5.3 Simulation Case 3 175 8.2 Pilot Application 177 8.2.1 Requirements for Pilot Power Grid 177 8.2.2 Contents of Demonstration Project 178 8.2.3 Distribution Network of Pilot Project 178 9 Development Progress of Smart Grid in the World 189 9.1 Introduction 189 9.2 Current Situation of Chinese Smart Grid: China’s National Strategy 190 9.2.1 Distribution Network Automation 190 9.2.2 Standards Release 190 9.2.3 Research and Demonstration 190 9.3 Current Situation of Foreign Countries’ Smart Grid 193 9.3.1 United States 193 9.3.2 Europe 193 9.3.3 The Americas 194 9.3.4 Multinational Cooperation 194 9.3.5 EPRI USA Smart Grid Demonstration Initiative: 5 Year Update on Multinational Cooperation 195 9.4 Energy Network 196 9.5 Opportunities and Challenges 196 References 199 Postscript 201 Index 203
£90.00
John Wiley & Sons Inc SSFIPS Securing Cisco Networks with Sourcefire
Book SynopsisCisco has announced big changes to its certification program. As of February 24, 2020, all current certifications will be retired, and Cisco will begin offering new certification programs. The good news is if you're working toward any current CCNA certification, keep going. You have until February 24, 2020 to complete your current CCNA. If you already have CCENT/ICND1 certification and would like to earn CCNA, you have until February 23, 2020 to complete your CCNA certification in the current program. Likewise, if you're thinking of completing the current CCENT/ICND1, ICND2, or CCNA Routing and Switching certification, you can still complete them between now and February 23, 2020. Up the ante on yourFirePOWER with Advanced FireSIGHT Administrationexam prep Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285,provides 100% coverage of theFirePOWER with Advanced FireSIGHT AdminTable of ContentsIntroduction xv Assessment Test xxv Chapter 1 Getting Started with FireSIGHT 1 Industry Terminology 2 Cisco Terminology 3 FirePOWER and FireSIGHT 3 Out with the Old… 4 Appliance Models 5 Hardware vs. Virtual Devices 6 Device Models 6 Defense Center Models 7 FireSIGHT Licensing 8 License Dependencies 9 Network Design 9 Inline IPS 10 Passive IPS 11 Router, Switch, and Firewall 11 Policies 12 The User Interface 13 Initial Appliance Setup 14 Setting the Management IP 15 Initial Login 15 Summary 17 Hands-on Lab 17 Review Questions 19 Chapter 2 Object Management 21 What Are Objects? 22 Getting Started 23 Network Objects 25 Individual Network Objects 25 Network Object Groups 25 Security Intelligence 26 Blacklist and Whitelist 26 Sourcefire Intelligence Feed 27 Custom Security Intelligence Objects 28 Port Objects 29 VLAN Tag 30 URL Objects and Site Matching 31 Application Filters 33 Variable Sets 35 File Lists 39 Security Zones 41 Geolocation 43 Summary 44 Hands-on Lab 45 Exam Essentials 49 Review Questions 51 Chapter 3 IPS Policy Management 53 IPS Policies 54 Default Policies 55 Policy Layers 56 Creating a Policy 57 Policy Editor 58 Summary 65 Hands-on Labs 65 Hands-on Lab 3.1: Creating an IPS Policy 66 Hands-on Lab 3.2: Viewing Connection Events 66 Exam Essentials 66 Review Questions 68 Chapter 4 Access Control Policy 71 Getting Started with Access Control Policies 72 Security Intelligence Lists 75 Blacklists, Whitelists, and Alerts 76 Security Intelligence Page Specifics 77 Configuring Security Intelligence 79 Access Control Rules 86 Access Control UI Elements 86 Rule Categories 88 A Simple Policy 97 Saving and Applying 98 Summary 100 Hands]on Lab 100 Exam Essentials 104 Review Questions 105 Chapter 5 FireSIGHT Technologies 107 FireSIGHT Technologies 108 Network Discovery Policy 109 Discovery Information 114 User Information 120 Host Attributes 124 Summary 126 Hands-on Labs 126 Hands-on Lab 5.1: Configuring a Discovery Policy 127 Hands-on Lab 5.2: Viewing Connection Events 127 Hands-on Lab 5.3: Viewing the Network Map 127 Hands-on Lab 5.4: Creating Host Attributes 128 Exam Essentials 128 Review Questions 130 Chapter 6 Intrusion Event Analysis 133 Intrusion Analysis Principles 134 False Positives 134 False Negatives 135 Possible Outcomes 135 The Goal of Analysis 136 The Dashboard and Context Explorer 136 Intrusion Events 141 An Introduction to Workflows 141 The Time Window 142 The Analysis Screen 145 The Caveat 154 Rule Comment 168 Summary 175 Hands]on Lab 175 Exam Essentials 177 Review Questions 178 Chapter 7 Network]Based Malware Detection 181 AMP Architecture 182 SHA]256 183 Spero Analysis 183 Dynamic Analysis 183 Retrospective Events 184 Communications Architecture 184 File Dispositions 185 File Disposition Caching 185 File Policy 185 Advanced Settings 186 File Rules 187 File Types and Categories 191 File and Malware Event Analysis 193 Malware Events 194 File Events 196 Captured Files 197 Network File Trajectory 199 Context Explorer 203 Summary 204 Hands]on Lab 204 Exam Essentials 205 Review Questions 206 Chapter 8 System Settings 209 User Preferences 210 Event Preferences 211 File Preferences 211 Default Time Windows 211 Default Workflows 212 System Configuration 212 System Policy 215 Health 217 Health Monitor 217 Health Policy 218 Health Events 218 Blacklist 220 Health Monitor Alerts 221 Summary 222 Hands-on Lab 222 Hands-on Lab 8.1: Creating a New System Policy 223 Hands-on Lab 8.2: Viewing Health Information 223 Exam Essentials 223 Review Questions 225 Chapter 9 Account Management 227 User Account Management 228 Internal versus External User Authentication 229 User Privileges 229 Predefined User Roles 230 Creating New User Accounts 231 Managing User Role Escalation 237 Configuring External Authentication 239 Creating Authentication Objects 240 Summary 246 Hands-on Lab 247 Hands-on Lab 9.1: Configuring a User in the Local Database 247 Hands-on Lab 9.2: Configuring Permission Escalation 247 Exam Essentials 248 Review Questions 249 Chapter 10 Device Management 251 Device Management 252 Configuring the Device on the Defense Center 254 NAT Configuration 266 Virtual Private Networks 267 Point-to-Point VPN 267 Star VPN 269 Mesh VPN 270 Advanced Options 270 Summary 271 Hands-on Labs 271 Hands-on Lab 10.1: Creating a Device Group 272 Hands-on Lab 10.2: Renaming the Device 272 Hands-on Lab 10.3: Modifying the Name of the Inline Interface Set 272 Exam Essentials 273 Review Questions 274 Chapter 11 Correlation Policy 277 Correlation Overview 278 Correlation Rules, Responses, and Policies 279 Correlation Rules 279 Rule Options 284 Responses 286 Correlation Policy 291 White Lists 295 Traffic Profiles 301 Summary 308 Hands-on Lab 308 Exam Essentials 309 Review Questions 311 Chapter 12 Advanced IPS Policy Settings 313 Advanced Settings 314 Preprocessor Alerting 316 Application Layer Preprocessors 316 SCADA Preprocessors 320 Transport/Network Layer Preprocessors 320 Specific Threat Detection 325 Detection Enhancement 326 Intrusion Rule Thresholds 327 Performance Settings 327 External Responses 330 Summary 330 Hands]on Lab 331 Hands]on Lab 12.1: Modifying the HTTP Configuration Preprocessor 331 Hands]on Lab 12.2: Enabling Inline Normalization 332 Hands]on Lab 12.3: Demonstrating the Validation of Preprocessor Settings on Policy Commit 332 Exam Essentials 333 Review Questions 334 Chapter 13 Creating Snort Rules 337 Overview of Snort Rules 338 Rule Headers 339 The Rule Body 342 Writing Rules 352 Using the System GUI to Build a Rule 353 Summary 355 Exam Essentials 356 Review Questions 357 Chapter 14 FireSIGHT v5.4 Facts and Features 359 Branding 360 Simplified IPS Policy 361 Network Analysis Policy 362 Why Network Analysis? 365 Access Control Policy 365 General Settings 366 Network Analysis and Intrusion Policies 366 Files and Malware Settings 368 Transport/Network Layer Preprocessor Settings 368 Detection Enhancement Settings 368 Performance/Latency Settings 369 SSL Inspection 369 SSL Objects 370 New Rule Keywords 376 File_type 376 Protected_content 377 Platform Enhancements 377 International Enhancements 378 Minor Changes 378 Summary 378 Appendix Answers to Review Questions 379 Index 393
£41.25
John Wiley & Sons Inc VMware Certified Professional Data Center
Book SynopsisMaster vSphere 6 virtualization with hands-on practice and bonus preview exams VCP6-DCV: VMware Certified Professional-Data Center Virtualization on vSphere 6 Study Guide is your ultimate guide to preparing for exam 2VO-621. This Study Guide provides 100% coverage of all exam objectives and offers a unique set of study tools including assessment tests, objective map, real-world scenarios, hands-on exercises, and much more so you can be confident come exam day. You will also receive access to the superior Sybex interactive online learning environment that provides additional study tools including electronic flashcards and bonus practice exams. More than just a study guide, this book bridges the gap between exam prep and real-world on the job skills by focusing on the key information VMware professionals need to do the job. You''ll master the vCenter Server and ESXi from planning and installation through upgrade and security, and develop an in-depth understanding of vSphTable of ContentsIntroduction xxi Assessment Test xxxi Chapter 1 What’s New in vSphere 6.7 1 Accessing vSphere 2 VMware vSphere Client 2 Application Programming Interface 8 Topology and UI Updates for VCSA 8 External Platform Services Controller 8 Update Manager 10 Storage Updates 18 Persistent Memory 19 Remote Direct Memory Access 19 vSAN 20 Security Updates 22 Virtual Machines 24 Content Library 24 Per-VM EVC 40 Summary 41 Exam Essentials 42 Review Questions 43 Chapter 2 Configuring and Administering Security in a vSphere Datacenter 47 Configuring and Administering Role-Based Access Controls 49 What Is a Privilege? 49 What Is a Task? 49 What Is a Role? 50 Assigning Permissions 54 Viewing and Exporting Group and User Permissions 70 Securing ESXi Hosts and the vCenter Server 72 Hardening ESXi Hosts 72 Hardening vCenter Server 87 Configuring and Enabling SSO and Identity Sources 88 vCenter Single Sign-On 89 Platform Services Controller 91 Configuring vCenter Single Sign-On 93 Securing Virtual Machines 96 Secure Boot 96 Virtual Machine Encryption 96 Virtual Machine Hardening 106 vSphere Network Security 117 Summary 118 Exam Essentials 118 Review Questions 119 Chapter 3 Networking in vSphere 123 Understanding vSphere Networking 124 Standard Switches 125 Virtual Distributed Switches 127 Using dvPort Groups 138 Working with Virtual Adapters 144 Custom TCP/IP Stacks 147 Long-Distance vMotion 151 Migrating Virtual Machines to or from a vDS 151 Performance and Reliability 151 Link Aggregation 152 Load Balancing and Failover Policies 153 Traffic Shaping 154 TCP Segmentation Offload 155 Jumbo Frames 155 Network Isolation 158 Automatic Rollback 159 Monitoring and Mirroring 163 Using NetFlow 164 Understanding Network I/O Control 165 Configuring NIOC Reservations, Shares, and Limits 166 Summary 170 Exam Essentials 171 Review Questions 172 Chapter 4 Storage in vSphere 177 Managing vSphere Integration with Physical Storage 178 Adding an NFS Datastore 179 Using Block Storage 186 Configuring the Software iSCSI Initiator 187 Binding VMkernels to the Software iSCSI Initiator 189 Scanning for Changes 192 Storage Filters 193 Thin Provisioning 194 Storage Multipathing and Failover 196 Configuring and Upgrading VMFS and NFS 203 Configuring VMFS Datastores 207 Raw Device Mapping and Bus Sharing 214 Configuring Software-Defined Storage 217 Virtual Storage Area Network 217 Virtual Volumes 225 Storage Policy–Based Management 229 Enabling and Configuring Storage I/O Control 230 Summary 233 Exam Essentials 234 Review Questions 235 Chapter 5 Upgrading a vSphere Deployment 239 Upgrading from vSphere 5.5 240 Upgrading a vCenter Server on Windows 244 Verify Basic Compatibility and Download the Installer 245 Prepare the Database for Upgrade 245 Prepare for Upgrading the Content Library 247 Verify Network