Computer networking and communications Books
John Wiley & Sons Inc Project Zero Trust
Book SynopsisTable of ContentsAbout the Author xi Acknowledgments xiii Foreword xv Introduction xxi Chapter 1: The Case for Zero Trust 1 Key Takeaways 10 Chapter 2: Zero Trust Is a Strategy 13 Key Takeaways 26 The Four Zero Trust Design Principles 27 The Five-Step Zero Trust Design Methodology 27 The Zero Trust Implementation Curve 27 Chapter 3: Trust Is a Vulnerability 29 Key Takeaways 39 Chapter 4: The Crown Jewels 43 Key Takeaways 54 Chapter 5: The Identity Cornerstone 57 Key Takeaways 71 Chapter 6: Zero Trust DevOps 73 Key Takeaways 83 Chapter 7: Zero Trust SOC 87 Key Takeaways 100 Chapter 8: Cloudy with a Chance of Trust 103 Key Takeaways 113 Chapter 9: A Sustainable Culture 117 Key Takeaways 129 Chapter 10: The Tabletop Exercise 133 Key Takeaways 147 Chapter 11: Every Step Matters 151 Key Takeaways 159 Appendix A: Zero Trust Design Principles and Methodology 165 The Four Zero Trust Design Principles 165 The Five-Step Zero Trust Design Methodology 166 Appendix B: Zero Trust Maturity Model 167 Appendix C: Sample Zero Trust Master Scenario Events List 171 Appendix D: For Further Reading 179 Standards, Frameworks, and Other Resources 179 Case Studies 180 Google BeyondCorp Papers 180 Books 181 Hardening Guides 181 Glossary 183 Index 191
£18.69
John Wiley & Sons Inc If Its Smart Its Vulnerable
Book SynopsisTable of ContentsForeword: Jeff Moss xiii Preface xvii Saab 9000 Turbo xxi The Good and the Bad of the Internet 1 Prehistoric Internet 2 The First Websites 5 Linux Is the World’s Most Important System 7 iPhone vs. Supercomputer 10 Online Communities 11 Money Is Data 13 Codes All Around Us 14 Geopolitics 17 Security Tetris 21 Who Are We Fighting? 24 Schoolboys 24 Spammer 26 Professional Cybercrime Groups 28 Extremists 29 The Rolex 30 Malware—Then, Now, and in the Near Future 33 The History of Malware 34 Viruses on Floppies 34 Brain.A 35 File Viruses 43 Macro Viruses 43 Email Worms 45 Internet Worms 46 The Virus Wars 49 Web Attacks 51 Mobile Phone Viruses 51 Worms on Social Media 54 Smartphones and Malware 55 Law Enforcement Malware 57 Case R2D2 58 Cracking Passwords 59 When a Hacker Spilled Her Coffee 60 Ransomware Trojans 61 The History of Ransomware Trojans 61 Cryptolocker 64 Honest Criminals 65 Notpetya 65 Case Maersk 67 Wannacry 71 My Week with Wannacry 72 Targeted Ransomware Trojans 76 Ransomware Trojans v2 77 The Human Element 79 The Two Problems 80 The Heist 82 CEO Fraud 89 Touring the Headquarters 92 Protecting Company Networks 95 Zero Trust 100 Bug Bounties 101 Wi- Fi Terms of Use 110 Mikko’s Tips 112 Mikko’s Tips for the Startup Entrepreneur 114 Boat for Sale 118 What If the Network Goes Down? 121 Electrical Networks 122 Security in Factories 124 A Search Engine for Computers 126 Slammer 128 Hypponen’s Law 130 Dumb Devices 132 Regulation 134 Car Software Updates 136 Online Privacy 137 Life Without Google 138 Murder Charges Never Expire 139 Is Google Listening to You? 142 Gorillas 143 Startup Business Logic 145 Biometrics 147 Antisocial Media 149 Online Influencing and Elections 151 Privacy Is Dead 153 Before and After Gmail 156 Encryption Techniques 160 Perfect Encryption 160 Unbreakable Encryption 161 Criminal Use of Encryption Systems 162 Data Is The New Uranium 166 CASE Vastaamo 168 Patient Registry 169 Technologies 170 Vastaamo.tar 171 Extortion Messages 173 The Hunt for the TAR File 175 Innocent Victims 177 Cryptocurrencies 179 The Value of Money 180 Blockchains 181 Blockchain Applications 182 Blockchains and Money 183 The Environmental Impacts of Bitcoin 185 Playing the Market 187 Ethereum, Monero, and Zcash 189 Nft 191 Bitcoin and Crime 193 Border Guards vs. Bitcoin 195 Technology, Espionage, and Warfare Online 199 Cyberweapons 200 Lunch Break at Google 201 Technology and Warfare 202 Under a False Flag 204 Concealability of Cyberweapons 205 The Fog of Cyberwar 207 Case Prykarpattyaoblenergo 211 Case Pyeongchang 213 Governments as Malware Authors 214 Russia and China 216 Case Stuxnet 217 Damage Coverage 226 Explosion at the White House 227 My Boycott of RSA, Inc 229 The Future 233 Artificial Intelligence 234 Wolverines 237 AI Will Take Our Jobs 238 Smart Malware 239 Metaverse 240 The Technology of Warfare 241 “You Are Under Arrest for a Future Murder” 242 Those Who Can Adapt Will Prosper 243 Tesla 245 Trends in Technology 247 Coda 249 Index 251
£18.69
John Wiley & Sons Inc The Active Defender
Book SynopsisImmerse yourself in the offensive security mindset to better defend against attacks In The Active Defender: Immersion in the Offensive Security Mindset, Principal Technology Architect, Security, Dr. Catherine J. Ullman delivers an expert treatment of the Active Defender approach to information security. In the book, you'll learn to understand and embrace the knowledge you can gain from the offensive security community. You'll become familiar with the hacker mindset, which allows you to gain emergent insight into how attackers operate and better grasp the nature of the risks and threats in your environment. The author immerses you in the hacker mindset and the offensive security culture to better prepare you to defend against threats of all kinds. You'll also find: Explanations of what an Active Defender is and how that differs from traditional defense modelsReasons why thinking like a hacker makes you a better defenderWays to begin your journey as an Active Defender and leverage the hacker mindset An insightful and original book representing a new and effective approach to cybersecurity, The Active Defender will be of significant benefit to information security professionals, system administrators, network administrators, and other tech professionals with an interest or stake in their organization's information security.Table of ContentsForeword xxv Preface xxix Introduction xxxiii Chapter 1 What Is an Active Defender? 1 The Hacker Mindset 1 Traditional Defender Mindset 3 Getting from Here to There 4 Active Defender Activities 7 Threat Modeling 7 Threat Hunting 8 Attack Simulations 9 Active Defense 9 “Active Defense” for the Active Defender 10 Another Take on Active Defense 10 Annoyance 11 Attribution 11 Attack 11 Active Defense According to Security Vendors 11 Active > Passive 12 Active Defense by the Numbers 13 Active Defense and Staffing 13 Active Defender > Passive Defender 13 Relevant Intel Recognition 13 Understanding Existing Threats 14 Attacker Behavior 14 Pyramid of Pain 15 MITRE Att&ck 15 TTP Pyramid 15 Toward a Deeper Understanding 16 Return to the Beginning 16 Summary 18 Notes 18 Chapter 2 Immersion into the Hacker Mindset 21 Reluctance 21 Media Portrayal 21 Fear of Government Retribution 22 The Rock Star Myth 22 Imposter Syndrome 23 A Leap of Faith 23 My First Security BSides 24 My First DEF CON 24 Finding the Community 27 Security BSides 27 Structured Format 27 Unconference Format 28 Hybrid Format 28 Additional Events 28 Other Security Conferences 29 CircleCityCon 29 GrrCON 29 Thotcon 29 ShmooCon 30 Wild West Hackin’ Fest 30 DEF Con 30 Local Security Meetups 30 Infosec 716 31 Burbsec 31 #misec 31 Makerspaces 31 DEF CON Groups 32 2600 Meetings 32 Online Security Communities 33 Traditional Security Communities 34 An Invitation 34 Summary 36 Notes 36 Chapter 3 Offensive Security Engagements, Trainings, and Gathering Intel 37 Offensive Security Engagements 37 Targeting 38 Initial Access 38 Persistence 39 Expansion 39 Exfiltration 40 Detection 40 Offensive Security Trainings 40 Conference Trainings 41 Security BSides 41 DEF Con 42 GrrCON 42 Thotcon 43 CircleCityCon 43 Wild West Hackin’ Fest 43 Black Hat 44 Security Companies 44 Offensive Security 44 TrustedSec 44 Antisyphon 45 SANS 45 Online Options 46 Hackthebox 46 Tryhackme 46 Hackthissite 47 CTFs 47 YouTube 47 Higher Education 48 Gathering Intel 48 Tradecraft Intel 49 Project Zero 49 AttackerKB 49 Discord/Slack 50 Twitter 50 Organizational Intel 51 LinkedIn 51 Pastebin 52 GitHub 52 Message Boards 52 Internal Wikis 53 Haveibeenpwned 53 Summary 54 Notes 54 Chapter 4 Understanding the Offensive Toolset 55 Nmap/Zenmap 57 Burp Suite/ZAP 59 sqlmap 60 Wireshark 61 Metasploit Framework 63 Shodan 64 Social-Engineer Toolkit 66 Mimikatz 67 Responder 70 Cobalt Strike 71 Impacket 73 Mitm6 75 CrackMapExec 76 evil-winrm 77 BloodHound/SharpHound 78 Summary 79 Notes 80 Chapter 5 Implementing Defense While Thinking Like a Hacker 81 OSINT for Organizations 81 OPSEC 82 OSINT 82 Social Engineering 82 Actively Defending 84 ASM 84 ATO Prevention 84 Benefits 86 Types of Risks Mitigated 86 Threat Modeling Revisited 87 Framing the Engagement 87 Scoping in Frame 87 Motivation in Frame 88 The Right Way In 88 Reverse Engineering 88 Targeting 89 Inbound Access 89 Persistence 89 Egress Controls 90 LOLBins 90 Rundll32.exe 91 Regsvr32.exe 91 MSbuild.exe 92 Cscript.exe 92 Csc.exe 92 Legitimate Usage? 92 Threat Hunting 93 Begin with a Question 93 The Hunt 94 Applying the Concepts 94 Dumping Memory 95 Lateral Movement 95 Secondary C2 96 Proof of Concept 97 Attack Simulations 97 Simulation vs. Emulation 97 Why Test? 98 Risky Assumptions 99 Practice Is Key 100 Tools for Testing 100 Microsoft Defender for O365 101 Atomic Red Team 102 Caldera 103 Scythe 103 Summary 104 Notes 104 Chapter 6 Becoming an Advanced Active Defender 107 The Advanced Active Defender 107 Automated Attack Emulations 108 Using Deceptive Technologies 108 Honey Tokens 109 Decoy Accounts 109 Email Addresses 110 Database Data 110 AWS Keys 111 Canary Tokens 111 Honeypots 111 Other Forms of Deception 112 Web Server Header 112 User Agent Strings 113 Fake DNS Records 113 Working with Offensive Security Teams 114 But We Need a PenTest! 