Prerequisites, Load Balancer, and ESXI Hosts 247 Starting the vCenter on Windows Upgrade 247 Migrating to the vCenter Server Appliance 252 Upgrading Using the Command Line 252 Upgrading Using the Graphical Interface 253 Upgrading ESXi Hosts and Virtual Machines 264 Using the Update Manager Download Service 264 Using vSphere Update Manager 265 Summary 284 Exam Essentials 285 Review Questions 286 Chapter 6 Allocating Resources in a vSphere Datacenter 291 Administering and Managing vSphere 6.x Resources 293 Configuring Multilevel Resource Pools 295 Reservations, Limits, and Shares 296 Resource Pool Administration Exercises 303 Using Tags and Custom Attributes 308 Configuring vSphere DRS and Storage DRS Clusters 315 Distributed Resource Scheduler 316 Predictive DRS 318 Network-Aware DRS 320 Storage DRS 322 Establishing Affinity and Anti-Affinity 322 DRS Cluster Administration Exercises 324 Summary 342 Exam Essentials 343 Review Questions 344 Chapter 7 Backing Up and Recovering a vSphere Deployment 349 VCSA Backup and Restore 350 Backing Up Virtual Machines by Using VDP 357 Installing VDP 358 Creating Backup Jobs 361 Restoring from Backup 365 Deploying Proxy Servers 368 Replicating Virtual Machines 376 Deploying a Replication Appliance 376 Configuring Replication 378 Recovering Replicated VMs 382 Summary 387 Exam Essentials 387 Review Questions 388 Chapter 8 Troubleshooting a vSphere Deployment 393 Troubleshooting vCenter and ESXi 394 vCenter Connectivity and Services 394 vCenter Certificates 399 vCenter Log Files 399 ESXi Troubleshooting 403 ESXi Monitoring 407 Troubleshooting Storage and Networking 413 Storage Issues 413 Storage Performance 416 Storage DRS and I/O Control 417 Network Issues 418 Troubleshooting Upgrades 421 Troubleshooting Virtual Machines 421 Troubleshooting HA and DRS 425 Summary 426 Exam Essentials 427 Review Questions 428 Chapter 9 Deploying and Customizing ESXi Hosts 433 Configuring Auto Deploy 434 Enabling PXE Boot 435 Configuring DHCP 435 Configuring TFTP 436 Enabling Auto Deploy 437 Adding Deploy Rules 440 Adding a Custom Image and Profile 442 Stateless Caching and Stateful Installs 442 Employing Host Profiles 452 Creating and Using Host Profiles 453 Importing and Exporting Host Profiles 457 Advanced Profile Modifications 458 Using Answer Files 461 Summary 468 Exam Essentials 468 Review Questions 469 Chapter 10 Ensuring High Availability for vSphere Clusters and the VCSA 475 Configuring vSphere Cluster High Availability 476 HA Failures and Responses 477 Host Isolation 478 Heartbeat Datastores 479 Advanced Options 480 Configuring VMCP 482 Monitoring Virtual Machines 483 Admission Control 486 vCenter Server Appliance High Availability 499 Summary 511 Exam Essentials 512 Review Questions 514 Chapter 11 Administering and Managing vSphere Virtual Machines 519 Virtual Machine Advanced Settings 520 Virtual Machine Configuration File 522 Advanced Virtual Machine Options 528 Content Library 537 VMware Converter 546 Summary 558 Exam Essentials 558 Review Questions 559 Appendix Answers to Review Questions 565 Chapter 1: What’s New in vSphere 6.7 566 Chapter 2: Configuring and Administering Security in a vSphere Datacenter 567 Chapter 3: Networking in vSphere 569 Chapter 4: Storage in vSphere 570 Chapter 5: Upgrading a vSphere Deployment 571 Chapter 6: Allocating Resources in a vSphere Datacenter 573 Chapter 7: Backing Up and Recovering a vSphere Deployment 575 Chapter 8: Troubleshooting a vSphere Deployment 577 Chapter 9: Deploying and Customizing ESXi Hosts 578 Chapter 10: Ensuring High Availability for vSphere Clusters and the VCSA 579 Chapter 11: Administering and Managing vSphere Virtual Machines 581 Index 583
£38.00
John Wiley & Sons Inc Mastering Microsoft Exchange Server 2016
Book SynopsisA bestselling Exchange Server guide, updated for the 2016 release Mastering Microsoft Exchange Server 2016 is the gold-standard reference for system administrators and first-time users alike.Table of ContentsIntroduction xxvii Part 1 • Exchange Fundamentals 1 Chapter 1 • Putting Exchange Server 2016 in Context 3 Chapter 2 • Introducing the Changes in Exchange Server 2016 25 Chapter 3 • Understanding Availability, Recovery, and Compliance 41 Chapter 4 • Virtualizing Exchange Server 2016 71 Chapter 5 • Introduction to PowerShell and the Exchange Management Shell 91 Chapter 6 • Understanding the Exchange Autodiscover Process 145 Part 2 • Getting Exchange Server Running 169 Chapter 7 • Exchange Server 2016 Quick Start Guide 171 Chapter 8 • Understanding Server Roles and Configurations 195 Chapter 9 • Exchange Server 2016 Requirements 209 Chapter 10 • Installing Exchange Server 2016 227 Chapter 11 • Upgrades and Migrations to Exchange Server 2016 or Office 365 249 Part 3 • Recipient Administration 273 Chapter 12 • Management Permissions and Role-Based Access Control 275 Chapter 13 • Basics of Recipient Management 315 Chapter 14 • Managing Mailboxes and Mailbox Content 331 Chapter 15 • Managing Mail-Enabled Groups, Mail Users, and Mail Contacts 389 Chapter 16 • Managing Resource Mailboxes 413 Chapter 17 • Managing Modern Public Folders 435 Chapter 18 • Managing Archiving and Compliance 463 Part 4 • Server Administration 493 Chapter 19 • Creating and Managing Mailbox Databases 495 Chapter 20 • Creating and Managing Database Availability Groups 519 Chapter 21 • Understanding the Client Access Services 559 Chapter 22 • Managing Connectivity with Transport Services 597 Chapter 23 • Managing Transport, Data Loss Prevention, and Journaling Rules 635 Part 5 • Troubleshooting and Operating 665 Chapter 24 • Troubleshooting Exchange Server 2016 667 Chapter 25 • Backing Up and Restoring Exchange Server 691 Appendix • The Bottom Line 719 Index 753
£38.00
John Wiley & Sons Inc Mastering System Center Configuration Manager
Book SynopsisGet up to date quickly with clear, expert coverage of SCCM 2016 Mastering System Center Configuration Manager provides comprehensive coverage of Microsoft's powerful network software deployment tool, with a practical hands-on approach.Table of ContentsIntroduction xxiii Chapter 1 • Overview of System Center Configuration Manager and Microsoft Intune 1 Chapter 2 • Planning a Configuration Manager Infrastructure 17 Chapter 3 • Migrating to Configuration Manager 63 Chapter 4 • Installation and Site Role Configuration 103 Chapter 5 • Client Installation 185 Chapter 6 • Client Health 229 Chapter 7 • Application Deployment 247 Chapter 8 • Software Updates 319 Chapter 9 • Operating System Deployment 407 Chapter 10 • Inventory and Software Metering 479 Chapter 11 • Asset Intelligence 513 Chapter 12 • Reporting 533 Chapter 13 • Compliance Settings 565 Chapter 14 • Endpoint Protection 633 Chapter 16 • Disaster Recovery 683 Chapter 17 • Troubleshooting 711 Chapter 18 • Enterprise Mobility and Configuration Manager 759 Appendix • The Bottom Line Answers 859 Chapter 2: Planning a Configuration Manager Infrastructure 859 Chapter 3: Migrating to Configuration Manager 860 Chapter 4: Installation and Site Role Configuration 862 Chapter 5: Client Installation 864 Chapter 6: Client Health 865 Chapter 7: Application Deployment 866 Chapter 8: Software Updates 867 Chapter 9: Operating System Deployment 868 Chapter 10: Inventory and Software Metering 869 Chapter 11: Asset Intelligence 870 Chapter 12: Reporting 871 Chapter 13: Compliance Settings 872 Chapter 14: Endpoint Protection 873 Chapter 15: Role-Based Administration 874 Chapter 16: Disaster Recovery 875 Chapter 17: Troubleshooting 876 Chapter 18: Enterprise Mobility and Configuration Manager 877 Index 879
£38.00
John Wiley & Sons Inc Algorithms and Networking for Computer Games
Book SynopsisThe essential guide to solving algorithmic and networking problems in commercial computer games, revised and extended Algorithms and Networking for Computer Games, Second Editionis written from the perspective of the computer scientist. Combining algorithmic knowledge and game-related problems, it explores the most common problems encountered in game programing. The first part of the book presents practical algorithms for solving classical topics, such as random numbers, procedural generation, tournaments, group formations and game trees. The authors also focus on how to find a path in, create the terrain of, and make decisions in the game world. The second part introduces networking related problems in computer games, focusing on four key questions: how to hide the inherent communication delay, how to best exploit limited network resources, how to cope with cheating and how to measure the on-line game data. Thoroughly revised, updated, and Trade Review“More than 70 algorithms are presented, covering random numbers, noise in data (a realistic world is full of imperfections), procedural generation, tournaments, game trees, path finding, group movement, decision making, and modelling uncertainty – as well as networking problems, including dealing with cheating. The exercises at the end of each chapter range from simple thought exercises to studying Braben and Bell’s namegeneration algorithm from Elite (1984) … use of pseudocode throughout ensures the book works equally well for C, C++, Java, Python, or even C# programmers.” MagPi, Issue 64, December 2017 Table of ContentsPreface xiii 1 Introduction 1 1.1 Anatomy of Computer Games 4 1.2 Game Development 6 1.2.1 Phases of development 7 1.2.2 Documentation 8 1.2.3 Other considerations 11 1.3 Synthetic Players 12 1.3.1 Humanness 13 1.3.2 Stance 14 1.4 Multiplaying 14 1.5 Interactive Storytelling 15 1.5.1 Approaches 16 1.5.2 Storytelling in games 17 1.6 Outline of the Book 19 1.6.1 Algorithms 20 1.6.2 Networking 20 1.7 Summary 21 Exercises 21 I Algorithms 25 2 Random Numbers 26 2.1 Linear Congruential Method 27 2.1.1 Choice of parameters 30 2.1.2 Testing the randomness 32 2.1.3 Using the generators 33 2.2 Discrete Finite Distributions 36 2.3 Random Shuffling 40 2.4 Summary 44 Exercises 44 3 Noise 49 3.1 Applying Noise 50 3.2 Origin of Noise 51 3.3 Visualization 52 3.4 Interpolation 55 3.4.1 Utility routines for value conversions 56 3.4.2 Interpolation in a single parameter 58 3.4.3 Interpolation in two parameters 61 3.5 Composition of Noise 62 3.6 Periodic Noise 65 3.7 Perlin Noise 68 3.8 Worley Noise 73 3.9 Summary 83 Exercises 83 4 Procedural Generation 88 4.1 Terrain Generation 89 4.2 Maze Algorithms 96 4.2.1 Depth-first algorithm 98 4.2.2 Randomized Kruskal’s algorithm 99 4.2.3 Randomized Prim’s algorithm 101 4.3 L-Systems 101 4.3.1 Examples 103 4.3.2 City generation 105 4.4 Hierarchical Universe Generation 108 4.5 Summary 109 Exercises 111 5 Tournaments 115 5.1 Rank Adjustment Tournaments 118 5.2 Elimination Tournaments 123 5.3 Scoring Tournaments 131 5.4 Summary 135 Exercises 138 6 Game Trees 143 6.1 Minimax 144 6.1.1 Analysis 147 6.1.2 Partial minimax 148 6.2 Alpha-Beta Pruning 152 6.2.1 Analysis 156 6.2.2 Principal variation search 157 6.3 Monte Carlo Tree Search 157 6.4 Games of Chance 166 6.5 Summary 168 Exercises 170 7 Path Finding 177 7.1 Discretization of the Game World 178 7.1.1 Grid 179 7.1.2 Navigation mesh 180 7.2 Finding the Minimum Path 182 7.2.1 Evaluation function 183 7.2.2 Properties 184 7.2.3 Algorithm A* 185 7.3 Realizing the Movement 187 7.4 Summary 189 Exercises 190 8 Group Movement 194 8.1 Flocking 195 8.2 Formations 200 8.2.1 Coordinating formations 200 8.2.2 Behaviour-based steering 204 8.2.3 Fuzzy logic control 205 8.2.4 Mass-spring systems 207 8.3 Summary 208 Exercises 208 9 Decision-Making 211 9.1 Background 211 9.1.1 Levels of decision-making 212 9.1.2 Modelled knowledge 213 9.1.3 Methods 214 9.2 Finite State Machines 218 9.2.1 Computational FSM 221 9.2.2 Mealy and Moore machines 224 9.2.3 Implementation 227 9.2.4 Discussion 228 9.3 Influence Maps 231 9.4 Automated Planning 235 9.5 Summary 237 Exercises 240 10 Modelling Uncertainty 246 10.1 Statistical