114 Potential Testing Outcomes 115 Vulnerability Identification 116 Vulnerability Exploitation 116 Targeted Detection/Response 116 Real Threat Actor 117 Detection Analysis 117 Scope 117 Scoping Challenges 118 Additional Scope Considerations 118 Decisions, Decisions 119 Measuring Existing Defenses 119 Crown Jewels 119 Selecting a Vendor 120 Reputation 120 Experience and Expertise 121 Processes 121 Data Security 122 Adversarial Attitudes 122 Results 123 Additional Considerations 123 Purple Teaming – Collaborative Testing 124 What Is a Purple Team? 124 Purple Team Exercises 125 Cyber Threat Intelligence 125 Preparation 126 Exercise Execution 126 Lessons Learned 127 Purple Teams and Advanced Active Defenders 127 Summary 127 Notes 128 Chapter 7 Building Effective Detections 129 Purpose of Detection 129 Funnel of Fidelity 130 Collection 130 Detection 130 Triage 131 Investigation 131 Remediation 131 Building Detections: Identification and Classification 131 Overall Detection Challenges 132 Attention Problem 132 Perception Problem 133 Abstraction Problem 134 Validation Problem 135 The Pyramids Return 135 Lower Levels 136 Tools 137 Wrong Viewpoint 137 Bypass Options 138 Higher Levels 139 Testing 140 Literal Level 140 Functional Level 140 Operational Level 141 Technical Level 142 Proper Validation: Both Telemetry and Detection 143 Telemetry Coverage 143 Detection Coverage 144 Testing Solutions 144 Atomic Red Team 144 AtomicTestHarness 145 Summary 146 Notes 147 Chapter 8 Actively Defending Cloud Computing Environments 149 Cloud Service Models 150 IaaS 150 PaaS 150 SaaS 150 Cloud Deployment Environments 151 Private Cloud 151 Public Cloud 151 Fundamental Differences 151 On-Demand Infrastructure 152 Shared Responsibility Model 152 Control Plane and Data Plane 153 Infrastructure as an API 154 Data Center Mapping 154 IAM Focus 155 Cloud Security Implications 157 Larger Attack Surface 158 New Types of Exposed Services 158 Application Security Emphasis 159 Challenges with API Use 160 Custom Applications 161 Cloud Offensive Security 161 Enumeration of Cloud Environments 162 Code Repositories 162 Publicly Accessible Resources 163 Initial Access 164 Phishing/Password Spraying 164 Stealing Access Tokens 164 Resource Exploitation 165 Post-Compromise Recon 165 Post-Exploitation Enumeration 166 Roles, Policies, and Permissions 166 Dangerous Implied Trusts 166 Overly Permissive Configurations 170 Multi-Level Access 170 Persistence/Expansion 171 Lateral Movement 172 Privilege Escalation 173 Defense Strategies 175 Summary 175 Notes 176 Chapter 9 Future Challenges 179 Software Supply Chain Attacks 179 A Growing Problem 180 Actively Defending 180 Counterfeit Hardware 181 Fake CISCO Hardware 181 Actively Defending 182 UEFI 182 Increasing Vulnerabilities 182 Enter BlackLotus 183 MSI Key Leak 184 Actively Defending 185 BYOVD Attacks 185 Lazarus Group 186 Cuba Ransomware Group 186 Actively Defending 186 Ransomware 186 Continuing Evolution 187 Actively Defending 187 Tabletop Exercises 188 Ransomware Playbooks 189 Frameworks 191 Cobalt Strike 192 Silver 192 Metasploit 192 Brute Ratel 193 Havoc 193 Mythic 193 Actively Defending 194 Living Off the Land 194 Actively Defending 195 API Security 195 Defining APIs 195 API Impact 196 Security Significance 196 Actively Defending 196 Everything Old Is New Again 197 OWASP Top 10 197 Old Malware Never (Really) Dies 198 Emotet 198 REvil 199 Actively Defending 199 Summary 200 Notes 201 Index 203
£18.39
John Wiley & Sons Inc Data Exfiltration Threats and Prevention
Book SynopsisDATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks by introducing existing and recently developed methods in malware protection using AI, memory forensic, and pattern matching, presenting various data exfiltration attack vectors and advanced memory-based data leakage detection, and discussing ways in which machine learning methods have a positive impact on malware detection. Providing detailed descriptions of the recent advances in data exfiltration detection methods and technologies, the authors also discuss details of data breach countermeasures and attack scenarios to show how the reader may identify a potential cyber attack in the real world. Composed ofTable of ContentsAbout the Authors xv Acknowledgments xvii Acronyms xix Abstract xxi 1 Introduction 1 1.1 Data Exfiltration Methods 3 1.2 Important Questions 7 1.3 Book Scope 9 1.4 Book Summary 11 1.5 Book Structure 15 2 Background19 2.1 Hidden Markov Model 19 2.2 Memory Forensics 24 2.3 Bag-of-Words Model 27 2.4 Sparse Distributed Representation 28 2.5 Summary 29 3 Data Security Threats 31 3.1 Data Security 32 3.2 Security vs. Protection vs. Privacy 35 3.3 Advanced Persistent Threats Attacks 36 3.4 Cybersecurity Threats 38 3.5 Conclusion 59 4 Use Cases Data Leakage Attacks 63 4.1 Most Significant Attacks 63 4.2 Top Infection Vectors 68 4.3 Top Threats of Recent Years 70 4.4 Malware Development Trends 71 4.5 Geographic Trends 75 4.6 Industry Trends 78 4.7 Conclusion 80 5 Survey on Building Block Technologies 83 5.1 Motivation 83 5.2 Background 87 5.3 Taxonomy 96 5.4 Supervised Learning Methods 98 5.5 Systematic Literature Review 107 5.6 Evaluation of Supervised Learning Methods 108 5.7 Key Open Problems 125 5.8 Summary 127 6 Behavior-Based Data Exfiltration Detection Methods 141 6.1 Motivation 141 6.2 Existing Methods 144 6.3 Sub-Curve HMM Method 148 6.4 Evaluation 159 6.5 Experimental Results 164 6.6 Discussion 172 6.7 Summary 173 7 Memory-Based Data Exfiltration Detection Methods 181 7.1 Motivation 181 7.2 Existing Methods 183 7.3 Concepts 186 7.4 Fast Lookup Bag-of-Words (FBoW) 191 7.5 Evaluation 199 7.6 Summary 215 8 Temporal-Based Data Exfiltration Detection Methods 221 8.1 Motivation 221 8.2 Existing Methods 223 8.3 Definitions 225 8.4 Temporary Memory Bag-of-Words (TMBoW) 229 8.5 Experimental Results 234 8.6 Summary 245 9 Conclusion 249 9.1 Summary 249 9.2 What Is Innovative in the Described Methods? 251 9.3 What Is Next? 253 Index 255
£91.80
John Wiley & Sons Inc Network Science
Book SynopsisNetwork Science Network Science offers comprehensive insight on network analysis and network optimization algorithms, with simple step-by-step guides and examples throughout, and a thorough introduction and history of network science, explaining the key concepts and the type of data needed for network analysis, ensuring a smooth learning experience for readers. It also includes a detailed introduction to multiple network optimization algorithms, including linear assignment, network flow and routing problems. The text is comprised of five chapters, focusing on subgraphs, network analysis, network optimization, and includes a list of case studies, those of which include influence factors in telecommunications, fraud detection in taxpayers, identifying the viral effect in purchasing, finding optimal routes considering public transportation systems, among many others. This insightful book shows how to apply algorithms to solve complex problems in real-life scenarios andTable of ContentsPreface x Acknowledgments xiii About the Author xiv About the Book xv 1 Concepts in Network Science 1 1.1 Introduction 1 1.2 The Connector 2 1.3 History 3 1.3.1 A History in Social Studies 4 1.4 Concepts 5 1.4.1 Characteristics of Networks 7 1.4.2 Properties of Networks 7 1.4.3 Small World 8 1.4.4 Random Graphs 11 1.5 Network Analytics 12 1.5.1 Data Structure for Network Analysis and Network Optimization 13 1.5.1.1 Multilink and Self-Link 14 1.5.1.2 Loading and Unloading the Graph 15 1.5.2 Options for Network Analysis and Network Optimization Procedures 15 1.5.3 Summary Statistics 16 1.5.3.1 Analyzing the Summary Statistics for the Les Misérables Network 17 1.6 Summary 21 2 Subnetwork Analysis 23 2.1 Introduction 23 2.1.1 Isomorphism 25 2.2 Connected Components 26 2.2.1 Finding the Connected Components 27 2.3 Biconnected Components 35 2.3.1 Finding the Biconnected Components 36 2.4 Community 38 2.4.1 Finding Communities 45 2.5 Core 58 2.5.1 Finding k-Cores 59 2.6 Reach Network 62 2.6.1 Finding the Reach Network 65 2.7 Network Projection 70 2.7.1 Finding the Network Projection 72 2.8 Node Similarity 77 2.8.1 Computing Node Similarity 82 2.9 Pattern Matching 88 2.9.1 Searching for Subgraphs Matches 91 2.10 Summary 98 3 Network Centralities 101 3.1 Introduction 101 3.2 Network Metrics of Power and Influence 102 3.3 Degree Centrality 103 3.3.1 Computing Degree Centrality 103 3.3.2 Visualizing a Network 110 3.4 Influence Centrality 114 3.4.1 Computing the Influence Centrality 115 3.5 Clustering Coefficient 121 3.5.1 Computing the Clustering Coefficient Centrality 121 3.6 Closeness Centrality 124 3.6.1 Computing the Closeness Centrality 124 3.7 Betweenness Centrality 129 3.7.1 Computing the Between Centrality 130 3.8 Eigenvector Centrality 136 3.8.1 Computing the Eigenvector Centrality 137 3.9 PageRank Centrality 144 3.9.1 Computing the PageRank Centrality 144 3.10 Hub and Authority 151 3.10.1 Computing the Hub and Authority Centralities 152 3.11 Network Centralities Calculation by Group 157 3.11.1 By Group Network Centralities 158 3.12 Summary 164 4 Network Optimization 167 4.1 Introduction 167 4.1.1 History 167 4.1.2 Network Optimization in SAS Viya 170 4.2 Clique 170 4.2.1 Finding Cliques 172 4.3 Cycle 176 4.3.1 Finding Cycles 177 4.4 Linear Assignment 179 4.4.1 Finding the Minimum Weight Matching in a Worker-Task Problem 181 4.5 Minimum-Cost Network Flow 185 4.5.1 Finding the Minimum-Cost Network Flow in a Demand–Supply Problem 188 4.6 Maximum Network Flow Problem 194 4.6.1 Finding the Maximum Network Flow in a Distribution Problem 195 4.7 Minimum Cut 199 4.7.1 Finding the Minimum Cuts 201 4.8 Minimum Spanning Tree 205 4.8.1 Finding the Minimum Spanning Tree 206 4.9 Path 208 4.9.1 Finding Paths 211 4.10 Shortest Path 220 4.10.1 Finding Shortest Paths 223 4.11 Transitive Closure 235 4.11.1 Finding the Transitive Closure 236 4.12 Traveling Salesman Problem 239 4.12.1 Finding the Optimal Tour 243 4.13 Vehicle Routing Problem 249 4.13.1 Finding the Optimal Vehicle Routes for a Delivery Problem 253 4.14 Topological Sort 265 4.14.1 Finding the Topological Sort in a Directed Graph 266 4.15 Summary 268 5 Real-World Applications in Network Science 271 5.1 Introduction 271 5.2 An Optimal Tour Considering a Multimodal Transportation System – The Traveling Salesman Problem Example in Paris 272 5.3 An Optimal Beer Kegs Distribution – The Vehicle Routing Problem Example in Asheville 285 5.4 Network Analysis and Supervised Machine Learning Models to Predict COVID-19 Outbreaks 298 5.5 Urban Mobility in Metropolitan Cities 306 5.6 Fraud Detection in Auto Insurance Based on Network Analysis 312 5.7 Customer Influence to Reduce Churn and Increase Product Adoption 320 5.8 Community Detection to Identify Fraud Events in Telecommunications 324 5.9 Summary 328 Index 329
£67.95
John Wiley & Sons Inc Systems Engineering Neural Networks
Book SynopsisSYSTEMS ENGINEERING NEURAL NETWORKS A complete and authoritative discussion of systems engineering and neural networks In Systems Engineering Neural Networks, a team of distinguished researchers deliver a thorough exploration of the fundamental concepts underpinning the creation and improvement of neural networks with a systems engineering mindset. In the book, you'll find a general theoretical discussion of both systems engineering and neural networks accompanied by coverage of relevant and specific topics, from deep learning fundamentals to sport business applications. Readers will discover in-depth examples derived from many years of engineering experience, a comprehensive glossary with links to further reading, and supplementary online content. The authors have also included a variety of applications programmed in both Python 3 and Microsoft Excel. The book provides: A thorough introduction to neural networks, introduced as key element of complex systems Practical discussions of sTable of ContentsABOUT THE AUTHORS ACKNOWLEDGEMENTS 7 HOW TO READ THIS BOOK 8 Part I 9 1 A BRIEF INTRODUCTION 9 THE SYSTEMS ENGINEERING APPROACH TO ARTIFICIAL INTELLIGENCE (AI) 14 SOURCES 18 CHAPTER SUMMARY 18 QUESTIONS 19 2 DEFINING A NEURAL NETWORK 20 BIOLOGICAL NETWORKS 22 FROM BIOLOGY TO MATHEMATICS 24 WE CAME A FULL CIRCLE 25 THE MODEL OF McCULLOCH-PITTS 25 THE ARTIFICIAL NEURON OF ROSENBLATT 26 FINAL REMARKS 33 SOURCES 35 CHAPTER SUMMARY 36 QUESTIONS 37 3 ENGINEERING NEURAL NETWORKS 38 A BRIEF RECAP ON SYSTEMS ENGINEERING 40 THE KEYSTONE: SE4AI AND AI4SE 41 ENGINEERING COMPLEXITY 41 THE SPORT SYSTEM 45 ENGINEERING A SPORT CLUB 51 OPTIMISATION 52 AN EXAMPLE OF DECISION MAKING 56 FUTURISM AND FORESIGHT 60 QUALITATIVE TO QUANTITATIVE 61 FUZZY THINKING 64 IT IS ALL IN THE TOOLS 74 SOURCES 77 CHAPTER SUMMARY 77 QUESTIONS 78 Part II 79 4 SYSTEMS THINKING FOR SOFTWARE DEVELOPMENT 79 PROGRAMMING LANGUAGES 82 ONE MORE THING: SOFTWARE ENGINEERING 94 CHAPTER SUMMARY 101 QUESTIONS 102 SOURCES 102 5 PRACTICE MAKES PERFECT 103 EXAMPLE 1: COSINE FUNCTION 105 EXAMPLE 2: CORROSION ON A METAL STRUCTURE 112 EXAMPLE 3: DEFINING ROLES OF ATHLETES 127 EXAMPLE 4: ATHLETE’S PERFORMANCE 134 EXAMPLE 5: TEAM PERFORMANCE 142 A human-defined-system 142 Human Factors 143 The sport team as system of interest 144 Impact of Human Error on Sports Team Performance 145 EXAMPLE 6: TREND PREDICTION 156 EXAMPLE 7: SYMPLEX AND GAME THEORY 163 EXAMPLE 8: SORTING MACHINE FOR LEGO® BRICKS 168 Part III 174 6 INPUT/OUTPUT, HIDDEN LAYER AND BIAS 174 INPUT/OUTPUT 175 HIDDEN LAYER 180 BIAS 184 FINAL REMARKS 186 CHAPTER SUMMARY 187 QUESTIONS 188 7 ACTIVATION FUNCTION 189 TYPES OF ACTIVATION FUNCTIONS 191 ACTIVATION FUNCTION DERIVATIVES 194 ACTIVATION FUNCTIONS RESPONSE TO W AND b VARIABLES 200 FINAL REMARKS 202 CHAPTER SUMMARY 204 QUESTIONS 205 SOURCES 205 8 COST FUNCTION, BACK-PROPAGATION AND OTHER ITERATIVE METHODS 206 WHAT IS THE DIFFERENCE BETWEEN LOSS AND COST? 209 TRAINING THE NEURAL NETWORK 212 BACK-PROPAGATION (BP) 214 ONE MORE THING: GRADIENT METHOD AND CONJUGATE GRADIENT METHOD 218 ONE MORE THING: NEWTON’S METHOD 221 CHAPTER SUMMARY 223 QUESTIONS 224 SOURCES 224 9 CONCLUSIONS AND FUTURE DEVELOPMENTS 225 GLOSSARY AND INSIGHTS 233
£88.65
John Wiley & Sons Inc Deep Dive
Book SynopsisTable of ContentsForeword xix Preface xxi Introduction xxv Part I Foundational OSINT 1 Chapter 1 Open Source Intelligence 3 1.1 What Is OSINT? 3 1.2 A Brief History of OSINT 6 The Past 6 The Present 8 The Future 10 1.3 Critical Thinking 14 1.4 Mental Health 16 1.5 Personal Bias 17 1.6 Ethics 19 Chapter 2 The Intelligence Cycle 23 2.1 What Is the Intelligence Cycle? 23 2.2 Planning and Requirements Phase 24 2.3 Collection Phase 26 The Art of Pivoting 27 Overcoming OSINT Challenges 33 RESET Technique 33 Gap Analysis 34 Why We Have So Much Data 37 2.4 Documentation Methods 39 2.5 Processing and Evaluation Phase 44 Scoping 45 Data Enrichment 45 2.6 Analysis and Production Phase 47 Visualizations 47 2.7 Reporting 50 Report Tone 51 Report Design 51 Example Report 54 2.8 Dissemination and Consumption Phases 54 Tippers 55 Feedback Phase 55 Challenges in the Intelligence Cycle 55 Chapter 3 The Adversarial Mindset 57 3.1 Getting to Know the Adversary 57 3.2 Passive vs. Active Recon 64 Chapter 4 Operational Security 67 4.1 What Is OPSEC? 67 Threat Modeling 68 Persona Non Grata Method 68 Security or “Baseball” Cards 69 Attack Trees 71 4.2 Steps for OPSEC 72 Outlining the Five Steps of OPSEC 72 Step 1: Define Critical Information 72 Step 2: Analyze the Threat 72 Step 3: Determine Vulnerabilities 73 Step 4: Risk Assessment 73 Step 5: Apply Countermeasures 74 4.3 OPSEC Technology 77 Virtual Private Network 77 Why Use a VPN? 77 Choosing a VPN 78 VPN Concerns 78 Privacy Browsers 79 Tor 79 Freenet 80 I2p 82 Virtual Machine 83 Mobile Emulator 85 4.4 Research Accounts 85 4.5 Congratulations! 90 Part II OSINT Touchpoints 91 Chapter 5 Subject Intelligence 97 5.1 Overview 97 What Is Subject Intelligence? 98 Digital Footprint 98 Examining a Subject’s Pattern of Life 102 5.2 Names 106 Subject Names 106 Naming Conventions 107 Arabic Naming Conventions 107 Chinese Naming Conventions 109 Russian Naming Conventions 109 Name Searching Techniques 110 5.3 Subject Usernames 110 Username Searching Techniques 111 Correlating Accounts and Subject Information by Username 112 5.4 Subject Emails 116 How to begin connecting accounts 117 Correlating Accounts and Subject Information by Email 117 Google Accounts 119 Correlating an Email with a Domain 120 Email Verification 122 Privacy Emails 124 Data Breaches 125 5.5 Subject Phone Numbers 129 Typing Phone Numbers to additional selectors 129 Correlating a Phone Number with a Subject 129 Phone Number Spoofing 131 5.6 Public Records and Personal Disclosures 132 Methods for incorporating public records searches 132 Collecting Public Records Associated with a Subject 132 U.S. Official Public Record Sources 134 U.S. Unofficial Sources 142 Chapter 6 Social Media Analysis 145 6.1 Social Media 145 Key Parts of Social Media 146 Collecting Social Media Data on a Subject 148 Correlating Subject Social Media Accounts 149 Subject Associations and Interactions on Social Media 151 User Media and Metadata 156 Social Media Pivots at a Glance 159 6.2 Continuous Community Monitoring 160 Methods for the Continuous Monitoring of a Group 160 Facebook Groups 161 Telegram Channels 162 Reddit 164 4chan and 8kun 166 I Joined a Community, Now What? 167 I Am Unable to Join a Community, Can I Still Monitor Them? 168 6.3 Image and Video Analysis 169 How to Look at an Image/Video 169 Reverse Image Searching 172 Image- Based Geolocation 173 Image Analysis 173 Geolocation Steps 175 Image Analysis 177 Geolocation Steps 178 Image Analysis and Geolocation for Real- Time Events 181 6.4 Verification 184 Misinformation, Disinformation, and Malinformation 185 How Do We Verify If Content Is Mis/Dis/Mal? 186 Spotting a Bot Account or Bot Network 187 Visualizing and Analyzing Social Networks 190 Spotting Digitally Altered Content 193 Photo Manipulation 196 Video Manipulation 199 6.5 Putting It All Together 200 Chasing a Puppy Scam 200 Chapter 7 Business and Organizational Intelligence 209 7.1 Overview 209 What Is Organizational Intelligence? 209 7.2 Corporate Organizations 212 Understanding the Basics of Corporate Structure 213 Entity Types 213 7.3 Methods for Analyzing Organizations 215 Government Sources and Official Registers 216 Edgar 218 Annual Reports and Filings 219 Annual Report to Shareholders 220 Forms 10- K, 10- Q, and 8- K 220 Digital Disclosures and Leaks 220 Organizational Websites 221 Social Media for Organizations 225 Business Indiscretions and Lawsuits 226 Contracts 229 Government Contracts 229 Contract Reading 101 231 Power Mapping 239 Tips for Analyzing Organizations Outside the United States 243 Canada 243 United Kingdom 243 China 246 Russia 246 Middle East 249 7.4 Recognizing Organizational Crime 250 Shell Corporations 251 The “Tells” 252 7.5 Sanctions, Blacklists, and Designations 253 Organizations that designate sanctions 254 The United Nations Security Council 254 The Office of Foreign Assets Control 254 Other Blacklists 254 7.6 501(c)(3) Nonprofits 255 Primary Source Documents 256 IRS Form 990 256 IRS Tax Exempt Organization Search 257 Annual Reports 258 Consumer Reports and Reviews 259 Charity Navigator 259 7.7 Domain Registration and IP Analysis 260 An Organization’s IPs, Domain Names and Websites 261 What Is an IP address? 261 What Is a Domain Name? 261 What Is a Website, and Why Does All of This Matter? 261 Analyzing Organization Websites 262 Robots.txt 262 Website Design and Content 263 Website Metadata 264 Analyzing WHOIS Record Data 265 Analyzing IP Addresses 267 IP Addresses 101 267 What Can I Do with an IP Address? 269 Words of Caution 270 Chapter 8 Transportation Intelligence 273 8.1 Overview 273 What Is Transportation Intelligence? 273 The Criticality of Transportation Intelligence 274 Visual Intelligence 275 Spotters 275 Social Media Disclosures 276 Webcam 276 Satellite Imagery 278 Signal Detection 281 Understanding Navigational Systems 282 Dark Signals 284 Signal Spoofing 285 Identity Manipulation 287 GNSS Jamming 287 GNSS Meaconing 288 8.2 Vessels 289 Introduction to Maritime Intelligence 289 Types of Maritime Entities 289 Vessel Terminology 290 Maritime Discovery and Analysis Methods 291 Vessel Paths and Locations 292 Vessel Meetings 293 Port Calls 297 Maritime Entity Ownership and Operation 300 Maritime Critical Infrastructure and Entity Vulnerabilities 301 Ship-to-Shore Critical Infrastructure 302 8.3 Railways 305 Introduction to Railway Intelligence 305 Types of Railway Entities 306 Railway Terminology 307 Railway Discovery and Analysis Methods 308 Visual Identification of Rail Lines 308 Railway Routes and Schedules 314 Railway Entity Ownership and Operation 317 Railway Critical Infrastructure and Entity Vulnerabilities 318 8.4 Aircraft 323 Introduction to Aircraft Intelligence 323 Types of Aircraft 324 Parts of a Typical Jet 325 Aircraft and Air Travel Terminology 327 Aircraft Discovery and Analysis Methods 328 Identifying Aircraft 329 Flight Paths and Locations 346 Limiting Aircraft Data Displayed and Private ICAO Addresses Listings 349 Tracking Cargo 350 Notice to Air Missions (NOTAMs) 350 Air Traffic Control Communications 352 Aerodromes 352 Geolocation and Imagery Analysis of Aircraft 355 Aviation Entity Ownership and Operation 358 Aviation Critical Infrastructure and Entity Vulnerabilities 361 8.5 Automobiles 362 Introduction to Automotive Intelligence 362 Types of Automobile Entities 362 Automobile Terminology 363 Automobile Discovery and Analysis Methods 364 Identifying Automobiles 364 Tips for Monitoring and Analyzing Automobile Routes 371 Automobile Entity Ownership and Operation 374 Automobile Security and Technology 375 Chapter 9 Critical Infrastructure and Industrial Intelligence 379 9.1 Overview of Critical Infrastructure and Industrial Intelligence 379 What Is Operational Technology? 384 What Is IoT and IIoT? 385 9.2 Methods for the Analysis of Critical Infrastructure, OT, and IoT Systems 387 Planning the Analysis 388 Five Possible Information Gathering Avenues 388 Visualizations 390 Plotting Locations with Google Earth Pro 391 Using Premade Visualizations 397 Public Disclosures 402 Contracts 402 Social Media 402 Job Advertisements 404 Company Disclosures 404 Infrastructure Search Tools 405 Censys.io 405 Kamerka 406 9.3 Wireless 408 Overview of Wireless Networks 408 Mobile Networks 409 War Driving 410 Low- Power Wide- Area Networks 412 Long Range Radio (LoRa) 412 Wireless SSID, BSSID, MAC 413 Service Set Identifier (SSID) 413 Basic Service Set Identifier (BSSID) 413 Extended Service Set Identifier (ESSID) 413 Media Access Control (MAC) Address 413 9.4 Methods for Analyzing Wireless Networks 415 Information Gathering Techniques 415 Here are some pivots for wireless network information gathering 415 Wi- Fi Searching Techniques 418 WiGLE 418 Plotting Wireless Locations with Google Earth Pro 421 Tower Searching Techniques 423 Chapter 10 Financial Intelligence 425 10.1 Overview 425 Financial Organizations 426 Financial Intelligence Units 426 Financial Crimes Enforcement Network 426 The Financial Action Task Force 426 The Federal Deposit Insurance Corporation 427 International Monetary Fund 427 Federal Financial Institutions Examination Council 427 The Office of Foreign Assets Control 428 10.2 Financial Crime and Organized Crime, Together Forever <3 429 Transnational Criminal Organizations 430 Politically Exposed Person 432 Anti- Money Laundering 433 The Counter Financing of Terrorism 435 Tax Evasion, Tax Fraud, and Embezzlement 437 10.3 Methods for Analysis 438 Financial Identifiers 440 Issuer Identification Number 440 Routing Number (ABA Routing Numbers) 440 Society for Worldwide Interbank Financial Organization 440 Value- Added Tax 441 BIN- Bank Identification Number 441 Location- Based Resources 443 Drug Financing Analysis Resources 446 Organized Crime Analysis Resources 448 Negative News String Searching 449 Chapter 11 Cryptocurrency 451 11.1 Overview of Cryptocurrency 451 The Basics of Cryptocurrency 453 How Is Cryptocurrency Used and Transferred? 453 What Is a Cryptocurrency Wallet? 454 What Is Blockchain? 455 Types of Cryptocurrencies 457 Coin and Token Quick Reference 457 Bitcoin 458 Ether 458 Binance 458 Tether 459 Solana 459 Dogecoin 459 Monero (XMR) 459 What Is Cryptocurrency Mining and Minting? 460 Types of Verification 461 Public Blockchains vs. Private Blockchains 463 Why Tracking Cryptocurrency Matters 463 Money Laundering 464 Fraud, Illegal Sales, and CSAM/CSEM 467 11.2 The Dark Web 471 Overview of the Dark Web 471 Darknet Marketplaces 473 11.3 Methods for Cryptocurrency Analysis 475 Where to Begin? 475 Starting with a Subject of Interest 476 Starting with a Wallet of Interest 478 Tracing Cash- Outs at the Exchange Point 481 Following Cryptocurrency Mining Scripts 483 Starting with a Transaction of Interest 485 Chapter 12 Non-fungible Tokens 489 12.1 Overview of Non-fungible Tokens 489 NFT Crimes 490 Ponzi Schemes and Rug Pulls 490 Fake NFTs 491 Get Rich Quick 491 Phishing 491 12.2 Methods for Analyzing NFTs 491 By Wallet Number or Address 491 By Image 494 What Is ENS? 496 Look for Metadata 497 Chapter 13 What’s Next? 499 13.1 Thank You for Diving In with Me 499 Important Reminders 500 Index 503