Reasoning 246 10.1.1 Bayes’ theorem 246 10.1.2 Bayesian networks 248 10.1.3 Dempster–Shafer theory 249 10.2 Fuzzy Sets 252 10.2.1 Membership function 253 10.2.2 Fuzzy operations 255 10.2.3 Defuzzification 255 10.3 Fuzzy Constraint Satisfaction Problem 257 10.3.1 Modelling the criteria as fuzzy sets 259 10.3.2 Weighting the criteria importances 262 10.3.3 Aggregating the criteria 262 10.3.4 Making a decision 263 10.4 Summary 263 Exercises 265 II Networking 268 11 Communication Layers 269 11.1 Physical Platform 270 11.1.1 Resource limitations 271 11.1.2 Transmission techniques and protocols 272 11.2 Logical Platform 274 11.2.1 Communication architecture 274 11.2.2 Data and control architecture 275 11.3 Networked Application 277 11.4 Summary 278 Exercises 278 12 Compensating Resource Limitations 283 12.1 Aspects of Compensation 284 12.1.1 Consistency and responsiveness 284 12.1.2 Scalability 287 12.2 Protocol Optimization 291 12.2.1 Message compression 291 12.2.2 Message aggregation 292 12.3 Dead Reckoning 293 12.3.1 Prediction 293 12.3.2 Convergence 295 12.4 Local Perception Filters 297 12.4.1 Linear temporal contour 301 12.4.2 Adding bullet time to the delays 305 12.5 Synchronized Simulation 307 12.6 Interest Management 308 12.6.1 Aura-based interest management 310 12.6.2 Zone-based interest management 310 12.6.3 Visibility-based interest management 312 12.6.4 Class-based interest management 312 12.7 Compensation by Game Design 314 12.7.1 Short active turns 314 12.7.2 Semi-autonomous avatars 315 12.7.3 Interaction via proxies 316 12.8 Summary 317 Exercises 318 13 Cheating Prevention 321 13.1 Technical Exploitations 322 13.1.1 Packet tampering 323 13.1.2 Look-ahead cheating 324 13.1.3 Cracking and other attacks 330 13.2 Collusion 331 13.2.1 Classification 333 13.2.2 Collusion detection 335 13.3 Rule Violations 337 13.4 Summary 338 Exercises 338 14 Online Metrics 341 14.1 Players 344 14.2 Monetization 345 14.3 Acquisition 347 14.4 Game Session 347 14.5 Summary 348 Exercises 348 A Pseudocode Conventions 351 A.1 Changing the Flow of Control 355 A.1.1 Expressions 355 A.1.2 Control structures 357 A.2 Data Structures 360 A.2.1 Values and entities 360 A.2.2 Data collections 360 A.3 Format of Algorithms 365 A.4 Conversion to Existing Programming Languages 367 B Practical Vectors and Matrices 371 B.1 Points and Vectors 372 B.2 Matrices 381 B.3 Conclusion 387 Bibliography 391 Ludography 408 Index 409
£62.06
John Wiley & Sons Inc Linux Server Security
Book SynopsisLearn how to attack and defend the world's most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them). By increasing your understanding of a hacker's tools and mindset you''re less likely to be confronted by the all-too-common reality faced by many admins these days: someone else has control of your systems. Master hacking tools and launch sophisticated attacks: perform SQL injections, deploy mTable of ContentsPreface xiii Introduction xv Chapter 1: Invisibility Cloak 1 Background 1 Probing Ports 1 Confusing a Port Scanner 2 Installing knockd 2 Packages 3 Changing Default Settings 3 Altering Filesystem Locations 4 Some Config Options 5 Starting the Service 5 Changing the Default Network Interface 5 Packet Types and Timing 5 Testing Your Install 6 Port Knocking Clients 7 Making Your Server Invisible 7 Testing Your iptables 8 Saving iptables Rules 9 Further Considerations 10 Smartphone Client 10 Troubleshooting 10 Security Considerations 10 Ephemeral Sequences 11 Summary 12 Chapter 2: Digitally Fingerprint Your Files 13 Filesystem Integrity 13 Whole Filesystem 16 Rootkits 17 Confi guration 19 False Positives 21 Well Designed 22 Summary 23 Chapter 3: Twenty-First-Century Netcat 25 History 25 Installation Packages 27 Getting Started 27 Transferring Files 29 Chatting Example 30 Chaining Commands Together 30 Secure Communications 31 Executables 33 Access Control Lists 34 Miscellaneous Options 34 Summary 35 Chapter 4: Denying Service 37 NTP Infrastructure 37 NTP Reflection Attacks 38 Attack Reporting 40 Preventing SNMP Reflection 41 DNS Resolvers 42 Complicity 43 Bringing a Nation to Its Knees 44 Mapping Attacks 45 Summary 46 Chapter 5: Nping 49 Functionality 49 TCP 50 Interpreter 51 UDP 52 ICMP 52 ARP 53 Payload Options 53 Echo Mode 54 Other Nping Options 57 Summary 58 Chapter 6: Logging Reconnoiters 59 ICMP Misconceptions 59 tcpdump 60 Iptables 61 Multipart Rules 64 Log Everything for Forensic Analysis 64 Hardening 65 Summary 67 Chapter 7: Nmap’s Prodigious NSE 69 Basic Port Scanning 69 The Nmap Scripting Engine 71 Timing Templates 73 Categorizing Scripts 74 Contributing Factors 75 Security Holes 75 Authentication Checks 77 Discovery 78 Updating Scripts 79 Script Type 80 Regular Expressions 80 Graphical User Interfaces 81 Zenmap 81 Summary 82 Chapter 8: Malware Detection 85 Getting Started 85 Definition Update Frequency 85 Malware Hash Registry 86 Prevalent Threats 86 LMD Features 86 Monitoring Filesystems 88 Installation 88 Monitoring Modes 90 Configuration 91 Exclusions 91 Running from the CLI 92 Reporting 92 Quarantining and Cleaning 93 Updating LMD 94 Scanning and Stopping Scans 94 Cron Job 96 Reporting Malware 96 Apache Integration 96 Summary 97 Chapter 9: Password Cracking with Hashcat 99 History 99 Understanding Passwords 99 Keyspace 100 Hashes101 Using Hashcat 103 Hashcat Capabilities 103 Installation 103 Hash Identifi cation104 Choosing Attack Mode 106 Downloading a Wordlist 106 Rainbow Tables 107 Running Hashcat 107 oclHashcat 110 Hashcat-Utils 111 Summary 111 Chapter 10: SQL Injection Attacks 113 History 113 Basic SQLi 114 Mitigating SQLi in PHP 115 Exploiting SQL Flaws 117 Launching an Attack 118 Trying SQLi Legally 120 Summary 121 Index 123
£34.19
John Wiley & Sons Inc DNS Security Management
Book SynopsisAn advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS).Table of ContentsPreface xiii Acknowledgments xvii 1 INTRODUCTION 1 Why Attack DNS? 1 Network Disruption 2 DNS as a Backdoor 2 DNS Basic Operation 3 Basic DNS Data Sources and Flows 4 DNS Trust Model 5 DNS Administrator Scope 6 Security Context and Overview 7 Cybersecurity Framework Overview 7 Framework Implementation 9 What’s Next 15 2 INTRODUCTION TO THE DOMAIN NAME SYSTEM (DNS) 17 DNS Overview – Domains and Resolution 17 Domain Hierarchy 18 Name Resolution 18 Zones and Domains 23 Dissemination of Zone Information 25 Additional Zones 26 Resolver Configuration 27 Summary 29 3 DNS PROTOCOL AND MESSAGES 31 DNS Message Format 31 Encoding of Domain Names 31 Name Compression 32 Internationalized Domain Names 34 DNS Message Format 35 DNS Update Messages 43 The DNS Resolution Process Revisited 48 DNS Resolution Privacy Extension 55 Summary 56 4 DNS VULNERABILITIES 57 Introduction 57 DNS Data Security 57 DNS Information Trust Model 59 DNS Information Sources 60 DNS Risks 61 DNS Infrastructure Risks and Attacks 62 DNS Service Availability 62 Hardware/OS Attacks 63 DNS Service Denial 63 Pseudorandom Subdomain Attacks 67 Cache Poisoning Style Attacks 67 Authoritative Poisoning 71 Resolver Redirection Attacks 73 Broader Attacks that Leverage DNS 74 Network Reconnaissance 75 DNS Rebinding Attack 77 Reflector Style Attacks 78 Data Exfiltration 79 Advanced Persistent Threats 81 Summary 83 5 DNS TRUST SECTORS 85 Introduction 85 Cybersecurity Framework Items 87 Identify 87 Protect 87 Detect 88 DNS Trust Sectors 88 External DNS Trust Sector 91 Basic Server Configuration 93 DNS Hosting of External Zones 97 External DNS Diversity 97 Extranet DNS Trust Sector 98 Recursive DNS Trust Sector 99 Tiered Caching Servers 100 Basic Server Configuration 101 Internal Authoritative DNS Servers 103 Basic Server Configuration 105 Additional DNS Deployment Variants 108 Internal Delegation DNS Master/Slave Servers 109 Multi-Tiered Authoritative Configurations 109 Hybrid Authoritative/Caching DNS Servers 111 Stealth Slave DNS Servers 111 Internal Root Servers 111 Deploying DNS Servers with Anycast Addresses 113 Other Deployment Considerations 118 High Availability 118 Multiple Vendors 118 Sizing and Scalability 118 Load Balancers 119 Lab Deployment 119 Putting It All Together 119 6 SECURITY FOUNDATION 121 Introduction 121 Hardware/Asset Related Framework Items 122 Identify: Asset Management 122 Identify: Business Environment 123 Identify: Risk Assessment 124 Protect: Access Control 126 Protect: Data Security 127 Protect: Information Protection 129 Protect: Maintenance 130 Detect: Anomalies and Events 131 Detect: Security Continuous Monitoring 131 Respond: Analysis 132 Respond: Mitigation 132 Recover: Recovery Planning 133 Recover: Improvements 133 DNS Server Hardware Controls 134 DNS Server Hardening 134 Additional DNS Server Controls 136 Summary 137 7 SERVICE DENIAL ATTACKS 139 Introduction 139 Denial of Service Attacks 139 Pseudorandom Subdomain Attacks 141 Reflector Style Attacks 143 Detecting Service Denial Attacks 144 Denial of Service Protection 145 DoS/DDoS Mitigation 145 Bogus Queries Mitigation 147 PRSD Attack Mitigation 148 Reflector Mitigation 148 Summary 151 8 CACHE POISONING DEFENSES 153 Introduction 153 Attack Forms 154 Packet Interception or Spoofing 154 ID Guessing or Query Prediction 155 Name Chaining 155 The Kaminsky DNS Vulnerability 156 Cache Poisoning Detection 159 Cache Poisoning Defense Mechanisms 160 UDP Port Randomization 160 Query Name Case Randomization 161 DNS Security Extensions 161 Last Mile Protection 167 9 SECURING AUTHORITATIVE DNS DATA 169 Introduction 169 Attack Forms 170 Resolution Data at Rest 170 Domain Registries 170 DNS Hosting Providers 171 DNS Data in Motion 172 Attack Detection 172 Authoritative Data 172 Domain Registry 173 Domain Hosting 173 Falsified Resolution 173 Defense Mechanisms 174 Defending DNS Data at Rest 174 Defending Resolution Data in Motion with DNSSEC 176 Summary 186 10 ATTACKER EXPLOITATION OF DNS 187 Introduction 187 Network Reconnaissance 187 Data Exfiltration 188 Detecting Nefarious use of DNS 189 Detecting Network Reconnaissance 189 DNS Tunneling Detection 190 Mitigation of Illicit DNS Use 193 Network Reconnaissance Mitigation 193 Mitigation of DNS Tunneling 193 11 MALWARE AND APTS 195 Introduction 195 Malware Proliferation Techniques 196 Phishing 196 Spear Phishing 196 Downloads 196 File Sharing 197 Email Attachments 197 Watering Hole Attack 197 Replication 197 Implantation 197 Malware Examples 198 Malware Use of DNS 198 DNS Fluxing 198 Dynamic Domain Generation 202 Detecting Malware 202 Detecting Malware Using DNS Data 203 Mitigating Malware Using DNS 206 Malware Extrication 206 DNS Firewall 207 Summary 210 12 DNS SECURITY STRATEGY 213 Major DNS Threats and Mitigation Approaches 214 Common Controls 214 Disaster Defense 214 Defenses Against Human Error 220 DNS Role-Specific Defenses 220 Stub Resolvers 220 Forwarder DNS Servers 221 Recursive Servers 221 Authoritative Servers 222 Broader Security Strategy 222 Identify Function 223 Protect Function 224 Detect Function 225 Respond Function 226 Recover Function 227 13 DNS APPLICATIONS TO IMPROVE NETWORK SECURITY 229 Safer Web Browsing 230 DNS-Based Authentication of Named Entities (DANE) 230 Email Security 232 Email and DNS 233 DNS Block Listing 237 Sender Policy Framework (SPF) 238 Domain Keys Identified Mail (DKIM) 242 Domain-Based Message Authentication, Reporting, and Conformance (DMARC) 245 Securing Automated Information Exchanges 246 Dynamic DNS Update Uniqueness Validation 246 Storing Security-Related Information 247 Other Security Oriented DNS Resource Record Types 247 Summary 251 14 DNS SECURITY EVOLUTION 253 Appendix A: Cybersecurity Framework Core DNS Example 257 Appendix B: DNS Resource Record Types 285 Bibliography 291 Index 299
£81.86
John Wiley & Sons Inc Network Forensics