£27.99
John Wiley & Sons Inc Quantum Computing For Dummies
Book SynopsisTable of ContentsIntroduction 1 Part 1: The Power of Quantum Computing 7 Chapter 1: Quantum Computing Boot Camp 9 Chapter 2: Looking Back to Early and Classical Computing 27 Chapter 3: Examining the Roots of Quantum Computing 47 Chapter 4: Introducing Quantum Technology 1.0 69 Chapter 5: Unveiling Quantum Computing 83 Chapter 6: Quantum Computing Accelerates 99 Part 2: Quantum Computing Options 113 Chapter 7: Choosing Between Classical and Quantum Computing 115 Chapter 8: Getting Started with Quantum Computing 131 Chapter 9: It’s All about the Stack 153 Chapter 10: Racing for the Perfect Qubit 173 Chapter 11: Choosing a Qubit Type 187 Part 3: Getting Entangled with Quantum Computing 207 Chapter 12: Programming a Quantum Computer 209 Chapter 13: Quantum Computing Applications 237 Chapter 14: Quantum Computing Algorithms 255 Chapter 15: Cloud Access Options 281 Chapter 16: Educational Resources 305 Part 4: The Part of Tens 327 Chapter 17: Ten Myths Surrounding Quantum Computing 329 Chapter 18: Ten Tech Questions Answered 339 Chapter 19: Ten Business Questions Answered 347 Chapter 20: Ten University Research Programs 355 Index 361
£20.69
John Wiley & Sons Inc LTE SelfOrganizing Networks SON
Book SynopsisThis book focuses on the key functional areas of LTE Self-Organizing Networks (SON), first introducing LTE network scenarios, technologies, and general SON concepts, and on to the latest status of 3GPP standardization.Table of ContentsForeword xiii Preface xv List of Contributors xix Acknowledgements xxi List of Abbreviations xxiii 1. Introduction 1 1.1 Self-Organising Networks (SON) 3 1.2 The Transition from Conventional Network Operation to SON 6 1.2.1 Automation of the Network Rollout 9 1.2.2 Automation of Network Optimisation and Troubleshooting 10 1.2.3 SON Characteristics and Challenges 11 References 12 2. LTE Overview 13 2.1 Introduction to LTE and SAE 13 2.1.1 3GPP Structure, Timeline and LTE Specifications 14 2.1.2 LTE Requirements 16 2.1.3 System Architecture Overview 16 2.1.4 Evolved UTRAN 18 2.1.5 E-UTRAN Functional Elements 19 2.1.6 Evolved Packet Core 21 2.1.7 Voice over LTE (VoLTE) 24 2.1.8 LTE-Advanced 24 2.1.9 Network Management 30 2.2 LTE Radio Access Network Scenarios and Their Evolution 33 2.2.1 LTE Radio Coverage Scenario 33 2.2.2 LTE for Capacity Enhancement in Existing GERAN/UTRAN 34 2.2.3 Enhancing LTE Capacity, the Multi-Layer LTE 34 2.2.4 Data Offloading, LIPA-SIPTO 35 2.2.5 Multi-Radio Access Network Scenarios or non-GPP 36 References 37 3. Self-Organising Networks (SON) 39 3.1 Vision 39 3.2 NGMN Operator Use Cases and 3GPP SON Use Cases 42 3.2.1 Operational Use Cases 42 3.2.2 NGMN SON Use Cases and Requirements 47 3.2.3 SON Use Cases in 3GPP 50 3.3 Foundations for SON 52 3.3.1 Control Engineering: Feedback Loops 53 3.3.2 Autonomic Computing and Autonomic Management 55 3.3.3 SON Research Projects 57 3.4 Architecture 60 3.4.1 Use-Case Related Criteria 62 3.4.2 System-Level Criteria 64 3.5 Business Value 65 3.5.1 The Economics of eNB Sites 65 3.5.2 General Mode of Operation of SON 68 3.5.3 Installation and Planning 71 3.5.4 Network Optimisation 72 3.5.5 Fault Management 73 3.5.6 Conclusions 74 3.6 SON Operational and Technical Challenges 75 3.6.1 Transition of Operational Processes to SON 75 3.6.2 Technical (Engineering) Challenges 78 References 80 4. Self-Configuration (‘Plug-and-Play’) 81 4.1 Auto-Connectivity and -Commissioning 82 4.1.1 Preparation 85 4.1.2 Connectivity Setup, Site-Identification and Auto-Commissioning 87 4.1.3 LTE-A Relay Auto-Connectivity 93 4.1.4 Conclusions 100 4.2 Dynamic Radio Configuration 100 4.2.1 Generation of Initial Transmission Parameters 106 4.2.2 Physical Cell-ID Allocation 111 4.2.3 Automatic Neighbour Relationship Setup (ANR) 118 4.2.4 DRC Architecture 130 4.2.5 Conclusions 132 References 133 5. Self-Optimisation 135 5.1 Mobility Robustness Optimisation 136 5.1.1 Goals of MRO 136 5.1.2 Cell Changes and Interference Challenges 137 5.1.3 MRO Relevant Parameters 140 5.1.4 Causes for Mobility Problems 144 5.1.5 MRO Solutions 146 5.1.6 MRO Time Scales 151 5.1.7 MRO Performance 152 5.2 Mobility Load Balancing and Traffic Steering 157 5.2.1 Introduction to Traffic Steering 157 5.2.2 SON Policies for Mobility Load Balancing 159 5.2.3 A Theoretical View of Load Balancing 160 5.2.4 Standardised Features and Procedures to Direct UEs to the Desired Layer 166 5.2.5 Exemplary Results of MLB 182 5.2.6 Uplink Load Balancing 189 5.2.7 Interactions Between TS/MLB and MRO 190 5.3 Energy Saving 193 5.3.1 Introduction 193 5.3.2 Requirements 195 5.3.3 Energy Saving Management 195 5.3.4 eNB Overlaid Scenario 196 5.3.5 Capacity-Limited Network 198 5.3.6 Equipment/Local ES 200 5.3.7 Example Scenarios and Expected Gains 201 5.3.8 Summary 204 5.4 Coverage and Capacity Optimisation 204 5.4.1 CCO with Adaptive Antennas 205 5.4.2 Performance Analysis for Antenna Parameter Optimisation Based CCO 208 5.4.3 CCO with TX Power 216 5.5 RACH Optimisation 217 5.5.1 General 217 5.5.2 PRACH Configuration 218 5.5.3 RACH Configuration 219 5.5.4 RACH/PRACH Configuration Example 221 5.5.5 RA Performance 222 5.5.6 Self-Optimisation Framework 223 5.5.7 UE Reporting 223 5.5.8 Inter-eNB Communication 225 5.6 RRM and SON (Interference Coordination, P0 Optimisation) 226 5.6.1 Interference Coordination 226 5.6.2 P0 Optimisation 230 References 232 6. Self-Healing 235 6.1 Introduction 236 6.1.1 3GPP Use Cases 236 6.1.2 3GPP Self-Healing Process and its Management 237 6.1.3 Cell Degradation Management 238 6.2 Cell Degradation Detection 242 6.3 Cell Degradation Diagnosis and Prediction 248 6.3.1 Rule Based Systems 250 6.3.2 Bayesian Networks 251 6.3.3 Case Based Reasoning 253 6.3.4 Neural Networks 255 6.3.5 Active Measurements 256 6.3.6 Prediction 257 6.4 Cell Outage Compensation 259 6.4.1 Activation of Cell Outage Compensation 260 6.4.2 Means of Cell Outage Compensation 260 6.4.3 Interaction between Cell Outage Compensation and Self-Configuration Functions 263 References 264 7. Supporting Function: Minimisation of Drive Tests (MDT) 267 7.1 Introduction 267 7.1.1 General 267 7.1.2 History and Background 269 7.2 Relation to SON 272 7.3 Requirements 273 7.4 Use Cases 275 7.4.1 Operator Scenarios 276 7.4.2 Coverage Optimisation 277 7.4.3 Mobility Optimisation 281 7.4.4 Capacity Optimisation 281 7.4.5 Parameterisation for Common Channels 282 7.4.6 QoS Verification 282 7.5 Overall Architecture 283 7.6 Managing MDT 285 7.6.1 Subscriber and Equipment Trace 285 7.6.2 MDT Configuration Parameters 285 7.6.3 Subscription Based MDT 287 7.6.4 Area Based MDT 292 7.6.5 Supporting Functionality in the Management System 293 7.6.6 MDT Reporting 293 7.7 MDT Radio Interface Procedures 295 7.7.1 Immediate MDT 296 7.7.2 Logged MDT 298 7.7.3 RLF Reporting 303 7.7.4 Measurement Parameters 305 7.7.5 Location Information 308 7.8 Conclusion 309 References 310 8. SON for Core Networks 311 8.1 Introduction 311 8.2 SON for Packet Core Networks 311 8.2.1 Packet Core Element Auto-Configuration 311 8.2.2 Automatic Neighbour Relation 313 8.2.3 S1 Flex (MME Pooling) 314 8.2.4 Signalling Optimisation 315 8.2.5 Latency Optimisation 317 8.2.6 Fast Gateway Convergence with Bidirectional Forward Detection 318 8.2.7 Dynamic IP Pool Allocation 318 8.2.8 Energy Saving 319 8.3 SON for Voice Core Networks 319 8.3.1 Voice Over IP Quality Monitoring and Management 319 8.3.2 Resource Optimisation in Voice Core Network 320 References 321 9. SON Operation 322 9.1 SON Function Interactions 323 9.1.1 Spatial Characteristic 324 9.1.2 Temporal Characteristic 324 9.1.3 Categories of SON Conflicts 326 9.1.4 Network Parameters Related to SON Functions 329 9.1.5 Examples for Conflicts between SON Functions 330 9.2 Coordination of SON Functions 334 9.2.1 Basic Options for SON Coordination 334 9.2.2 Goals of SON Function Coordination 338 9.2.3 SON Coordination Function Concept 340 9.2.4 Coordination Schemes 346 9.2.5 Related Work 352 9.2.6 SON Function Coordination Example 352 9.3 Conclusions 355 References 356 10. SON for Heterogeneous Networks (HetNet) 357 10.1 Introduction 357 10.2 Standardisation and Network Architecture 359 10.2.1 Network Architecture for HetNet 361 10.3 Self-Configuration 362 10.3.1 Auto-Connectivity and -Commissioning 363 10.3.2 Automatic Site Identification and Hardware-to-Site Mapping 364 10.3.3 Automatic Neighbour Relations (ANR) 365 10.4 Self-Optimisation: Interference Management 365 10.4.1 Interference Characteristics in HetNet Scenarios 365 10.4.2 Basic Interference Management Techniques 366 10.4.3 Scenarios with Macro eNBs and Micro/Pico eNBs 369 10.4.4 Enhanced Time-Domain Interference Management: eICIC 370 10.4.5 Outlook on Further Interference Management Innovations 374 10.5 Self-Optimisation: Mobility Aspects; MRO and Traffic Steering 375 10.5.1 Mobility Robustness Optimisation 375 10.5.2 Multi-Layer Traffic Steering and Load Balancing 377 10.5.3 IEEE 802.11 (WiFi) Integration 378 References 378 11. Future Research Topics 379 11.1 Future Mobile Network Scenarios 379 11.1.1 Heterogeneous Networks 379 11.1.2 Cloud RAN 380 11.1.3 Requirements for Future OAM Systems 381 11.2 Cognitive Radio Networks (CRN) 381 11.2.1 From SON to CRN 381 11.2.2 Definitions 382 11.2.3 Framework 383 11.2.4 Artificial Intelligence 385 11.3 Applications 387 11.3.1 Self-Configuration 387 11.3.2 Self-Optimisation 387 11.3.3 Self-Healing 388 11.3.4 Operation 388 11.4 Conclusion 389 References 389 Index 391
£85.45
John Wiley & Sons Inc Communicating the User Experience
Book SynopsisA clear and focused guide to creating useful user experience documentation As web sites and applications become richer and more complex, the user experience (UX) becomes critical to their success.Table of ContentsAbout the Authors v Credits vi Authors' Acknowledgments viii Contents ix Introduction 1 A summary of the documents 2 Putting the documents into context 7 Enjoy yourselves! 8 CHAPTER 1: Personas 9 CHAPTER 2: Task Models 43 CHAPTER 3: User Journeys 77 CHAPTER 4: Content requirements 103 CHAPTER 5: Sitemaps 123 CHAPTER 6: Wireframes 159 CHAPTER 7: Usability Test Reports 263 CHAPTER 8: Funnel Diagrams 291 Index 323
£24.00
John Wiley & Sons Inc The Internet of Things
Book SynopsisAn all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use cases. This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors discuss the approach taken by service providers to interconnect the protocols and solve the challenge of massive scalability of machine-to-machine communication for mission-critical applications, based on the next generation machine-to-machine ETSI M2M architecture. The authors demonstrate, using the example of the smartgrid use case, how the next generation utilities, by interconnecting and activating our physical environment, will be able to deliver more enTrade Review“The technical content is accurate, timely, and up to date with respect to the state of the art in the field. The book is strongly recommended for engineers, academic researchers, and network operators dealing with the Internet of Things. For these readers, the book represents a valuable and authoritative source of information and reference.” (Computing Reviews, 1 March 2013)Table of ContentsList of Acronyms xv Introduction xxiii Part I M2M AREA NETWORK PHYSICAL LAYERS 1 IEEE 802.15.4 3 1.1 The IEEE 802 Committee Family of Protocols 3 1.2 The Physical Layer 3 1.2.1 Interferences with Other Technologies 5 1.2.2 Choice of a 802.15.4 Communication Channel, Energy Detection, Link Quality Information 7 1.2.3 Sending a Data Frame 8 1.3 The Media-Access Control Layer 8 1.3.1 802.15.4 Reduced Function and Full Function Devices, Coordinators, and the PAN Coordinator 9 1.3.2 Association 12 1.3.3 802.15.4 Addresses 13 1.3.4 802.15.4 Frame Format 13 1.3.5 Security 14 1.4 Uses of 802.15.4 16 1.5 The Future of 802.15.4: 802.15.4e and 802.15.4g 17 1.5.1 802.15.4e 17 1.5.2 802.15.4g 21 2 Powerline Communication for M2M Applications 23 2.1 Overview of PLC Technologies 23 2.2 PLC Landscape 23 2.2.1 The Historical Period (1950–2000) 24 2.2.2 After Year 2000: The Maturity of PLC 24 2.3 Powerline Communication: A Constrained Media 27 2.3.1 Powerline is a Difficult Channel 27 2.3.2 Regulation Limitations 27 2.3.3 Power Consumption 32 2.3.4 Lossy Network 33 2.3.5 Powerline is a Shared Media and Coexistence is not an Optional Feature 35 2.4 The Ideal PLC System for M2M 37 2.4.1 Openness and Availability 38 2.4.2 Range 38 2.4.3 Power Consumption 38 2.4.4 Data Rate 39 2.4.5 Robustness 39 2.4.6 EMC Regulatory Compliance 40 2.4.7 Coexistence 40 2.4.8 Security 40 2.4.9 Latency 40 2.4.10 Interoperability with M2M Wireless Services 40 2.5 Conclusion 40 References 41 Part II LEGACY M2M PROTOCOLS FOR SENSOR NETWORKS, BUILDING AUTOMATION AND HOME AUTOMATION 3 The BACnetTM Protocol 45 3.1 Standardization 45 3.1.1 United States 46 3.1.2 Europe 46 3.1.3 Interworking 46 3.2 Technology 46 3.2.1 Physical Layer 47 3.2.2 Link Layer 47 3.2.3 Network Layer 47 3.2.4 Transport and Session Layers 49 3.2.5 Presentation and Application Layers 49 3.3 BACnet Security 55 3.4 BACnet Over Web Services (Annex N, Annex H6) 55 3.4.1 The Generic WS Model 56 3.4.2 BACnet/WS Services 58 3.4.3 The Web Services Profile for BACnet Objects 59 3.4.4 Future Improvements 59 4 The LonWorks R Control Networking Platform 61 4.1 Standardization 61 4.1.1 United States of America 61 4.1.2 Europe 62 4.1.3 China 62 4.2 Technology 62 4.2.1 Physical Layer 63 4.2.2 Link Layer 64 4.2.3 Network Layer 65 4.2.4 Transport Layer 66 4.2.5 Session Layer 67 4.2.6 Presentation Layer 67 4.2.7 Application Layer 71 4.3 Web Services Interface for LonWorks Networks: Echelon SmartServer 72 4.4 A REST Interface for LonWorks 73 4.4.1 LonBridge REST Transactions 74 4.4.2 Requests 74 4.4.3 Responses 75 4.4.4 LonBridge REST Resources 75 5 ModBus 79 5.1 Introduction 79 5.2 ModBus Standardization 80 5.3 ModBus Message Framing and Transmission Modes 80 5.4 ModBus/TCP 81 6 KNX 83 6.1 The Konnex/KNX Association 83 6.2 Standardization 83 6.3 KNX Technology Overview 84 6.3.1 Physical Layer 84 6.3.2 Data Link and Routing Layers, Addressing 87 6.3.3 Transport Layer 89 6.3.4 Application Layer 89 6.3.5 KNX Devices, Functional Blocks and Interworking 89 6.4 Device Configuration 92 7 ZigBee 93 7.1 Development of the Standard 93 7.2 ZigBee Architecture 94 7.2.1 ZigBee and 802.15.4 94 7.2.2 ZigBee Protocol Layers 94 7.2.3 ZigBee Node Types 96 7.3 Association 96 7.3.1 Forming a Network 96 7.3.2 Joining a Parent Node in a Network Using 802.15.4 Association 97 7.3.3 Using NWK Rejoin 99 7.4 The ZigBee Network Layer 99 7.4.1 Short-Address Allocation 99 7.4.2 Network Layer Frame Format 100 7.4.3 Packet Forwarding 101 7.4.4 Routing Support Primitives 101 7.4.5 Routing Algorithms 102 7.5 The ZigBee APS Layer 105 7.5.1 Endpoints, Descriptors 106 7.5.2 The APS Frame 106 7.6 The ZigBee Device Object (ZDO) and the ZigBee Device Profile (ZDP) 109 7.6.1 ZDP Device and Service Discovery Services (Mandatory) 109 7.6.2 ZDP Network Management Services (Mandatory) 110 7.6.3 ZDP Binding Management Services (Optional) 111 7.6.4 Group Management 111 7.7 ZigBee Security 111 7.7.1 ZigBee and 802.15.4 Security 111 7.7.2 Key Types 113 7.7.3 The Trust Center 114 7.7.4 The ZDO Permissions Table 116 7.8 The ZigBee Cluster Library (ZCL) 116 7.8.1 Cluster 116 7.8.2 Attributes 117 7.8.3 Commands 117 7.8.4 ZCL Frame 117 7.9 ZigBee Application Profiles 119 7.9.1 The Home Automation (HA) Application Profile 119 7.9.2 ZigBee Smart Energy 1.0 (ZSE or AMI) 122 7.10 The ZigBee Gateway Specification for Network Devices 129 7.10.1 The ZGD 130 7.10.2 GRIP Binding 131 7.10.3 SOAP Binding 132 7.10.4 REST Binding 132 7.10.5 Example IPHA–ZGD Interaction Using the REST Binding 134 8 Z-Wave 139 8.1 History and Management of the Protocol 139 8.2 The Z-Wave Protocol 140 8.2.1 Overview 140 8.2.2 Z-Wave Node Types 140 8.2.3 RF and MAC Layers 142 8.2.4 Transfer Layer 143 8.2.5 Routing Layer 145 8.2.6 Application Layer 148 Part III LEGACY M2M PROTOCOLS FOR UTILITY METERING 9 M-Bus and Wireless M-Bus 155 9.1 Development of the Standard 155 9.2 M-Bus Architecture 156 9.2.1 Physical Layer 156 9.2.2 Link Layer 156 9.2.3 Network Layer 157 9.2.4 Application Layer 158 9.3 Wireless M-Bus 160 9.3.1 Physical Layer 160 9.3.2 Data-Link Layer 162 9.3.3 Application Layer 162 9.3.4 Security 163 10 The ANSI C12 Suite 165 10.1 Introduction 165 10.2 C12.19: The C12 Data Model 166 10.2.1 The Read and Write Minimum Services 167 10.2.2 Some Remarkable C12.19 Tables 167 10.3 C12.18: Basic Point-to-Point Communication Over an Optical Port 168 10.4 C12.21: An Extension of C12.18 for Modem Communication 169 10.4.1 Interactions with the Data-Link Layer 170 10.4.2 Modifications and Additions to C12.19 Tables 171 10.5 C12.22: C12.19 Tables Transport Over Any Networking Communication System 171 10.5.1 Reference Topology and Network Elements 171 10.5.2 C12.22 Node to C12.22 Network Communications 173 10.5.3 C12.22 Device to C12.22 Communication Module Interface 174 10.5.4 C12.19 Updates 176 10.6 Other Parts of ANSI C12 Protocol Suite 176 10.7 RFC 6142: C12.22 Transport Over an IP Network 176 10.8 REST-Based Interfaces to C12.19 177 11 DLMS/COSEM 179 11.1 DLMS Standardization 179 11.1.1 The DLMS UA 179 11.1.2 DLMS/COSEM, the Colored Books 179 11.1.3 DLMS Standardization in IEC 180 11.2 The COSEM Data Model 181 11.3 The Object Identification System (OBIS) 182 11.4 The DLMS/COSEM Interface Classes 184 11.4.1 Data-Storage ICs 185 11.4.2 Association ICs 185 11.4.3 Time- and Event-Bound ICs 186 11.4.4 Communication Setup Channel Objects 186 11.5 Accessing COSEM Interface Objects 186 11.5.1 The Application Association Concept 186 11.5.2 The DLMS/COSEM Communication Framework 187 11.5.3 The Data Communication Services of COSEM Application Layer 189 11.6 End-to-End Security in the DLMS/COSEM Approach 191 11.6.1 Access Control Security 191 11.6.2 Data-Transport Security 192 Part IV THE NEXT GENERATION: IP-BASED PROTOCOLS 12 6LoWPAN and RPL 195 12.1 Overview 195 12.2 What is 6LoWPAN? 6LoWPAN and RPL Standardization 195 12.3 Overview of the 6LoWPAN Adaptation Layer 196 12.3.1 Mesh Addressing Header 197 12.3.2 Fragment Header 198 12.3.3 IPv6 Compression Header 198 12.4 Context-Based Compression: IPHC 200 12.5 RPL 202 12.5.1 RPL Control Messages 204 12.5.2 Construction of the DODAG and Upward Routes 204 12.6 Downward Routes, Multicast Membership 206 12.7 Packet Routing 207 12.7.1 RPL Security 208 13 ZigBee Smart Energy 2.0 209 13.1 REST Overview 209 13.1.1 Uniform Interfaces, REST Resources and Resource Identifiers 209 13.1.2 REST Verbs 210 13.1.3 Other REST Constraints, and What is REST After All? 211 13.2 ZigBee SEP 2.0 Overview 212 13.2.1 ZigBee IP 213 13.2.2 ZigBee SEP 2.0 Resources 214 13.3 Function Sets and Device Types 217 13.3.1 Base Function Set 218 13.3.2 Group Enrollment 221 13.3.3 Meter 223 13.3.4 Pricing 223 13.3.5 Demand Response and Load Control Function Set 224 13.3.6 Distributed Energy Resources 227 13.3.7 Plug-In Electric Vehicle 227 13.3.8 Messaging 230 13.3.9 Registration 231 13.4 ZigBee SE 2.0 Security 232 13.4.1 Certificates 232 13.4.2 IP Level Security 232 13.4.3 Application-Level Security 235 14 The ETSI M2M Architecture 237 14.1 Introduction to ETSI TC M2M 237 14.2 System Architecture 238 14.2.1 High-Level Architecture 238 14.2.2 Reference Points 239 14.2.3 Service Capabilities 240 14.3 ETSI M2M SCL Resource Structure 242 14.3.1 SCL Resources 244 14.3.2 Application Resources 244 14.3.3 Access Right Resources 248 14.3.4 Container Resources 248 14.3.5 Group Resources 250 14.3.6 Subscription and Notification Channel Resources 251 14.4 ETSI M2M Interactions Overview 252 14.5 Security in the ETSI M2M Framework 252 14.5.1 Key Management 252 14.5.2 Access Lists 254 14.6 Interworking with Machine Area Networks 255 14.6.1 Mapping M2M Networks to ETSI M2M Resources 256 14.6.2 Interworking with ZigBee 1.0 257 14.6.3 Interworking with C.12 262 14.6.4 Interworking with DLMS/COSEM 264 14.7 Conclusion on ETSI M2M 266 Part V KEY APPLICATIONS OF THE INTERNET OF THINGS 15 The Smart Grid 271 15.1 Introduction 271 15.2 The Marginal Cost of Electricity: Base and Peak Production 272 15.3 Managing Demand: The Next Challenge of Electricity Operators . . . and Why M2M Will Become a Key Technology 273 15.4 Demand Response for Transmission System Operators (TSO) 274 15.4.1 Grid-Balancing Authorities: The TSOs 274 15.4.2 Power Shedding: Who Pays What? 276 15.4.3 Automated Demand Response 277 15.5 Case Study: RTE in France 277 15.5.1 The Public-Network Stabilization and Balancing Mechanisms in France 277 15.5.2 The Bidding Mechanisms of the Tertiary Adjustment Reserve 281 15.5.3 Who Pays for the Network-Balancing Costs? 283 15.6 The Opportunity of Smart Distributed Energy Management 285 15.6.1 Assessing the Potential of Residential and Small-Business Powerz Shedding (Heating/Cooling Control) 286 15.6.2 Analysis of a Typical Home 287 15.6.3 The Business Case 293 15.7 Demand Response: The Big Picture 300 15.7.1 From Network Balancing to Peak-Demand Suppression 300 15.7.2 Demand Response Beyond Heating Systems 304 15.8 Conclusion: The Business Case of Demand Response and Demand Shifting is a Key Driver for the Deployment of the Internet of Things 305 16 Electric Vehicle Charging 307 16.1 Charging Standards Overview 307 16.1.1 IEC Standards Related to EV Charging 310 16.1.2 SAE Standards 317 16.1.3 J2293 318 16.1.4 CAN – Bus 319 16.1.5 J2847: The New “Recommended Practice” for High-Level Communication Leveraging the ZigBee Smart Energy Profile 2.0 320 16.2 Use Cases 321 16.2.1 Basic Use Cases 321 16.2.2 A More Complex Use Case: Thermal Preconditioning of the Car 323 16.3 Conclusion 324 Appendix A Normal Aggregate Power Demand of a Set of Identical Heating Systems with Hysteresis 327 Appendix B Effect of a Decrease of Tref. The Danger of Correlation 329 Appendix C Changing Tref without Introducing Correlation 331 C.1 Effect of an Increase of Tref 331 Appendix D Lower Consumption, A Side Benefit of Power Shedding 333 Index 337