Book SynopsisIntensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity.Table of ContentsIntroduction xxi 1 Introduction to Network Forensics 1 What Is Forensics? 3 Handling Evidence 4 Cryptographic Hashes 5 Chain of Custody 8 Incident Response 8 The Need for Network Forensic Practitioners 10 Summary 11 References 12 2 Networking Basics 13 Protocols 14 Open Systems Interconnection (OSI) Model 16 TCP/IP Protocol Suite 18 Protocol Data Units 19 Request for Comments 20 Internet Registries 23 Internet Protocol and Addressing 25 Internet Protocol Addresses 28 Internet Control Message Protocol (ICMP) 31 Internet Protocol Version 6 (IPv6) 31 Transmission Control Protocol (TCP) 33 Connection-Oriented Transport 36 User Datagram Protocol (UDP) 38 Connectionless Transport 39 Ports 40 Domain Name System 42 Support Protocols (DHCP) 46 Support Protocols (ARP) 48 Summary 49 References 51 3 Host-Side Artifacts 53 Services 54 Connections 60 Tools 62 netstat 63 nbstat 66 ifconfi g/ipconfi g 68 Sysinternals 69 ntop 73 Task Manager/Resource Monitor 75 ARP 77 /proc Filesystem 78 Summary 79 4 Packet Capture and Analysis 81 Capturing Packets 82 Tcpdump/Tshark 84 Wireshark 89 Taps 91 Port Spanning 93 ARP Spoofi ng 94 Passive Scanning 96 Packet Analysis with Wireshark 98 Packet Decoding 98 Filtering 101 Statistics 102 Following Streams 105 Gathering Files 106 Network Miner 108 Summary 110 5 Attack Types 113 Denial of Service Attacks 114 SYN Floods 115 Malformed Packets 118 UDP Floods 122 Amplifi cation Attacks 124 Distributed Attacks 126 Backscatter 128 Vulnerability Exploits 130 Insider Threats 132 Evasion 134 Application Attacks 136 Summary 140 6 Location Awareness 143 Time Zones 144 Using whois 147 Traceroute 150 Geolocation 153 Location-Based Services 156 WiFi Positioning 157 Summary 158 7 Preparing for Attacks 159 NetFlow 160 Logging 165 Syslog 166 Windows Event Logs 171 Firewall Logs 173 Router and Switch Logs 177 Log Servers and Monitors 178 Antivirus 180 Incident Response Preparation 181 Google Rapid Response 182 Commercial Offerings 182 Security Information and Event Management 183 Summary 185 8 Intrusion Detection Systems 187 Detection Styles 188 Signature-Based 188 Heuristic 189 Host-Based versus Network-Based 190 Snort 191 Suricata and Sagan 201 Bro 203 Tripwire 205 OSSEC 206 Architecture 206 Alerting 207 Summary 208 9 Using Firewall and Application Logs 211 Syslog 212 Centralized Logging 216 Reading Log Messages 220 LogWatch 222 Event Viewer 224 Querying Event Logs 227 Clearing Event Logs 231 Firewall Logs 233 Proxy Logs 236 Web Application Firewall Logs 238 Common Log Format 240 Summary 243 10 Correlating Attacks 245 Time Synchronization 246 Time Zones 246 Network Time Protocol 247 Packet Capture Times 249 Log Aggregation and Management 251 Windows Event Forwarding 251 Syslog 252 Log Management Offerings 254 Timelines 257 Plaso 258 PacketTotal 259 Wireshark 261 Security Information and Event Management 262 Summary 263 11 Network Scanning 265 Port Scanning 266 Operating System Analysis 271 Scripts 273 Banner Grabbing 275 Ping Sweeps 278 Vulnerability Scanning 280 Port Knocking 285 Tunneling 286 Passive Data Gathering 287 Summary 289 12 Final Considerations 291 Encryption 292 Keys 293 Symmetric 294 Asymmetric 295 Hybrid 296 SSL/TLS 297 Cloud Computing 306 Infrastructure as a Service 306 Storage as a Service 309 Software as a Service 310 Other Factors 311 The Onion Router (TOR) 314 Summary 317 Index 319
£42.75
John Wiley & Sons Inc Business Data Communications and Networking
Book Synopsis
£60.75
John Wiley & Sons Inc CCNA Security Study Guide
Book SynopsisCisco has announced big changes to its certification program. As of February 24, 2020, all current certifications will be retired, and Cisco will begin offering new certification programs. The good news is if you're working toward any current CCNA certification, keep going. You have until February 24, 2020 to complete your current CCNA. If you already have CCENT/ICND1 certification and would like to earn CCNA, you have until February 23, 2020 to complete your CCNA certification in the current program. Likewise, if you're thinking of completing the current CCENT/ICND1, ICND2, or CCNA Routing and Switching certification, you can still complete them between now and February 23, 2020. Lay the foundation for a successful career in network security CCNA Security Study Guide offers comprehensive review for Exam 210-260. Packed with concise explanations of core security concepts, this book is designed to help you sucTable of ContentsIntroduction xxi Assessment Test xxxi Chapter 1 Understanding Security Fundamentals 1 Goals of Security 2 Confidentiality 2 Integrity 3 Availability 3 Guiding Principles 3 Common Security Terms 6 Risk Management Process 7 Network Topologies 15 CAN 15 WAN 16 Data Center 16 SOHO 17 Virtual 17 Common Network Security Zones 17 DMZ 17 Intranet and Extranet 18 Public and Private 18 VLAN 18 Summary 19 Exam Essentials 19 Review Questions 20 Chapter 2 Understanding Security Threats 25 Common Network Attacks 26 Motivations 26 Classifying Attack Vectors 27 Spoofing 28 Password Attacks 29 Reconnaissance Attacks 30 Buffer Overflow 34 DoS 34 DDoS 36 Man-in-the-Middle Attack 37 ARP Poisoning 37 Social Engineering 38 Phishing/Pharming 38 Prevention 38 Malware 39 Data Loss and Exfiltration 39 Summary 40 Exam Essentials 40 Review Questions 42 Chapter 3 Understanding Cryptography 45 Symmetric and Asymmetric Encryption 46 Ciphers 46 Algorithms 48 Hashing Algorithms 53 MD5 54 SHA-1 54 SHA-2 54 HMAC 55 Digital Signatures 55 Key Exchange 57 Application: SSH 57 Public Key Infrastructure 57 Public and Private Keys 58 Certificates 60 Certificate Authorities 61 PKI Standards 63 PKI Topologies 64 Certificates in the ASA 65 Cryptanalysis 67 Summary 68 Exam Essentials 68 Review Questions 69 Chapter 4 Securing the Routing Process 73 Securing Router Access 74 Configuring SSH Access 74 Configuring Privilege Levels in IOS 76 Configuring IOS Role-Based CLI 77 Implementing Cisco IOS Resilient Configuration 79 Implementing OSPF Routing Update Authentication 80 Implementing OSPF Routing Update Authentication 80 Implementing EIGRP Routing Update Authentication 82 Securing the Control Plane 82 Control Plane Policing 83 Summary 84 Exam Essentials 85 Review Questions 86 Chapter 5 Understanding Layer 2 Attacks 91 Understanding STP Attacks 92 Understanding ARP Attacks 93 Understanding MAC Attacks 95 Understanding CAM Overflows 96 Understanding CDP/LLDP Reconnaissance 97 Understanding VLAN Hopping 98 Switch Spoofing 98 Double Tagging 99 Understanding DHCP Spoofing 99 Summary 101 Exam Essentials 101 Review Questions 102 Chapter 6 Preventing Layer 2 Attacks 107 Configuring DHCP Snooping 108 Configuring Dynamic ARP Inspection 110 Configuring Port Security 112 Configuring STP Security Features 114 BPDU Guard 114 Root Guard 115 Loop Guard 115 Disabling DTP 116 Verifying Mitigations 116 DHCP Snooping 116 DAI 117 Port Security 118 STP Features 118 DTP 120 Summary 120 Exam Essentials 121 Review Questions 122 Chapter 7 VLAN Security 127 Native VLANs 128 Mitigation 128 PVLANs 128 PVLAN Edge 131 PVLAN Proxy Attack 132 ACLs on Switches 133 Port ACLs 133 VLAN ACLs 133 Summary 134 Exam Essentials 134 Review Questions 136 Chapter 8 Securing Management Traffic 141 In-Band and Out-of-Band Management 142 AUX Port 142 VTY Ports 143 HTTPS Connection 144 SNMP 144 Console Port 145 Securing Network Management 146 SSH 146 HTTPS 146 ACLs 146 Banner Messages 147 Securing Access through SNMP v3 149 Securing NTP 150 Using SCP for File Transfer 151 Summary 151 Exam Essentials 152 Review Questions 153 Chapter 9 Understanding 802.1x and AAA 157 802.1x Components 158 RADIUS and TACACS+ Technologies 159 Configuring Administrative Access with TACACS+ 160 Local AAA Authentication and Accounting 160 SSH Using AAA 161 Understanding Authentication and Authorization Using ACS and ISE 161 Understanding the Integration of Active Directory with AAA 162 TACACS+ on IOS 162 Verify Router Connectivity to TACACS+ 164 Summary 164 Exam Essentials 165 Review Questions 166 Chapter 10 Securing a BYOD Initiative 171 The BYOD Architecture Framework 172 Cisco ISE 172 Cisco TrustSec 174 The Function of Mobile Device Management 177 Integration with ISE Authorization Policies 177 Summary 178 Exam Essentials 179 Review Questions 180 Chapter 11 Understanding VPNs 185 Understanding IPsec 186 Security Services 186 Protocols 189 Delivery Modes 192 IPsec with IPV6 194 Understanding Advanced VPN Concepts 195 Hairpinning 195 Split Tunneling 196 Always-on VPN 197 NAT Traversal 198 Summary 199 Exam Essentials 199 Review Questions 200 Chapter 12 Configuring VPNs 203 Configuring Remote Access VPNs 204 Basic Clientless SSL VPN Using ASDM 204 Verify a Clientless Connection 207 Basic AnyConnect SSL VPN Using ASDM 207 Verify an AnyConnect Connection 209 Endpoint Posture Assessment 209 Configuring Site-to-Site VPNs 209 Implement an IPsec Site-to-Site VPN with Preshared Key Authentication 209 Verify an IPsec Site-to-Site VPN 212 Summary 212 Exam Essentials 213 Review Questions 214 Chapter 13 Understanding Firewalls 219 Understanding Firewall Technologies 220 Packet Filtering 220 Proxy Firewalls 220 Application Firewall 221 Personal Firewall 221 Stateful vs. Stateless Firewalls 222 Operations 222 State Table 223 Summary 224 Exam Essentials 224 Review Questions 225 Chapter 14 Configuring NAT and Zone-Based Firewalls 229 Implementing NAT on ASA 9.x 230 Static 231 Dynamic 232 PAT 233 Policy NAT 233 Verifying NAT Operations 235 Configuring Zone-Based Firewalls 236 Class Maps 237 Default Policies 237 Configuring Zone-to-Zone Access 239 Summary 240 Exam Essentials 240 Review Questions 241 Chapter 15 Configuring the Firewall on an ASA 245 Understanding Firewall Services 246 Understanding Modes of Deployment 247 Routed Firewall 247 Transparent Firewall 247 Understanding Methods of Implementing High Availability 247 Active/Standby Failover 248 Active/Active Failover 248 Clustering 249 Understanding Security Contexts 249 Configuring ASA Management Access 250 Initial Configuration 250 Configuring Cisco ASA Interface Security Levels 251 Security Levels 251 Configuring Security Access Policies 253 Interface Access Rules 253 Object Groups 254 Configuring Default Cisco Modular Policy Framework (MPF) 256 Summary 257 Exam Essentials 257 Review Questions 259 Chapter 16 Intrusion Prevention 263 IPS Terminology 264 Threat 264 Risk 264 Vulnerability 265 Exploit 265 Zero-Day Threat 265 Actions 265 Network-Based IPS vs. Host-Based IPS 266 Host-Based IPS 266 Network-Based IPS 266 Promiscuous Mode 266 Detection Methods 267 Evasion Techniques 267 Packet Fragmentation 267 Injection Attacks 270 Alternate String Expressions 271 Introducing Cisco FireSIGHT 271 Capabilities 271 Protections 272 Understanding Modes of Deployment 273 Inline 275 Positioning of the IPS within the Network 275 Outside 275 DMZ 276 Inside 277 Understanding False Positives, False Negatives, True Positives, and True Negatives 277 Summary 278 Exam Essentials 278 Review Questions 280 Chapter 17 Content and Endpoint Security 285 Mitigating Email Threats 286 Spam Filtering 286 Context-Based Filtering 287 Anti-malware Filtering 287 DLP 287 Blacklisting 288 Email Encryption 288 Cisco Email Security Appliance 288 Putting the Pieces Together 290 Mitigating Web-Based Threats 292 Understanding Web Proxies 292 Cisco Web Security Appliance 293 Mitigating Endpoint Threats 294 Cisco Identity Services Engine (ISE) 294 Antivirus/Anti-malware 294 Personal Firewall 294 Hardware/Software Encryption of Local Data 294 HIPS 295 Summary 295 Exam Essentials 295 Review Questions 296 Appendix Answers to Review Questions 301 Chapter 1: Understanding Security Fundamentals 302 Chapter 2: Understanding Security Threats 304 Chapter 3: Understanding Cryptography 305 Chapter 4: Securing the Routing Process 307 Chapter 5: Understanding Layer 2 Attacks 309 Chapter 6: Preventing Layer 2 Attacks 311 Chapter 7: VLAN Security 312 Chapter 8: Securing Management Traffic 314 Chapter 9: Understanding 802.1x and AAA 316 Chapter 10: Securing a BYOD Initiative 317 Chapter 11: Understanding VPNs 319 Chapter 12: Configuring VPNs 321 Chapter 13: Understanding Firewalls 322 Chapter 14: Configuring NAT and Zone-Based Firewalls 324 Chapter 15: Configuring the Firewall on an ASA 325 Chapter 16: Intrusion Prevention 327 Chapter 17: Content and Endpoint Security 328 Index 331
£28.49
John Wiley & Sons Inc Risk Communication
Book SynopsisTHE ESSENTIAL HANDBOOK FOR EFFECTIVELY COMMUNICATING ENVIRONMENTAL, SAFETY, AND HEALTH RISKS, FULLY REVISED AND UPDATED Now in its sixth edition, Risk Communication has proven to be a valuable resource for people who are tasked with the responsibility of understanding how to apply the most current approaches to care, consensus, and crisis communication. The sixth edition updates the text with fresh and illustrative examples, lessons learned, and recent research as well as provides advice and guidelines for communicating risk information in the United States and other countries. The authors help readers understand the basic theories and practices of risk communication and explain how to plan an effective strategy and put it into action. The book also contains information on evaluating risk communication efforts and explores how to communicate risk during and after an emergency. Risk Communication brings together in one resource proven scientiTable of ContentsList of Figures XVII List of Tables XIX Preface XXI About the Authors XXIII 1 INTRODUCTION 1 To Begin 2 The Risk Communication Process 6 Audiences, Situations, and Purposes 8 References 8 PART I UNDERSTANDING RISK COMMUNICATION 2 APPROACHES TO COMMUNICATING RISK 11 Cross-Cutting Risk Communication Approaches 12 Care Communication Approaches 20 Consensus Communication Approach 23 Crisis Communication Approaches 24 Summary 26 References 26 Additional Resources 28 3 LAWS THAT MANDATE RISK COMMUNICATION 29 Comprehensive Environmental Response, Compensation, and Liability Act 30 Emergency Planning and Community Right-to-Know Act 31 Executive Order 12898, Environmental Justice in Minority Populations and Low-Income Populations 34 Executive Order 13045, Reduce Environmental Health and Safety Risks to Children 34 Food and Drug Administration Regulations on Prescription Drug Communication 35 National Environmental Policy Act 35 Natural Resource Damage Assessment 36 Occupational Safety and Health Act 37 Resource Conservation and Recovery Act 39 Risk Management Plan Rule 39 Privacy Rule 39 Other Government Inducements 40 Summary 42 References 42 Additional Resources 43 4 CONSTRAINTS TO EFFECTIVE RISK COMMUNICATION 45 Constraints on the Communicator 45 Constraints from the Audience 55 Constraints for Both Communicator and Audience 63 Summary 65 References 65 Additional Resources 67 5 ETHICAL ISSUES 69 Social Ethics 70 Organizational Ethics 77 Personal Ethics 82 Summary 85 References 85 Additional Resources 86 6 PRINCIPLES OF RISK COMMUNICATION 89 Principles of Process 90 Principles of Presentation 95 Principles for Comparing Risks 100 Summary 104 References 104 Additional Resources 105 PART II PLANNING THE RISK COMMUNICATION EFFORT 7 DETERMINE PURPOSE AND OBJECTIVES 109 Factors That Influence Purpose and Objectives 110 Reference 114 Additional Resources 115 8 ANALYZE YOUR AUDIENCE 117 Begin with Purpose and Objectives 118 Choose a Level of Analysis 119 Determine Key Audience Characteristics 122 Determine How to Find Audience Analysis Information 125 Incorporate Audience Analysis Information into Risk Communication Efforts 129 References 132 Additional Resources 133 9 DEVELOP YOUR MESSAGE 135 Common Pitfalls 136 Information People Want 139 Mental Models 141 Message Mapping and Message Development Templates 144 Health Risk Communication 144 Crisis Communication 147 References 150 Additional Resource 151 10 DETERMINE THE APPROPRIATE METHODS 153 Information Materials 153 Visual Representation of Risk 155 Face-to-Face Communication 156 The News Media 158 Stakeholder Participation 160 Technology-Assisted Communication 162 Social Media 163 Partnerships 164 Additional Resources 166 11 SET A SCHEDULE 167 Legal Requirements 167 Organizational Requirements 168 The Scientific Process 169 Ongoing Activities 169 Audience Needs 170 Reference 172 12 DEVELOP A COMMUNICATION PLAN 173 What to Include in a Communication Plan 174 Developing Risk Communication Strategies 177 References 183 Additional Resources 184 PART III PUTTING RISK COMMUNICATION INTO ACTION 13 INFORMATION MATERIALS 187 Constructing Information Materials 187 Guidelines for Specific Types of Information Materials 195 References 202 Additional Resources 202 14 VISUAL REPRESENTATIONS OF RISKS 203 Design Visuals for Specific Audiences and Uses 205 Match the Visual Portrayal to the Information to Be Conveyed 207 Pretest Graphics with Those Who Will Use Them 209 Using Visuals to Personalize Risk Information 213 Comparing Risks in Visual Formats 213 Static versus Interactive Visuals 216 Depicting Probability and Uncertainty 218 Warning Labels 227 Consider Using Action Levels 230 Ethical Portrayal of Risk Information 232 Using Visual Information in Group Decision Making 235 References 236 Additional Resources 239 15 FACE-TO-FACE COMMUNICATION 241 Constructing Face-to-Face Messages 242 Guidelines for Specific Types of Face-to-Face Communication 247 References 258 Additional Resource 258 16 NEWS MEDIA 259 The Roles of the News Media in Risk Communication 260 Understanding Cultural Differences 263 Guidelines for Interacting with the News Media 266 Getting the Word Out 275 Dealing with Fake News 279 References 281 Additional Resources 283 17 STAKEHOLDER PARTICIPATION 285 Requirements for Stakeholder Participation 286 Guidelines for Specific Types of Stakeholder Participation Activities 290 References 311 Additional Resources 312 18 TECHNOLOGY-ASSISTED COMMUNICATION 315 Choosing Technology-Based Applications 316 Workplace Risk Communication 317 Web-Delivered and Stand-Alone Multimedia Programs 322 Traditional Electronic Forums 327 Interactive Multimedia Programs in Public Places 328 Technology in Care Communication 331 Technology in Consensus Communication 332 Technology in Crisis Communication 336 References 343 Additional Resources 345 19 SOCIAL MEDIA 347 General Principles on Participating in Social Media to Communicate Risk 348 Sharing Content via Social Media 354 Engaging with Stakeholders 355 Monitoring Changes in Perception via Social Media 356 Guidelines for Specific Types of Social Media 358 Evaluating Social Media Effectiveness 362 Dealing with Fake News 364 References 367 Additional Resources 369 20 PARTNERSHIPS 371 Categories of Partnerships 372 General Principles for Working in Partnership 374 Working with Influencers 378 Evaluating and Ending Partnerships 381 References 383 Additional Resources 384 PART IV EVALUATING RISK COMMUNICATION EFFORTS 21 EVALUATION OF RISK COMMUNICATION EFFORTS 387 Why Evaluate Risk Communication Efforts? 387 The Meaning of Success 388 Types of Evaluations 391 Conducting the Evaluation 393 References 397 Additional Resources 398 PART V SPECIAL CASES IN RISK COMMUNICATION 22 EMERGENCY RISK COMMUNICATION 401 Understanding Emergency Risk Communication 402 Planning for the Unexpected 409 Communicating During an Emergency 436 Communicating After an Emergency 448 References 452 Additional Resources 456 23 INTERNATIONAL RISK COMMUNICATION 457 Recognize the Similarities 458 Account for Cultural Differences 459 Look for “Your” Risk in Other Countries 461 Plan for Cross-Country Communication 463 References 466 Additional Resources 468 24 PUBLIC HEALTH CAMPAIGNS 471 Understand Your Goals 472 Use Research to Design Campaigns 473 Use Multiple Methods to Reach People 474 When Things Go Wrong 479 Evaluate Success 481 References 485 Additional Resources 486 RESOURCES 489 General Risk Communication Resources 489 Environmental Risk Communication Resources 491 Safety Risk Communication Resources 491 Health Risk Communication Resources 492 Care Communication Resources 493 Consensus Communication Resources 493 Crisis Communication Resources 494 GLOSSARY 497 INDEX 501
£64.76
John Wiley & Sons Inc Mastering VMware NSX for vSphere
Book SynopsisA clear, comprehensive guide to VMware's latest virtualization solution Mastering VMware NSX for vSphere is the ultimate guide to VMware's network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform's many features. More and more organizations are recognizing both the need for stronger network security and the powerful solution that is NSX; usage has doubled in the past year alone, and that trend is projected to growand these organizations need qualified professionals who know how to work effectively with the NSX platform. This book covers everythiTable of ContentsIntroduction xvii Chapter 1 Abstracting Network and Security 1 Networks: 1990s 1 Colocation 2 Workload-to-Server Ratio 3 Inefficient Resource Allocation 3 The Long Road to Provisioning 3 Data Centers Come of Age 4 Data Center Workloads 4 Workloads Won’t Stay Put 5 VMware 6 Virtualization 6 What is Happening in There? 6 Portability 8 Virtualize Away 8 Extending Virtualization to Storage 9 Virtual Networking and Security 9 NSX to the Rescue 10 The Bottom Line 13 Chapter 2 NSX Architecture and Requirements 15 NSX Network Virtualization 16 Planes of Operation 16 NSX Manager Role and Function 18 ESXi Hosts 19 vCenter Server 20 vSphere Distributed Switch 21 NSX VIBs 23 Competitive Advantage: IOChain 24 IOChain Security Features 24 NSX Controllers 25 NSX Controller Clustering 26 NSX Controller Roles 26 NSX Edge 28 ESG Sizing 30 NSX Role-Based Access Control 30 Overlay and Underlay Networks 32 Replication Modes for Traffic Going to Multiple Destinations 34 The Bottom Line 36 Chapter 3 Preparing NSX 39 NSX Manager Prerequisites 39 Open Ports and Name Resolution 40 Minimum Resource Requirements for NSX Data Center Appliances 40 vSphere HA and DRS 41 IP Addressing and Port Groups 43 Installing the Client Integration Plug-in 44 Installing NSX Manager 44 Associating NSX Manager to vCenter 46 Adding AD/LDAP to NSX 47 Linking Multiple NSX Managers Together (Cross- vCenter NSX) 51 Multi-site Consistency with Universal Components 51 Primary and Secondary NSX Managers 53 Preparing ESXi Clusters for NSX 54 Creating a Universal Transport Zone on the Primary NSX Manager 56 vSphere Distributed Switches Membership 57 Adding Secondary NSX Managers 58 The Bottom Line 59 Chapter 4 Distributed Logical Switch 61 vSphere Standard Switch (vSS) 62 Traffic Shaping 63 Understanding Port Groups 64 NIC Teaming 65 Ensuring Security 66 Virtual Distributed Switch (vDS) 67 Virtual eXtensible LANs (VXLANs) 68 Employing Logical Switches 71 Three Tables That Store VNI Information 73 Collecting VNI Information 74 Centralized MAC Table 75 VTEP Table 76 We Might as Well Talk about ARP Now 79 Filling In the L2 and L3 Headers 79 Switch Security Module 81 Understanding Broadcast, Unknown Unicast, and Multicast 83 Layer 2 Flooding 83 Replication Modes 83 Deploying Logical Switches 84 Creating a Logical Switch 85 The Bottom Line 85 Chapter 5 Marrying VLANs and VXLANs 87 Shotgun Wedding: Layer 2 Bridge 87 Architecture 88 Challenges 89 Deployment 90 Under the Hood 102 Layer 2 VPN 102 NSX Native L2 Bridging 103 Hardware Switches to the Rescue 103 Hardware VTEPs 103 Deployment 104 Under the Hood 104 The Bottom Line 105 Chapter 6 Distributed Logical Router 107 Distributed Logical Router (DLR) 107 Control Plane Smarts 108 Logical Router Control Virtual Machine 108 Understanding DLR Efficiency 111 Another Concept to Consider 115 Let’s Get Smart about Routing 117 OSPF 119 Border Gateway Protocol (BGP) 120 Oh Yeah, Statics Too 123 Deploying Distributed Logical Routers 125 The Bottom Line 134 Chapter 7 NFV: Routing with NSX Edges 137 Network Function Virtualization: NSX Has It Too 137 This is Nice: Edge HA A 138 Adding HA 139 Let’s Do Routing Like We Always Do 140 Deploying the Edge Services Gateway 144 Configuring BGP 151 Configuring OSPF 154 Configuring Static Routes 155 Routing with the DLR and ESG 156 Using CLI Commands 156 Default Behaviors to Be Aware Of 157 Equal Cost Multi-Path Routing157 The Bottom Line 160 Chapter 8 More NVF: NSX Edge Services Gateway 163 ESG Network Placement 163 Network Address Translation 164 Configuring Source NAT 166 Configuring Destination NAT 166 Configuring SNAT on the ESG 167 Configuring DNAT on the ESG 169 ESG Load Balancer 171 Configuring an ESG Load Balancer 173 Layer 2 VPN (If You Must) 178 Secure Sockets Layer Virtual Private Network 179 Split Tunneling 180 Configuring SSL VPN 180 Internet Protocol Security VPN 187 Understanding NAT Traversal 188 Configuring IPsec Site-to-Site VPN with the ESG 188 Round Up of Other Services 190 DHCP Service 191 Configuring the ESG as a DHCP Server 192 DHCP Relay 194 Configuring the DLR for DHCP Relay 196 DNS Relay 198 Configuring DNS Relay on the ESG 199 The Bottom Line 200 Chapter 9 NSX Security, the Money Maker 203 Traditional Router ACL Firewall 203 I Told You about the IOChain 204 Slot 2: Distributed Firewall 206 Under the Hood 207 Adding DFW Rules 210 Segregating Firewall Rules 214 IP Discovery 215 Gratuitous ARP Used in ARP Poisoning Attacks 216 Why is My Traffic Getting Blocked? 