£72.86
Cengage Learning, Inc MCSA Guide to Microsoft SQL Server 2012 Exam
Book Synopsis
£216.90
Taylor & Francis The Psychology of Social Media
Book SynopsisAre we really being ourselves on social media? Can we benefit from connecting with people we barely know online? Why do some people overshare on social networking sites?The Psychology of Social Media explores how so much of our everyday lives is played out online, and how this can impact our identity, wellbeing and relationships. It looks at how our online profiles, connections, status updates and sharing of photographs can be a way to express ourselves and form connections, but also highlights the pitfalls of social media including privacy issues. From FOMO to fraping, and from subtweeting to selfies, The Psychology of Social Media shows how social media has developed a whole new world of communication, and for better or worse is likely to continue to be an essential part of how we understand our selves.Table of Contents1. Introduction 2. Profiles 3. Connections 4. Updates 5. Media 6. Messaging 7. Values
£12.99
Taylor & Francis Ltd 5G LTE Narrowband Internet of Things NBIoT
Book SynopsisThis book explains the 3GPP technical specifications for the upcoming 5G Internet of Things (IoT) technology based on latest release which is Release 15. It details the LTE protocol stack of an IoT device, architecture and framework, how they are functioning and communicate with cellular infrastructure, and supported features and capability. NB-IoT is designed to connect a large number of devices in a wide range of application domains forming so-called Internet of Things (IoT). Connected devices are to communicate through cellular infrastructure. This technology is new within the 3GPP specifications and is part of upcoming new wireless technology known as 5G.Table of ContentsPreface. Acknowledgments. Author. List of Abbreviations. 1. Internet of Things. 2. 4G and 5G Systems. 3. Radio Resource Control Sublayer. 4. Packet Data Convergence Protocol Sublayer. 5. Radio Link Control Sublayer. 6. Medium Access Control Sublayer. 7. Physical SublayerTable of ContentsPreface. Acknowledgments. Author. List of Abbreviations. 1. Internet of Things. 2. 4G and 5G Systems. 3. Radio Resource Control Sublayer. 4. Packet Data Convergence Protocol Sublayer. 5. Radio Link Control Sublayer. 6. Medium Access Control Sublayer. 7. Physical Sublayer. 8. Quality of Service Architecture. 9. Use Cases and Deployment. References. Index.
£74.09
Taylor & Francis Ltd Internet of Things for Things and by Things
Book SynopsisThis book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally enhanced environment in which people can live smarter. It describes the inherent technology of IoT, the architectural components and the philosophy behind this emerging technology. Then it shows the various potential applications of the Internet of Things that can bring benefits to the human society. Finally, it discusses various necessities to provide a secured and trustworthy IoT service.Table of ContentsPart 1: Internet "of" Things. 1. Internet of Things and Its Potential. 2. The IoT Technology. 3. IoT Architecture. 4. The Philosophy of Information in the IoT. Part 2: Internet "for" Things. 5. Potential Applications of IoT. 6. IoT and Smart Cities. Part 3: Internet "by" Things. 7. Internet as the Foundation for Things: IPv4, IPv6, and Related Concepts. 8. Net Neutrality and Its Impact on IoT. 9. IoT Security, Privacy and GRC Assurance. 10. Managing Shared Risk in Interdependent Systems of Smart Cities. Part 4: IoT GRC, Standards and Regulations. 11. Discussion on Leading Global GRC Frameworks Applicable for IoT Implementations, Regulations (GDPR etc.), Standards ( NIST, ISO, IEEE, IETF, ETSI, etc.) and Role of GRC Audits. 12. Global GRC Frameworks Applicable for IoT Implementations, Regulations, Standards, and Role of GRC Audits. Part 5: Human Dimension of IoT: 13. Developing Policies to Create a Smart "White Box Society." Appendixes.
£109.25
McGraw-Hill Education Hacking Exposed Industrial Control Systems ICS
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Secure your ICS and SCADA systems the battle-tested Hacking Exposedâ wayThis hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitatingâand potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration Table of ContentsPart 1: Setting the Stage: Putting ICS Penetration Testing in ContextCase Study 1: Recipe for DisasterChapter 1: Introduction to ICS [in] SecurityChapter 2: ICS Risk AssessmentChapter 3: ICS Threat Intelligence/Threat ModelingCase Study 2: The Emergence of a ThreatPart 2: Hacking Industrial Control SystemsCase Study 3: A Way InChapter 4: ICS Hacking (Penetration Testing) StrategiesChapter 5: Hacking Industrial ProtocolsChapter 6: Hacking ICS Devices and ApplicationsChapter 7: ICS "Zero Day" Vulnerability ResearchChapter 8: ICS MalwareCase Study 4: FootholdPart 3: Putting It All Together: ICS Risk MitigationCase Study 5: How Will it End?Chapter 9: ICS Cybersecurity Standards PrimerChapter 10: ICS Risk Mitigation and Countermeasure StrategiesPart 4: AppendicesAppendix A: Glossary of Acronyms and AbbreviationsAppendix B: Glossary of TerminologAppendix C: ICS Risk Assessment and Penetration Testing Methodology Template
£53.09
McGraw-Hill Education Mobile Forensic Investigations A Guide to
Book Synopsis Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Master the tools and techniques of mobile forensic investigations Conduct mobile forensic investigations that are legal, ethical, and highly effective using the detailed information contained in this practical guide. Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition fully explains the latest tools and methods along with features, examples, and real-world case studies. Find out how to assemble a mobile forensics lab, collect prosecutable evidence, uncover hidden files, and lock down the chain of custody. This comprehensive resource shows not only how to collect and analyze mobile device data buTable of ContentsChapter 1: Introduction to the World of Mobile Device ForensicsChapter 2: Mobile Devices vs. Computer Devices in the World of ForensicsChapter 3: New Era of Digital Devices (IoT, InfoTainment, Wearables, Drones)Chapter 4: Living in the Cloud, the Place to Hide and Store Mobile DataChapter 5: Collecting Mobile Devices, USB Drives, and Storage Media at the SceneChapter 6: Preparing, Protecting, and Seizing Digital Device EvidenceChapter 7: Toolbox Forensics: Multiple-Tool ApproachChapter 8: Mobile Forensic Tool OverviewChapter 9: Preparing the Environment for Your First CollectionChapter 10: Conducting a Collection of a Mobile Device: Considerations and ActionsChapter 11: Analyzing SIM CardsChapter 12: Analyzing Feature Phone, BlackBerry, and Windows Phone DataChapter 13: Advanced iOS AnalysisChapter 14: Querying SQLite and Taming the Forensic SnakeChapter 15: Advanced Android AnalysisChapter 16: Advanced Device Analysis (IoT, Wearables, Drones)Chapter 17: Presenting the Data as a Mobile Forensics Expert
£53.09
McGraw-Hill Education Build Your Own Cybersecurity Testing Lab Lowcost
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Manage your own robust, inexpensive cybersecurity testing environment This hands-on guide shows clearly how to administer an effective cybersecurity testing lab using affordable technologies and cloud resources. Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments fully explains multiple techniques for developing lab systems, including the use of Infrastructure-as-Code, meaning you can write programs to create your labs quickly, without manual steps that could lead to costly and frustrating mistakes. Written by a seasoned IT security professional and academic, this book offers complete coverage of cloud and virtual environments as well as physical networks and automation. In
£29.24
McGraw-Hill Education Loose Leaf for Data Communications and Networking
Book Synopsis
£136.60
McGraw-Hill Education Mike Meyers CompTIA Network Certification
Book SynopsisFully updated coverage of every topic on the latest version of the CompTIA Network+ examGet on the fast track to becoming CompTIA Network+ certified with this affordable, portable study tool. Inside, a certification training expert guides you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass the CompTIA Network+ Exam N10-008, this certification passport is your ticket to success on exam day.Inside: Practice questions and content review after each objective prepare you for exam mastery Exam Tips identify critical content to prepare for Enhanced coverage of networking fundamentals Enhanced coverage of network implementations and operations Enhanced coverage of network security and troubleshooting Covers all exam topics that verify you have the knowledge and skills required to: Establish network connectivit
£21.59
Microsoft Specialist Guide to Microsoft Windows
Book SynopsisPrepare for a career in network administration using Microsoft Windows 10 with the real-world examples and hands-on activities that reinforce key concepts in MICROSOFT SPECIALIST GUIDE TO MICROSOFT WINDOWS 10. This book also features troubleshooting tips for solutions to common problems that you will encounter in Windows 10 administration. This book's in-depth study focuses on all of the functions and features of installing, configuring, and maintaining Windows 10 as a client operating system. Activities let you experience first-hand the processes involved in Windows 10 configuration and management. Review Questions reinforce concepts and help you prepare for the Microsoft certification exam. Case Projects offer a real-world perspective on the concepts introduced in each chapter, helping you prepare for even the most challenging situations that must be managed in a live networking environment.Table of ContentsIntroduction to Windows 10. Installing Windows 10. Using System Utilities. Managing Disks and File Systems. User Management. Windows 10 Security Features. Networking. User Productivity Tools. Application Support. Disaster Recovery and Troubleshooting. Windows Intune. Hyper-V. Enterprise Computing. Remote Access. Appendix: Exam 70-697 Appendix: Objectives Mapping Grid Appendix: Cloud Computing.