218 Great, Now It’s Being Allowed 219 Identity Firewall: Rules Based on Who Logs In 220 Distributing Firewall Rules to Each ESXi Host: What’s Happening? 220 The Bottom Line 222 Chapter 10 Service Composer and Third-Party Appliances 223 Security Groups 224 Dynamic Inclusion 225 Static Inclusion 226 Static Exclusion 226 Defining a Security Group through Static Inclusion 227 Defining a Security Group through Dynamic Inclusion 229 Customizing a Security Group with Static Exclusion 231 Defining a Security Group Using Security Tags 231 Adding to DFW Rules 233 Service Insertion 236 IOChain, the Gift that Keeps on Giving 236 Layer 7 Stuff: Network Introspection 236 Guest Introspection 237 Service Insertion Providers 238 Security Policies 239 Creating Policies 239 Enforcing Policies 243 The Bottom Line 245 Chapter 11 vRealize Automation and REST APIs 247 vRealize Automation Features 247 vRA Editions 249 Integrating vRA and NSX 250 vRealize Automation Endpoints 250 Associating NSX Manager with vRealize Automation 252 Network Profiles 253 vRA External, Routed, and NAT Network Profiles 255 Reservations 258 vRealize Orchestrator Workflows 261 Creating a Blueprint for One Machine261 Adding NSX Workflow to a Blueprint 264 Creating a Request Service in the vRA Catalog 265 Configuring an Entitlement 268 Deploying a Blueprint that Consumes NSX Services 271 REST APIs 273 NSX REST API GET Request 275 NSX REST API POST Request 275 NSX REST API DELETE Request 276 The Bottom Line 277 Appendix The Bottom Line 279 Chapter 1: Abstracting Network and Security 279 Chapter 2: NSX Architecture and Requirements 280 Chapter 3: Preparing NSX 280 Chapter 4: Distributed Logical Switch 281 Chapter 5: Marrying VLANs and VXLANs 283 Chapter 6: Distributed Logical Router 284 Chapter 7: NFV: Routing with NSX Edges 286 Chapter 8: More NVF: NSX Edge Services Gateway 287 Chapter 9: NSX Security, the Money Maker 289 Chapter 10: Service Composer and Third-Party Appliances 290 Chapter 11: vRealize Automation and REST APIs 291 Index 293
£35.62
John Wiley & Sons Inc Windows Server 2019 PowerShell AllinOne For
Book SynopsisTable of ContentsIntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 2 Beyond the Book 3 Where to Go from Here 3 Book 1: Installing and Setting Up Windows Server 2019 5 Chapter 1: An Overview of Windows Server 2019 7 Extra! Extra! Read All About It! Seeing What’s New in Windows Server 2019 8 Deciding Which Windows Server 2019 Edition Is Right for You 12 Essentials 12 Standard 13 Datacenter 13 Walking the Walk: Windows Server 2019 User Experiences 13 Desktop Experience 13 Server Core 14 Nano 15 Seeing What Server Manager Has to Offer 15 Windows Admin Center: Your New Best Friend 17 Chapter 2: Using Boot Diagnostics 21 Accessing Boot Diagnostics 21 From the DVD 22 From the boot menu 24 Using a Special Boot Mode 25 Safe Mode 25 Enable Boot Logging 27 Enable Low-Resolution Video 27 Last Known Good Configuration 27 Directory Services Restore Mode 28 Debugging Mode 28 Disable Automatic Restart on System Failure 29 Disable Driver Signature Enforcement 29 Disable Early Launch Anti-Malware Driver 29 Performing a Memory Test 30 Using the Command Prompt 32 Working with Third-Party Boot Utilities 32 Chapter 3: Performing the Basic Installation 35 Making Sure You Have What It Takes 36 Central processing unit 36 Random access memory 38 Storage 38 Network adapter 39 DVD drive 39 UEFI-based firmware 39 Trusted Platform Module 39 Monitor 39 Keyboard and mouse 40 Performing a Clean Install 40 Upgrading Windows 43 Performing a Network Install with Windows Deployment Services 46 Chapter 4: Performing Initial Configuration Tasks 47 Understanding Default Settings 48 Getting an Overview of the Configuration Process 49 Providing Computer Information 50 Windows Server 2019 with Desktop Experience 50 Windows Server 2019 Core 54 Updating Windows Server 2019 60 Windows Server 2019 with Desktop Experience 60 Windows Server 2019 Core 62 Customizing Windows Server 2019 64 Windows Server 2019 with Desktop Experience 64 Windows Server 2019 Core 67 Configuring Startup Options with BCDEdit 70 Book 2: Configuring Windows Server 2019 73 Chapter 1: Configuring Server Roles and Features 75 Using Server Manager 75 Roles and features 76 Diagnostics 77 Configuration tasks 78 Configure and Manage Storage 79 Understanding Server Roles 80 Active Directory Certificate Services 80 Active Directory Domain Services 81 Active Directory Federation Services 81 Active Directory Lightweight Directory Services 81 Active Directory Rights Management Services 82 Device Health Attestation 82 Dynamic Host Configuration Protocol 82 Domain Name System 83 Fax Server 83 File and Storage Services 84 Host Guardian Service 84 Hyper-V 85 Network Controller 85 Network Policy and Access Services 85 Print and Document Services 86 Remote Access 86 Remote Desktop Services 86 Volume Activation Services 86 Web Services 87 Windows Deployment Services 87 Windows Server Update Services 87 Understanding Server Features 87 .NET 3.5 88 .NET 4.7 88 Background Intelligent Transfer Service 88 BitLocker Drive Encryption 88 BitLocker Network Unlock 89 BranchCache 89 Client for NFS 89 Containers 89 Data Center Bridging 90 Direct Play 90 Enhanced Storage 90 Failover Clustering 90 Group Policy Management 91 Host Guardian Hyper-V Support 91 I/O Quality of Service 91 IIS Hostable Web Core 91 Internet Printing Client 91 IP Address Management Server 92 Internet Storage Name Server Service 92 LPR Port Monitor 92 Management OData IIS Extension 92 Media Foundation 92 Message Queueing 93 Multipath I/O 93 Multipoint Connector 93 Network Load Balancing 93 Network Virtualization 93 Peer Name Resolution Protocol 94 Quality Windows Audio Video Experience 94 RAS Connection Manager Administration Kit 94 Remote Assistance 94 Remote Differential Compression 94 Remote Server Administration Tools 94 RPC over HTTP Proxy 95 Setup and Boot Event Collection 95 Simple TCP/IP Services 95 SMB 1.0/CIFS File Sharing Support 95 SMB Bandwidth Limit 96 SMTP Server 96 Simple Network Management Protocol Service 96 Software Load Balancer 96 Storage Migration Service 97 Storage Migration Service Proxy 97 Storage Replica 97 System Data Archiver 97 System Insights 98 Telnet Client 98 TFTP Client 98 VM Shielding Tools for Fabric Management 98 WebDAV Redirector 98 Windows Biometric Framework 99 Windows Defender Antivirus 99 Windows Identity Foundation 3.5 99 Windows Internal Database 99 Windows PowerShell 99 Windows Process Activation Service 99 Windows Search Service 100 Windows Server Backup 100 Windows Server Migration Tools 100 Windows Standards-Based Storage Management 100 Windows Subsystem for Linux 101 Windows TIFF IFilter 101 WinRM IIS Extension 101 WINS Server 101 Wireless LAN Service 101 WoW64 Support 101 XPS Viewer 102 Chapter 2: Configuring Server Hardware 103 Working with Device Manager 104 Opening Device Manager 104 Configuring how Device Manager displays 104 Viewing devices that are not working properly 106 Understanding resources 107 Viewing hidden devices 108 Scanning for new devices 109 Working with older devices 109 Viewing individual device settings 109 Updating drivers 111 Configuring power management 111 Using the Add Hardware Wizard 112 Performing Hard-Drive-Related Tasks 113 Choosing basic or dynamic disks 114 Using multipath I/O 115 Working with storage area networks 116 Understanding Storage Spaces Direct 117 Working with Storage Replica 123 Using Storage Quality of Service 124 Encrypting with BitLocker 124 Performing Printer-Related Tasks 134 Using the Printer Install Wizard 134 Configuring print options 136 Configuring the Print Server role 137 Connecting to a Printer on a Print Server 140 Performing Other Configuration Tasks 141 Keyboard 141 Mouse 141 Power management 142 Sound 143 Language 143 Fonts 143 Chapter 3: Using the Control Panel 145 Accessing the Control Panel 145 Configuring the Control Panel 146 Understanding Control Panel Items 148 Chapter 4: Working with Workgroups 157 Knowing What a Workgroup Is 158 Knowing If a Workgroup Is Right for You 158 Comparing Centralized and Group Sharing 159 Configuring a Server for a Workgroup 159 Changing the name of your workgroup 160 Adding groups 161 Creating users and adding users to the group 162 Adding shared resources 164 Managing Workgroups 168 The Computer Management console 168 The User Account window 169 PowerShell 170 Examining the Peer Name Resolution Protocol 172 Chapter 5: Promoting Your Server to Domain Controller 173 Understanding Domains 173 What is a domain? 174 Forests and domains and OUs, oh my! 174 Understanding privileged domain groups 175 Examining Flexible Single Master Operation roles on domain controllers 175 Preparing to Create a Domain 177 Functional levels 178 Forest functional level 179 Domain functional level 179 Performing Domain Configuration Prerequisites 179 Checking for unsupported roles and features 180 Installing and configuring Domain Name System 180 Installing and configuring Dynamic Host Configuration Protocol 183 Configuring the Server as a Domain Controller 187 Installing Active Directory Domain Services 188 Configuring Active Directory Domain Services 188 Converting your DNS Zone to an Active Directory Integrated Zone 190 Authorizing your DHCP Server for your Active Directory environment 193 Configuring the user accounts 194 Sharing resources on a domain 196 Joining clients to the domain 197 Wrapping Things Up 202 Chapter 6: Managing DNS and DHCP with IP Address Management 205 Installing IP Address Management 206 Configuring IP Address Management 206 Using IP Address Management 210 Overview 210 Server Inventory 211 IP Address Space 211 Monitor and Manage 213 Event Catalog 215 Access Control 215 Book 3: Administering Windows Server 2019 217 Chapter 1: An Overview of the Tools Menu in Server Manager 219 Accessing the Server Manager Tools Menu 219 Working with Common Administrative Tools 222 Computer Management 222 Defragment and Optimize Drives 222 Disk Cleanup 223 Event Viewer 224 Local Security Policy 224 Registry Editor 226 Services 226 System Configuration 228 Task Scheduler 228 Installing and Using Remote Server Administration Tools 229 Installing Remote Server Administration Tools 229 Using Remote Server Administration Tools 230 Chapter 2: Setting Group Policy 233 Understanding How Group Policy Works 234 Starting the Group Policy Editor 235 Performing Computer Management 236 Modifying computer software settings 238 Modifying computer settings 239 Using Administrative Templates 240 Performing User Configuration 241 Modifying user software settings 241 Modifying a user’s Windows Settings 242 Using user Administrative Templates 244 Viewing Resultant Set of Policy 244 Chapter 3: Configuring the Registry 247 Starting Registry Editor 248 Importing and Exporting Registry Elements 248 Exporting Registry elements 249 Importing Registry elements 249 Finding Registry Elements 250 Understanding Registry Data Types 251 Understanding the Hives 252 HKEY_CLASSES_ROOT 252 HKEY_CURRENT_USER 253 HKEY_LOCAL_MACHINE 254 HKEY_USERS 255 HKEY_CURRENT_CONFIG 256 Loading and Unloading Hives 256 Connecting to Network Registries 258 Setting Registry Security 259 Setting permissions in the Windows Registry 259 Disabling Remote Registry access 259 Securing remote administration 260 Chapter 4: Working with Active Directory 263 Active Directory 101 263 Configuring Objects in Active Directory 264 Using Active Directory Domains and Trusts 264 Using Active Directory Sites and Services 269 Using Active Directory Users and Computers 270 Using Active Directory Administrative Center 274 Chapter 5: Performing Standard Maintenance 277 Activating Windows 277 Through the graphical user interface 278 Through the command line 278 Configuring the User Interface 280 Working with the Folder Options dialog box 280 Setting your Internet Options 282 Focusing on your Personalization settings 284 Reporting problems 286 Setting your Regional and Language Options 286 Working with the Performance Options dialog box 287 Understanding How User Access Control Affects Maintenance Tasks 288 Adding and Removing Standard Applications 289 Measuring Reliability and Performance 290 Performance Monitor 290 Resource Monitor 292 Task Manager 293 Protecting the Data on Your Server 294 System Backup 295 System Restore 297 Performing Disk Management Tasks 298 Managing storage 299 Managing disks 299 Defragmenting drives 300 Automating Diagnostic Tasks with Task Scheduler 301 Discovering task status 301 Using preconfigured tasks 302 Creating your own tasks 304 Working with Remote Desktop 305 Working with Remote Server Administration Tools 306 Figuring out firewall rules 306 Connecting to the server 306 Managing your servers 307 Working with Admin Center 308 Focusing on firewall rules 309 Connecting to a server 309 Using Windows Admin Center to manage your servers 309 Creating a Windows Recovery Drive 311 Chapter 6: Working at the Command Line 313 Opening an Administrative Command Prompt 313 Configuring the Command Line 314 Customizing how you interact with the Command Prompt 314 Changing the font 316 Choosing your window layout 317 Defining text colors 318 Setting Environmental Variables 319 Getting Help at the Command Line 320 Understanding Command Line Symbols 322 Chapter 7: Working with PowerShell 323 Opening an Administrative PowerShell Window 324 Configuring PowerShell 325 Options 325 Font 327 Layout 328 Colors 328 Using a Profile Script 330 Setting Environmental Variables 330 Getting Help in PowerShell 332 Understanding PowerShell Punctuation 334 Book 4: Configuring Networking in Windows Server 2019 337 Chapter 1: Overview of Windows Server 2019 Networking 339 Getting Acquainted with the Network and Sharing Center 340 Using the Network Connections Tools 342 Status 342 Ethernet 343 Dial-up 344 VPN 344 Proxy 344 Configuring TCP/IP 346 Understanding DHCP 349 Defining DNS 350 Creating a DNS zone 352 DNS and Active Directory 353 Making DNS fault tolerant 354 Chapter 2: Performing Basic Network Tasks 355 Viewing Network Properties 355 Connecting to Another Network 357 Connecting to the Internet 358 Setting up a dial-up connection 359 Connecting to a virtual private network 360 Managing Network Connections 361 Understanding the Client for Microsoft Networks feature 362 Configuring the Internet Protocol 362 Installing network features 364 Uninstalling network features 364 Chapter 3: Accomplishing Advanced Network Tasks 367 Working with Remote Desktop Services 367 Installing Remote Desktop Services 368 Configuring user-specific settings 369 Configuring apps 371 Using RD Web Access 372 Configuring and using RDS licensing 374 Working with Network Policy and Access Services 376 Network Policy Server 377 Troubleshooting at the Command Line 381 Chapter 4: Diagnosing and Repairing Network Connection Problems 383 Using Windows Network Diagnostics 384 Repairing Individual Connections 386 Network Troubleshooting at the Command Line 388 Working with Windows Firewall 389 Making Sense of Common Configuration Errors 391 Duplicate IP addresses 391 No gateway address 391 No DNS servers set 392 An application is experiencing network issues 392 Everything should be working, but it’s not 392 Working with Other Troubleshooting Tools 392 Book 5: Managing Security with Windows Server 2019 395 Chapter 1: Understanding Windows Server 2019 Security 397 Understanding Basic Windows Server Security 397 The CIA triad: Confidentiality, integrity, and availability 398 Authentication, authorization, and accounting 399 Access tokens 399 Security descriptors 399 Access control lists 400 Working with Files and Folders 403 Setting file and folder security 403 Creating a Local Security Policy 406 Paying Attention to Windows Security 408 Virus & Threat Protection 408 Firewall & Network Protection 408 App & Browser Control 410 Device Security 411 Chapter 2: Configuring Shared Resources 413 Comparing Share Security with File System Security 413 Shared folder permissions 414 File system security 415 Effective permissions validation 415 Sharing Resources 417 Storage media 417 Printers 418 Other resources 419 Configuring Access with Federated Rights Management 419 Working with Active Directory Federation Services 420 Working with Active Directory Rights Management Services 424 Chapter 3: Configuring Operating System Security 433 Understanding and Using User Account Control 433 Using User Account Control to protect the server 434 Running tasks as administrator 434 Watching out for automatic privilege elevation 435 Overriding User Account Control settings 435 Managing User Passwords 438 Understanding Credential Guard 439 How Credential Guard works 440 Credential Guard Hardware Requirements 440 How to enable Credential Guard 441 Configuring Startup and Recovery Options 444 Chapter 4: Working with the Internet 447 Firewall Basics 447 Getting acquainted with the Windows Defender Firewall profiles 448 Enabling and disabling the Windows Defender Firewall 448 Configuring Windows Defender Firewall with Advanced Security 451 Working with profile settings 452 Working with inbound/outbound rules 454 Understanding IPSec 457 Configuring the IPSec settings 458 Chapter 5: Understanding Digital Certificates 461 Certificates in Windows Server 2019 462 Cryptography 101 462 Certificate-specific concepts 464 Types of Certificates in Active Directory Certificate Services 465 User certificates 465 Computer 466 Chapter 6: Installing and Configuring AD CS 469 Introducing Certificate Authority Architecture 470 Root certificate authorities 470 Issuing certificate authorities 471 Policy certificate authorities 471 Installing a Certificate Authority 471 Creating the CAPolicy.inf file 471 Installing the root certificate authority 473 Installing the issuing certificate authority 477 Enrolling for certificates 478 Setting up web enrollment 481 Installing Online Certificate Status Protocol 482 Configuring Certificate Auto-Enrollment 485 Configuring the template 485 Configuring Group Policy 486 Chapter 7: Securing Your DNS Infrastructure 489 Understanding DNSSEC 489 The basics of DNSSEC 490 Records used for DNSSEC 490 Configuring DNSSEC 491 Understanding DANE 495 The basics of DANE 495 Configuring DANE 496 Book 6: Working with Windows PowerShell 501 Chapter 1: Introducing PowerShell 503 Understanding the Basics of PowerShell 503 Objects 504 Pipeline 504 Providers 505 Variables 506 Sessions 506 Comments 507 Aliases 507 Cmdlets 507 Using PowerShell 509 Writing PowerShell commands and scripts 509 Working with objects 513 Working with the pipeline 514 Working with modules 516 Working with comparison operators 518 Getting information out of PowerShell 519 Scripting logic 521 Other cool tricks 522 Running PowerShell Remotely 527 Invoke-Command 527 New-PSSession 527 Enter-PSSession 527 Getting Help in PowerShell 528 Update-Help 528 Get-Help 529 -Detailed and -Full 529 Identifying Security Issues with PowerShell 530 Execution Policy 530 Code signing 531 Firewall requirements for PowerShell remoting 534 Chapter 2: Understanding the NET Framework 535 Introducing the Various Versions of NET Framework 535 Focusing on New Features in NET 4.7 538 Viewing the Global Assembly Cache 539 Understanding assembly security 540 Identifying the two types of assembly privacy 540 Viewing assembly properties 541 Understanding NET Standard and NET Core 541 .NET Core 542 .NET Standard 542 Tying it all together: NET and PowerShell 542 Chapter 3: Working with Scripts and Cmdlets 543 Introducing Common Scripts and Cmdlets 543 Executing Scripts or Cmdlets 544 Working with COM objects 545 Combining multiple cmdlets 545 Working from Another Location 546 Performing Simple Administrative Tasks with PowerShell Scripts 548 Adding users in Active Directory 548 Creating a CSV file and populating it with data from Active Directory 548 Checking to see if a patch is installed 550 Checking running processes or services 550 Chapter 4: Creating Your Own Scripts and Advanced Functions 551 Creating a PowerShell Script 552 Creating a simple script 552 Running the script 557 Defining a Script Policy 558 Signing a PowerShell Script 559 Creating a PowerShell Advanced Function 559 Playing with parameters 560 Creating the advanced function 561 Using the advanced function 563 Chapter 5: PowerShell Desired State Configuration 567 Getting an Overview of PowerShell Desired State Configuration 567 Configurations 568 Resources 569 Local Configuration Manager 571 Creating a PowerShell Desired State Configuration Script 572 Applying the PowerShell Desired State Configuration Script 573 Compiling into MOF 574 Applying the new configuration 575 Push and Pull: Using PowerShell Desired State Configuration at Scale 575 Push mode 576 Pull mode 577 Book 7: Installing and Administering Hyper-V 579 Chapter 1: What Is Hyper-V? 581 Introduction to Virtualization 581 Type 1 and Type 2 Hypervisors 582 Type 1 hypervisors 583 Type 2 hypervisors 583 Installing and Configuring Hyper-V 583 Installing Hyper-V 584 Configuring Hyper-V 586 Virtual Switch Manager 591 Virtual SAN Manager 591 Chapter 2: Virtual Machines 593 Creating a Virtual Machine 593 Configuring a Virtual Machine 597 Add Hardware 598 Firmware 598 Security 598 Memory 599 Processor 600 SCSI Controller 601 Network Adapter 602 Name 603 Integration Services 603 Checkpoints 603 Smart Paging File Location 603 Automatic Start Action 604 Automatic Stop Action 604 Shielded Virtual Machines 604 Chapter 3: Virtual Networking 605 Identifying the Types of Virtual Switches 606 External 606 Internal 606 Private 606 Creating a Virtual Switch 607 Hyper-V Manager 607 PowerShell 608 Getting into Advanced Hyper-V Networking 610 Virtual local area network tagging 610 Bandwidth management 613 Network interface card teaming 614 Looking at single-root I/O virtualization 619 Chapter 4: Virtual Storage 621 Understanding Virtual Disk Formats 621 Considering Types of Disks 622 Fixed 622 Dynamic 622 Differencing 623 Pass-through 623 Adding Storage to the Host 623 Adding the drives 623 Changing the default save locations of virtual disk files 625 Adding Storage to the Virtual Machine 626 Adding a new virtual drive 626 Expanding a disk drive 629 Adding a pass-through disk 630 Converting a VHD disk file to a VHDX disk file 631 Attaching the