£158.22
Pearson Education Computer Networks and Internets Global Edition
Book SynopsisTable of Contents Chapter 1 Introduction And Overview Chapter 2 Internet Trends Chapter 3 Internet Applications And Network Programming Chapter 4 Traditional Internet Applications Chapter 5 Overview Of Data Communications Chapter 6 Information Sources And Signals Chapter 7 Transmission Media Chapter 8 Reliability And Channel Coding Chapter 9 Transmission Modes Chapter 10 Modulation And Modems Chapter 11 Multiplexing And Demultiplexing (Channelization) Chapter 12 Access And Interconnection Technologies Chapter 13 Local Area Networks: Packets, Frames, And Topologies Chapter 14 The IEEE MAC Sublayer Chapter 15 Wired LAN Technology (Ethernet And 802.3) Chapter 16 Wireless Networking Technologies Chapter 17 Repeaters, Bridges, And Switches Chapter 18 WAN Technologies And Dynamic Routing Chapter 19 Networking Technologies Past And Present Chapter 20 Internetworking: Concepts, Architecture, And Protocols Chapter 21 IP: Internet Addressing Chapter 22 Datagram Forwarding Chapter 23 Support Protocols And Technologies Chapter 24 UDP: Datagram Transport Service Chapter 25 TCP: Reliable Transport Service Chapter 26 Internet Routing And Routing Protocols Chapter 27 Network Performance (QoS And DiffServ) Chapter 28 Multimedia And IP Telephony (VoIP) Chapter 29 Network Security Chapter 30 Network Management (SNMP) Chapter 31 Software Defined Networking (SDN) Chapter 32 The Internet Of Things Chapter 33 Trends In Networking Technologies And Uses Appendix 1 A Simplified Application Programming Interface
£75.04
Cengage Learning, Inc Lab Manual for Deans Network Guide to Networks
Book Synopsis
£112.29
Cengage Learning, Inc Guide to Parallel Operating Systems with WindowsÂ
Book SynopsisExamine two of the most prominent operating systems -- Windows 10 and Linux CentOS7 -- in parallel with the unique approach found only in GUIDE TO PARALLEL OPERATING SYSTEMS WITH WINDOWS 10 AND LINUX, 3E. Rather than using a compare and contrast model, the book presents each topic conceptually before demonstrating it simultaneously on both operating systems. You are able to switch instantly between Windows 10 and Linux CentOS 7 to complete the myriad of hands-on activities that reinforce the similarities between the two operating systems for each conceptual task. The text's virtualization approach provides flexibility that enables you to use Microsoft Hyper-V Client, Oracle VirtualBox, or VMWare Workstation. This comprehensive guide helps you develop the competencies you need in Windows 10 and Linux to maximize success in today's classroom as well as in tomorrow's business environment.Table of Contents1. Hardware Components. 2. Software Components. 3. Graphical User Interface. 4. Installing and Configuring Applications. 5. File Systems. 6. Directory Commands. 7. Files and File Attributes. 8. The Command Line. 9. Text Editors. 10. Scripting in Windows 10 and CentOS 7. 11. Local Network Access. 12. Operating System Management. Appendix A: Number Systems and Data Representation. Appendix B: Microsoft Hyper-V Virtualization. Appendix C: Oracle Virtual Box. Appendix D: VMWare Workstation.
£211.60
Cengage Learning, Inc Guide to TCPIP
Book SynopsisGuide to TCP/IP: IPv6 and IPv4 introduces students to the concepts, terminology, protocols, and services that the Transmission Control Protocol/Internet Protocol (TCP/IP) suite uses to make the Internet work. This text stimulates hands-on skills development by not only describing TCP/IP capabilities, but also by encouraging students to interact with protocols. It provides the troubleshooting knowledge and tools that network administrators and analysts need to keep their systems running smoothly. Guide to TCP/IP covers topics ranging from traffic analysis and characterization, to error detection, security analysis and more. Both IPv6 and IPv4 are covered in detail.Table of Contents1. Introducing TCP/IP. 2. IP Addressing and Related Topics. 3. Basic IP Packet Structures: Headers and Payloads. 4. Data Link and Network Layer Protocols in TCP/IP. 5. Internet Control Message Protocol. 6. Neighbors Discovery in IPv6. 7. IP Address Auto configuration. 8. Name Resolution on IP Networks. 9. TCP/IP Transport Layer Protocols. 10. Transitioning from IPv4 to IPv6: Interoperation. 11. Deploying IPv6. 12. Securing TCP/IP Environments. 13. [available in MindTap only]: Troubleshooting TCP/IP. 14. [available in MindTap only]: TCP/IP Best Practices and Practical Applications.
£209.03
MCSA Guide to Networking with Windows ServerÂ
Book SynopsisPacked with a wealth of hands-on activities, NETWORKING WITH WINDOWS SERVER 2016, EXAM 70-741 empowers you to successfully pass the MCSE/MCSA certification exam while also equipping you to successfully face the real challenges that you will encounter as a Microsoft networking professional. This engaging, full-color presentation emphasizes the key skills necessary to manage and configure a Windows Server 2016 network. Comprehensive coverage addresses TCP/IP configuration, including IPv6, DNS configuration, DHCP implementation and management, deploying remote access, configuring distributed network file services, and high performance network solutions. In addition, hands-on labs and meaningful case projects offer extensive opportunities for you to apply what you've learned in real practice.Table of Contents1. Configuring TCP/IP. 2. Configuring DNS Servers. 3. Configuring Advanced DNS. 4. Implementing DHCP. 5. Managing DNS and DHCP with IPAM. 6. Implementing Remote Access. 7. Implementing Network Policy Server. 8. Configuring Distributed File System and BranchOffice. 9. Implementing Advanced Network Solutions. Appendix A: MCSA Exam 70-741 Objectives. Appendix B: PowerShell Reference.
£62.69
Cengage Learning, Inc Linux and LPIC1 Guide to Linux Certification
Book SynopsisEckert's LINUX+ and LPIC-1 GUIDE TO LINUX CERTIFICATION, 5th Edition, empowers you with the knowledge and skills you need to succeed on CompTIA's Linux+ (XKO-004) certification exam and the Linux Professional Institute LPIC-1 (101-500 and 102-500) certification exams, as well as in your network administration career. The book covers the latest Linux distributions, virtualization, containerization and storage technologies. Comprehensive coverage also addresses key job-related networking and security services, including FTP, NFS, Samba, Apache, DNS, DHCP, NTP, Squid, Postfix, SSH, VNC, Spice, RDP, GPG, PostgreSQL and iptables/firewalld. Hands-on projects give you practice using both modern Linux distributions (Fedora 28 and Ubuntu Server 18.04) and industry's legacy Linux distributions. And with MindTap's live virtual machine labs, you can explore various solutions in a safe, sandbox environment using real Cisco hardware and virtualized Linux operating systems.Table of Contents1. Introduction to Linux��. 2. Linux�� Installation and Usage. 3. Exploring Linux�� Filesystems. 4. Linux�� Filesystem Management. 5. Linux�� Filesystem Administration. 6. Linux�� Server Deployment and Virtualization. 7. Working with the BASH Shell. 8. System Initialization and X Windows. 9. Managing Linux�� Processes. 10. Common Administrative Tasks. 11. Compression, System Backup and Software Installation. 12. Network Configuration. 13. Configuring Network Services. 14. Support, Performance, Security and Cloud Services. Appendix A: Certification. Appendix B: GNU Public License. Appendix C: Finding Linux Resources on the Internet. Appendix D: Supporting macOS. Appendix E: Configuring the Windows Subsystem for Linux.
£72.19
John Wiley & Sons Inc AWS Certified Advanced Networking Study Guide
Book SynopsisThe latest edition of the official study guide for the AWS Advanced Networking certification specialty exam The newly revised second edition of the AWS Certified Advanced Networking Study Guide: Specialty (ANS-C01) Exam delivers an expert review of Amazon Web Services Networking fundamentals as they relate to the ANS-C01 exam. You'll find detailed explanations of critical exam topics combined with real-world scenarios that will help you build the robust knowledge base you need for the testand to succeed in the field as an AWS Certified Networking specialist. Learn about the design, implementation and deployment of AWS cloud-based Networking solutions, core services implementation, AWS service architecture design and maintenance (including architectural best practices), monitoring, Hybrid networks, security, compliance, governance, and network automation. The book also offers one year of free access to Sybex's online interactive learning environment and expert stuTable of ContentsIntroduction xxvii Assessment Test xxxi Part I Network Design 1 Chapter 1 Edge Networking 3 Content Distribution Networking 4 CloudFront 4 CloudFront Implementation 6 Caching and Object Retention 6 Invalidations 8 Protocol Support 9 CloudFront Encryption Using SSL/TLS and SNI 10 CloudFront Security 11 Billing 12 Lambda@edge 13 Geo- restriction and Geolocation 13 Global Accelerator 15 Global Accelerator Architecture 17 Custom Routing Accelerator 18 AWS Global Accelerator Pricing 18 Elastic Load Balancers 19 Load Balancer Architectures 19 Listeners 19 Target Groups 20 Health Checking 20 Sticky Connections 20 Proxy Connections 21 Load Balancing Across Different Availability Zones 22 Connection Draining 22 AWS Load Balancer Offerings 23 Application Load Balancers 27 Gateway Load Balancers 29 Network Load Balancer 31 Classic Load Balancers 32 Configuring Elastic Load Balancers 32 API Gateway 33 Rest Api 33 Http Api 34 WebSocket Protocol 34 API Gateway Configuration 34 API Gateway Caching 35 Endpoint Types 35 Security 37 Authentication and Authorization 37 CloudFront Design Considerations 38 Summary 39 Exam Essentials 39 Exercises 40 Written Lab 41 Written Lab 1.1: Create an HTTP API by Using the AWS Management Console 41 Review Questions 42 Chapter 2 Domain Name Services 47 DNS and Route 53 48 DNS Overview 49 Architecture 50 DNS Hierarchy 50 Zones 51 DNS Resolution Process 51 Resource Records 52 Timers 54 Delegations 54 DNSSEC Overview 54 DNS Logging and Monitoring 55 CloudTrail 55 CloudWatch 57 Artificial Intelligence and Machine Learning 57 Redshift 58 Route 53 Advanced Features and Policies 58 Alias Records 58 Resolvers 59 Route 53 Resolver DNS Firewall 60 Health Checks 60 Traffic Routing Policies 61 Simple Routing 61 Multivalue Responses 63 Latency- Based Routing 63 Failover Routing 65 Round- Robin Routing 65 Weighted Routing 66 Geo location 67 Geo- proximity 68 Route 53 Service Integrations 68 Vpc 69 CloudFront 69 Load Balancers 69 Route 53 Application Recovery Controller 70 Hybrid Route 53 70 Multi- account Route 53 71 Multi-Region Route 53 72 Using Route 53 Public Hosted Zones 72 Using Route 53 Private Hosted Zones 73 Using Route 53 Resolver Endpoints in Hybrid and AWS Architectures 73 Using Route 53 for Global Traffic Management 74 Route 53 Failover 75 Domain Registration 75 Required Information to Register a Domain 76 Privacy Protection 78 Route 53 Registration Information 78 Renewing Your Domain 78 Summary 79 Exam Essentials 79 Exercises 80 Review Questions 82 Chapter 3 Hybrid and Multi- account DNS 87 Implementing Hybrid and Multi- account DNS Architectures 88 Route 53 Hosted Zones 88 Private Hosted Zones 89 Public Hosted Zones 89 Traffic Management 90 Latency 93 Geo location 94 Weighted 95 Failover 96 Multivalue 97 Health Checking 97 Domain Delegation and Forwarding 99 Delegating Domains 99 Forwarding Rules 100 Configuring Records in Route 53 100 A Record 101 AAAA Record 102 Cname 102 mx Record 104 SOA Record 104 TXT Record 106 PTR Record 106 Alias Record 106 SRV Record 107 SPF Record 107 NAPTR Record 109 CAA Record 109 Configuring DNSSEC 109 Multi- account Route 53 110 DNS Endpoints 111 Outbound Endpoints 112 Inbound Endpoints 113 Configuring Route 53 Monitoring and Logging 114 CloudTrail API Logging 115 CloudWatch Logging 116 DNS Query Logging 116 Resolver Query Logging 117 Hosted Zone Monitoring 117 Resolver Endpoints Monitoring 117 