converted drive to the virtual machine 632 Chapter 5: High Availability in Hyper-V 635 Hyper-V Replica 635 Setting up Hyper-V Replica on the Hyper-V hosts 636 Setting up replication on the virtual machines 638 Live Migration 640 Setting up live migration 641 Kicking off a live migration 643 Storage Migration 644 Failover Clustering 645 Installing Failover Clustering 645 Configuring Failover Clustering 646 Configuring a witness for your failover cluster 647 Book 8: Installing, Configuring, and Using Containers 649 Chapter 1: Introduction to Containers in Windows Server 2019 651 Understanding Containers 652 Knowing what a container looks like 652 Defining important container terms 653 Seeing how containers run on Windows 653 Considering Use Cases for Containers 654 Developers 654 System administrators 654 Deciding What Type of Containers You Want to Use 655 Windows Server containers 655 Hyper-V containers 655 Managing Containers at Scale 656 Chapter 2: Docker and Docker Hub 657 Introduction to Docker 657 Docker architecture 658 Basic Docker commands 658 Introduction to Docker Hub 659 Finding public images 659 Creating a private repository 662 Using a private repository 664 Chapter 3: Installing Containers on Windows Server 2019 667 Installing Windows Containers 668 Installing Hyper-V Containers 669 Installing Docker 670 Testing Your Container Installation 672 Windows container 672 Hyper-V container 672 Chapter 4: Configuring Docker and Containers on Windows Server 2019 675 Working with Dockerfile 675 Applying Custom Metadata to Containers and Other Objects 678 Creating labels 679 Viewing labels 679 Configuring Containers 680 Starting containers automatically 680 Limiting a container’s resources 681 Configuring the Docker Daemon with daemon.json 682 Chapter 5: Managing Container Images 685 Making Changes to Images and Saving the Changes You Make 685 Pushing Images to Docker Hub 689 Pulling Images from Docker Hub 691 Handling Image Versioning 693 Chapter 6: Container Networking 695 Considering the Different Types of Network Connections 696 Viewing Your Network Adapters and Virtual Switches 697 Configuring a Network Address Translation Network Connection 698 Configuring a Transparent Network Connection 699 Configuring an Overlay Network Connection 700 Configuring an l2bridge Network Connection 701 Configuring an l2tunnel Network Connection 702 Connecting to a Network 703 Chapter 7: Container Storage 705 Getting Acquainted with Container Storage 705 Creating a Volume Inside of a Container 706 Working with Persistent Volumes 709 Looking at volume types 709 Removing volumes 712 Index 713
£23.79
John Wiley & Sons Inc Hands on Hacking
Book SynopsisTable of ContentsForeword xviii Introduction xx Chapter 1 Hacking a Business Case 1 All Computers are Broken 2 The Stakes 4 What’s Stolen and Why It’s Valuable 4 The Internet of Vulnerable Things 4 Blue, Red, and Purple Teams 5 Blue Teams 5 Red Teams 5 Purple Teams 7 Hacking is Part of Your Company’s Immune System 9 Summary 11 Notes 12 Chapter 2 Hacking Ethically and Legally 13 Laws That Affect Your Work 14 Criminal Hacking 15 Hacking Neighborly 15 Legally Gray 16 Penetration Testing Methodologies 17 Authorization 18 Responsible Disclosure 19 Bug Bounty Programs 20 Legal Advice and Support 21 Hacker House Code of Conduct 22 Summary 22 Chapter 3 Building Your Hack Box 23 Hardware for Hacking 24 Linux or BSD? 26 Host Operating Systems 27 Gentoo Linux 27 Arch Linux 28 Debian 28 Ubuntu 28 Kali Linux 29 Verifying Downloads 29 Disk Encryption 31 Essential Software 33 Firewall 34 Password Manager 35 Email 36 Setting Up VirtualBox 36 Virtualization Settings 37 Downloading and Installing VirtualBox 37 Host-Only Networking 37 Creating a Kali Linux VM 40 Creating a Virtual Hard Disk 42 Inserting a Virtual CD 43 Virtual Network Adapters 44 Labs 48 Guest Additions 51 Testing Your Virtual Environment 52 Creating Vulnerable Servers 53 Summary 54 Chapter 4 Open Source Intelligence Gathering 55 Does Your Client Need an OSINT Review? 56 What are You Looking For? 57 Where Do You Find It? 58 OSINT Tools 59 Grabbing Email Addresses from Google 59 Google Dorking the Shadows 62 A Brief Introduction to Passwd and Shadow Files 62 The Google Hacking Database 65 Have You Been “Pwned” Yet? 66 OSINT Framework Recon-ng 67 Recon-ng Under the Hood 74 Harvesting the Web 75 Document Metadata 76 Maltego 80 Social Media Networks 81 Shodan 83 Protecting Against OSINT 85 Summary 86 Chapter 5 The Domain Name System 87 The Implications of Hacking DNS 87 A Brief History of DNS 88 The DNS Hierarchy 88 A Basic DNS Query 89 Authority and Zones 92 DNS Resource Records 92 BIND9 95 DNS Hacking Toolkit 98 Finding Hosts 98 WHOIS 98 Brute-Forcing Hosts with Recon-ng 100 Host 101 Finding the SOA with Dig 102 Hacking a Virtual Name Server 103 Port Scanning with Nmap 104 Digging for Information 106 Specifying Resource Records 108 Information Leak CHAOS 111 Zone Transfer Requests 113 Information-Gathering Tools 114 Fierce 115 Dnsrecon 116 Dnsenum 116 Searching for Vulnerabilities and Exploits 118 Searchsploit 118 Other Sources 119 DNS Traffic Amplification 120 Metasploit 121 Carrying Out a Denial-of-Service Attack 125 DoS Attacks with Metasploit 126 DNS Spoofi ng 128 DNS Cache Poisoning 129 DNS Cache Snooping 131 DNSSEC 131 Fuzzing 132 Summary 134 Chapter 6 Electronic Mail 135 The Email Chain 135 Message Headers 137 Delivery Status Notifications 138 The Simple Mail Transfer Protocol 141 Sender Policy Framework 143 Scanning a Mail Server 145 Complete Nmap Scan Results (TCP) 149 Probing the SMTP Service 152 Open Relays 153 The Post Office Protocol 155 The Internet Message Access Protocol 157 Mail Software 158 Exim 159 Sendmail 159 Cyrus 160 PHP Mail 160 Webmail 161 User Enumeration via Finger 162 Brute-Forcing the Post Office 167 The Nmap Scripting Engine 169 CVE-2014-0160: The Heartbleed Bug 172 Exploiting CVE-2010-4345 180 Got Root? 183 Upgrading Your Shell 184 Exploiting CVE-2017-7692 185 Summary 188 Chapter 7 The World Wide Web of Vulnerabilities 191 The World Wide Web 192 The Hypertext Transfer Protocol 193 HTTP Methods and Verbs 195 HTTP Response Codes 196 Stateless 198 Cookies 198 Uniform Resource Identifiers 200 LAMP: Linux, Apache, MySQL, and PHP 201 Web Server: Apache 202 Database: MySQL 203 Server-Side Scripting: PHP 203 Nginx 205 Microsoft IIS 205 Creepy Crawlers and Spiders 206 The Web Server Hacker’s Toolkit 206 Port Scanning a Web Server 207 Manual HTTP Requests 210 Web Vulnerability Scanning 212 Guessing Hidden Web Content 216 Nmap 217 Directory Busting 218 Directory Traversal Vulnerabilities 219 Uploading Files 220 WebDAV 220 Web Shell with Weevely 222 HTTP Authentication 223 Common Gateway Interface 225 Shellshock 226 Exploiting Shellshock Using Metasploit 227 Exploiting Shellshock with cURL and Netcat 228 SSL, TLS, and Heartbleed 232 Web Administration Interfaces 238 Apache Tomcat 238 Webmin 240 phpMyAdmin 241 Web Proxies 242 Proxychains 243 Privilege Escalation 245 Privilege Escalation Using DirtyCOW 246 Summary 249 Chapter 8 Virtual Private Networks 251 What is a VPN? 251 Internet Protocol Security 253 Internet Key Exchange 253 Transport Layer Security and VPNs 254 User Databases and Authentication 255 SQL Database 255 RADIUS 255 LDAP 256 PAM 256 TACACS+ 256 The NSA and VPNs 257 The VPN Hacker’s Toolkit 257 VPN Hacking Methodology 257 Port Scanning a VPN Server 258 Hping3 259 UDP Scanning with Nmap 261 IKE-scan 262 Identifying Security Association Options 263 Aggressive Mode 265 OpenVPN 267 LDAP 275 OpenVPN and Shellshock 277 Exploiting CVE-2017-5618 278 Summary 281 Chapter 9 Files and File Sharing 283 What is Network-Attached Storage? 284 File Permissions 284 NAS Hacking Toolkit 287 Port Scanning a File Server 288 The File Transfer Protocol 289 The Trivial File Transfer Protocol 291 Remote Procedure Calls 292 RPCinfo 294 Server Message Block 295 NetBIOS and NBT 296 Samba Setup 298 Enum4Linux 299 SambaCry (CVE-2017-7494) 303 Rsync 306 Network File System 308 NFS Privilege Escalation 309 Searching for Useful Files 311 Summary 312 Chapter 10 UNIX 315 UNIX System Administration 316 Solaris 316 UNIX Hacking Toolbox 318 Port Scanning Solaris 319 Telnet 320 Secure Shell 324 RPC 326 CVE-2010-4435 329 CVE-1999-0209 329 CVE-2017-3623 330 Hacker’s Holy Grail EBBSHAVE 331 EBBSHAVE Version 4 332 EBBSHAVE Version 5 335 Debugging EBBSHAVE 335 R-services 338 The Simple Network Management Protocol 339 Ewok 341 The Common UNIX Printing System 341 The X Window System 343 Cron and Local Files 347 The Common Desktop Environment 351 EXTREMEPARR 351 Summary 353 Chapter 11 Databases 355 Types of Databases 356 Flat-File Databases 356 Relational Databases 356 Nonrelational Databases 358 Structured Query Language 358 User-Defined Functions 359 The Database Hacker’s Toolbox 360 Common Database Exploitation 360 Port Scanning a Database Server 361 MySQL 362 Exploring a MySQL Database 362 MySQL Authentication 373 PostgreSQL 374 Escaping Database Software 377 Oracle Database 378 MongoDB 381 Redis 381 Privilege Escalation via Databases 384 Summary 392 Chapter 12 Web Applications 395 The OWASP Top 10 396 The Web Application Hacker’s Toolkit 397 Port Scanning a Web Application Server 397 Using an Intercepting Proxy 398 Setting Up Burp Suite Community Edition 399 Using Burp Suite Over HTTPS 407 Manual Browsing and Mapping 412 Spidering 415 Identifying Entry Points 418 Web Vulnerability Scanners 418 Zed Attack Proxy 419 Burp Suite Professional 420 Skipfish 421 Finding Vulnerabilities 421 Injection 421 SQL Injection 422 SQLmap 427 Drupageddon 433 Protecting Against SQL Injection 433 Other Injection Flaws 434 Broken Authentication 434 Sensitive Data Exposure 436 XML External Entities 437 CVE-2014-3660 437 Broken Access Controls 439 Directory Traversal 440 Security Misconfiguration 441 Error Pages and Stack Traces 442 Cross-Site Scripting 442 The Browser Exploitation Framework 445 More about XSS Flaws 450 XSS Filter Evasion 450 Insecure Deserialization 452 Known Vulnerabilities 453 Insufficient Logging and Monitoring 453 Privilege Escalation 454 Summary 455 Chapter 13 Microsoft Windows 457 Hacking Windows vs. Linux 458 Domains, Trees, and Forests 458 Users, Groups, and Permissions 461 Password Hashes 461 Antivirus Software 462 Bypassing User Account Control 463 Setting Up a Windows VM 464 A Windows Hacking Toolkit 466 Windows and the NSA 467 Port Scanning Windows Server 467 Microsoft DNS 469 Internet Information Services 470 Kerberos 471 Golden Tickets 472 NetBIOS 473 LDAP 474 Server Message Block 474 ETERNALBLUE 476 Enumerating Users 479 Microsoft RPC 489 Task Scheduler 497 Remote Desktop 497 The Windows Shell 498 PowerShell 501 Privilege Escalation with PowerShell 502 PowerSploit and AMSI 503 Meterpreter 504 Hash Dumping 505 Passing the Hash 506 Privilege Escalation 507 Getting SYSTEM 508 Alternative Payload Delivery Methods 509 Bypassing Windows Defender 512 Summary 514 Chapter 14 Passwords 517 Hashing 517 The Password Cracker’s Toolbox 519 Cracking 519 Hash Tables and Rainbow Tables 523 Adding Salt 525 Into the /etc/shadow 526 Different Hash Types 530 MD5 530 SHA-1 531 SHA-2 531 SHA256 531 SHA512 531 bcrypt 531 CRC16/CRC32 532 PBKDF2 532 Collisions 533 Pseudo-hashing 533 Microsoft Hashes 535 Guessing Passwords 537 The Art of Cracking 538 Random Number Generators 539 Summary 540 Chapter 15 Writing Reports 543 What is a Penetration Test Report? 544 Common Vulnerabilities Scoring System 545 Attack Vector 545 Attack Complexity 546 Privileges Required 546 User Interaction 547 Scope 547 Confidentiality, Integrity, and Availability Impact 547 Report Writing as a Skill 549 What Should a Report Include? 549 Executive Summary 550 Technical Summary 551 Assessment Results 551 Supporting Information 552 Taking Notes 553 Dradis Community Edition 553 Proofreading 557 Delivery 558 Summary 559 Index 561
£28.00