Domain Registration Monitoring 118 Summary 118 Exam Essentials 119 Written Labs 119 Written Lab 3.1: Configure Logging for DNS Queries 119 Written Lab 3.2: View DNS Query Metrics for a Public Hosted Zone in the CloudWatch Console 120 Review Questions 121 Elastic Load Balancing 128 Network Load Balancing 129 Application Load Balancing 130 Gateway Load Balancing 131 Classic Load Balancing 132 Network Design 132 High Availability 133 Security 133 ELB Connectivity Patterns 134 Internal Load Balancers 134 External Load Balancers 135 Autoscaling 136 AWS Service Integrations 136 Config 137 Global Accelerator 137 CloudFront 138 Traffic Mirroring 138 VPC Endpoint Services (PrivateLink) 139 Web Application Firewall 139 Route 53 139 Amazon Elastic Kubernetes Service 139 AWS Certificate Manager 140 ELB Configuration Options 141 Proxy Protocol 141 X- Forwarded- For Protocol 142 Cross- Zone Load Balancing 142 Session Affinity and Sticky Sessions 143 Target Groups 145 Routing 146 Target Types 146 IP Address Type 146 Protocol Version 146 Registered Targets 147 Routing Algorithms 147 Deregistration and Connection Draining 147 Deletion Protection 147 Health Checking 149 Slow Start 149 The GENEVE Protocol 149 Encryption and Authentication 151 SSL/TLS Offload 151 TLS Passthrough 151 Summary 152 Exam Essentials 153 Exercises 154 Written Labs 154 Written Lab 4.1: Create a Network Load Balancer 154 Written Lab 4.2: Use the Console to Enable Deletion Protection 155 Written Lab 4.3: Use the Console to Disable Deletion Protection 156 Written Lab 4.4: Enable Application- Based Stickiness 156 Review Questions 157 Chapter 5 Logging and Monitoring 163 CloudWatch 164 Metrics 164 Monitoring Categories 165 Agents 166 Logging 167 Alarms 168 Metric Insights 170 Dashboards 170 Transit Gateway Network Manager 171 VPC Reachability Analyzer 171 Access Logs 173 Elastic Load Balancing 174 Route 53 Logs 175 CloudFront Logs 175 CloudTrail Logs 175 X- Ray 176 X- Ray Traces 176 X- Ray Insights 177 Flow Logs 178 Baseline Network Performance 180 Inspector 180 Application Insights 181 Config 181 Summary 182 Exam Essentials 183 Written Labs 184 Written Lab 5.1: Enable CloudWatch Detailed Monitoring for an Instance That Has Already Been Enabled 184 Written Lab 5.2: Enable CloudWatch Logging from the Web Console 185 Written Lab 5.3: Enable CloudWatch Alarms from the Web Console 185 Written Lab 5.4: Create a VPC Reachability Analyzer from the Web Console 186 Review Questions 187 Part II Network Implementation 191 Chapter 6 Hybrid Networking 193 Hybrid Connectivity 194 OSI Layer 1 194 Optics 196 OSI Layer 2 197 VLANs 198 Link Aggregation 199 Jumbo Frames 200 Encapsulation and Encryption 200 Overlay and Underlay Networks 200 VxLan 201 Generic Routing Encapsulation 202 IPSec 203 Geneve 205 Routing Fundamentals 205 Static Routing 206 Dynamic Routing 206 The BGP Routing Protocol 206 Direct Connect 211 Direct Connect Gateway 217 Virtual Private Gateway 219 Site- to- Site VPN 220 VPN CloudHub 221 AWS Account Resource Sharing 222 Summary 222 Exam Essentials 223 Exercises 223 Written Labs 224 Written Lab 6.1: Simulate Creating a Direct Connection 224 Written Lab 6.2: Simulate Creating a Site- to- Site VPN Connection 224 Review Questions 226 Chapter 7 Connecting On- Premises Networks 231 On- Premises Network Connectivity 232 VPNs 232 VPN Security 232 Accelerated Site- to- Site VPN Connections 233 Layer 1 and Types of Hardware to Use 235 Direct Connect 235 Direct Connect Locations 235 Letter of Authorization Documents 236 Layer 2 and Layer 3 236 Switching 236 Routing 237 Gateways 238 Software- Defined Networking 239 Transit Gateway 241 PrivateLink 241 Resource Access Manager 241 Testing and Validating Connectivity Between Environments 243 Route Analyzer 243 Reachability Analyzer 243 ICMP ping 243 traceroute 245 Summary 246 Exam Essentials 247 Written Labs 248 Written Lab 7.1: Create a VPN Attachment on a Transit Gateway Using the Console 248 Written Lab 7.2: Perform a traceroute 250 Written Lab 7.3: Use ping 250 Review Questions 251 Chapter 8 Inter- VPC and Multi- account Networking 255 Networking Services of VPCs 256 VPC Sharing 256 VPC Peering 257 Multi- account VPC Sharing 260 PrivateLink 260 Hub- and- Spoke VPC Architectures 261 Transit Gateway 262 Transit Gateway Connect 265 transit VPCs 266 Wide- Area Networking 266 Software- Defined Wide Area Networking 267 Multi Protocol Label Switching 268 Expanding AWS Networking Connectivity 270 Organizations 271 Resource Access Manager 273 Authentication and Authorization 274 Security Association Markup Language 275 Active Directory 275 Summary 278 Exam Essentials 279 Exercises 280 Review Questions 281 Chapter 9 Hybrid Network Routing and Connectivity 287 Industry- Standard Routing Protocols Used in AWS Hybrid Networks 288 Optimizing Routing 288 Optimizing Dynamic Routing 289 Optimizing Static Routing 290 Route Priorities and Administrative Distance 290 Route Summarization 291 Route Propagation 292 Overlapping Routes 292 BGP Over Direct Connect 294 Connectivity Methods for AWS and Hybrid Networks 294 Direct Connect and Direct Connect Gateway 295 Direct Connect Virtual Interfaces 295 Site- to- Site VPN 296 App Mesh 296 AWS Networking Limits and Quotas 297 Available Private and Public Access Methods for Custom Services 304 PrivateLink 305 VPC Peering 305 Available Inter- Regional and Intra- Regional Communication Patterns 306 Summary 307 Exam Essentials 307 Written Lab 308 Written Lab 9.1: Enable Route Propagation in a VPC 308 Exercises 308 Review Questions 309 Part III Network Management and Operations 315 Chapter 10 Network Automation 317 Network Automation 318 Infrastructure as Code 318 AWS Cloud Development Kit 319 AWS CloudFormation 320 EventBridge 322 AWS Command- Line Interface 322 AWS Software Development Kit 323 Application Programming Interfaces 326 Integrating Network Automation Using Infrastructure as Code 327 Event- Driven Network Automation 328 Automating the Process of Optimizing Cloud Network Resources with IaC 329 Common Problems When Using Hard- Coded Instructions in IaC Templates 330 Creating and Managing Repeatable Network Configurations 330 Integrating Event- Driven Networking Functions 331 Integrating Hybrid Network Automation Options with AWS Native IaC 332 Eliminating Risk and Achieving Efficiency in a Cloud Networking Environment 333 Summary 334 Exam Essentials 335 Exercises 336 Review Questions 337 Chapter 11 Monitor, Analyze, and Optimize Network Traffic 341 Monitoring, Analyzing, and Optimizing AWS Networks 342 Monitor and Analyze Network Traffic to Troubleshoot and Optimize Connectivity Patterns 342 Network Performance Metrics and Reachability Constraints 344 Appropriate Logs and Metrics to Assess Network Performance and Reachability Issues 345 AWS Tools to Collect and Analyze Logs and Metrics 345 AWS Tools to Analyze Routing Patterns and Issues 346 Analyzing Logging Output to Assess Network Performance and Troubleshoot Connectivity 347 Network Topology Mapping 348 Analyzing Packets to Identify Issues 349 Using the Reachability Analyzer for Troubleshooting, Validating, and Automating Connectivity Issues 350 Optimize AWS Networks for Performance, Reliability, and Cost- Effectiveness 351 VPC Peering vs. Transit Gateways 351 Reducing Bandwidth Utilization with Multicast 352 Implementing Multicast Capability Within a VPC and On- Premises Environments 352 Optimizing Route 53 354 Frame Size Optimization Across Different Connection Types 355 Jumbo Frame Support Across Different Connection Types 356 Optimizing Network Throughput 357 Selecting a Network Interface for Best Performance 357 Select Network Connectivity Services That Meet Requirements 358 VPC Subnet Optimization 359 Updating and Optimizing Subnets to Prevent the Depletion of Available IP Addresses in a VPC 360 Updating and Optimizing Subnets for Autoscaling 361 Optimizing Network Performance and Availability Using Caching and Compression 361 Summary 363 Exam Essentials 365 Written Labs 367 Written Lab 11.1: Create a VPC Flow Log 367 Written Lab 11.2: Add a New Subnet to a VPC 367 Written Lab 11.3: Change the MTU on a Linux EC 2 Interface 368 Exercises 368 Review Questions 370 Part IV Network Security, Compliance, and Governance 375 Chapter 12 Security, Compliance and Governance 377 Security, Compliance, and Governance 378 Threat Models 380 Common Security Threats 384 Securing Application Flows 385 Network Architectures That Meet Security and Compliance Requirements 386 Securing Inbound Traffic Flows 388 Web Application Firewall 388 Network Firewall 389 Shield 390 Security Groups 391 Network Access Control Lists 391 Securing Outbound Traffic Flows 392 Network Firewall 393 Proxies 393 Gateway Load Balancers 394 Route 53 Resolvers 394 Virtual Private Networks 395 VPC Endpoint Services: PrivateLink 395 Securing Inter- VPC Traffic 396 Network ACLs 396 VPC Endpoint Policies 396 Security Groups 396 Transit Gateway 397 VPC Peering 397 Implementing an AWS Network Architecture to Meet Security and Compliance Requirements 397 Untrusted Networks 397 Perimeter VPC 398 Three- Tier Architecture 399 Hub- and- Spoke Architecture 399 Develop a Threat Model and Identify Mitigation Strategies 399 Compliance Testing 401 Automating Security Incident Reporting and Alerting 402 Summary 403 Exam Essentials 407 Exercises 408 Written Labs 409 Written Lab 12.1: Download an Artifact Report 409 Written Lab 12.2: Request a Public SSL/TLS Certificate from the AWS Console 409 Written Lab 12.3: Review a Security Group Configuration from the AWS Console 410 Review Questions 411 Chapter 13 Network Monitoring and Logging 417 Network Monitoring and Logging Services in AWS 418 AWS CloudTrail 419 VPC Traffic Mirroring 420 VPC Flow Logs 421 Transit Gateway Logging 423 Alerting Mechanisms 426 CloudWatch Alarms 426 Simple Notification Service 427 Log Creation with Different AWS Services 428 Load Balancer Access Logs 429 CloudFront Access Logs 430 Log Delivery Mechanisms 431 Kinesis 432 Route 53 433 CloudWatch 434 Mechanisms to Audit Network Security Configurations 435 Security Groups 436 Firewall Manager 437 Trusted Advisor 437 Traffic Mirroring and Flow Logs 438 Creating and Analyzing VPC Flow Logs 439 Creating and Analyzing Network Traffic Mirroring 441 CloudWatch 441 Implementing Automated Alarms Using CloudWatch 442 Implementing Customized Metrics Using CloudWatch 443 Correlating and Analyzing Information Across Single or Multiple AWS Log Sources 444 Implementing Log Delivery Solutions 445 Implementing a Network Audit Strategy 446 Summary 447 Exam Essentials 448 Exercises 450 Review Questions 452 Chapter 14 Confidentiality and Encryption 457 Confidentiality and Encryption 458 Network Encryption Options Available on AWS 459 VPN Connectivity Over Direct Connect 460 Encryption Methods for Data in Transit 461 Network Encryption and the AWS Shared Responsibility Model 462 Security Methods for DNS Communications 464 Implementing Network Encryption Methods to Meet Application Compliance Requirements 465 IPSec 466 Tls 468 Implementing Encryption Solutions to Secure Data in Transit 470 CloudFront 471 Application Load Balancers and Network Load Balancers 472 Securing AWS Managed Databases 472 Securing Amazon S3 Buckets 475 Securing EC2 Instances 476 Transit Gateway 477 Certificate Management Using a Certificate Authority 479 AWS Certificate Manager and Private Certificate Authority 480 Summary 481 Exam Essentials 483 Exercises 484 Review Questions 485 Appendix Answers to Review Questions 491 Chapter 1: Edge Networking 492 Chapter 2: Domain Name Services 494 Chapter 3: Hybrid and Multi- account DNS 497 Chapter 4: Load Balancing 499 Chapter 5: Logging and Monitoring 502 Chapter 6: Hybrid Networking 505 Chapter 7: Connecting On- Premises Networks 507 Chapter 8: Inter- VPC and Multi- account Networking 509 Chapter 9: Hybrid Network Routing and Connectivity 512 Chapter 10: Network Automation 515 Chapter 11: Monitor, Analyze, and Optimize Network Traffic 518 Chapter 12: Security, Compliance and Governance 520 Chapter 13: Network Monitoring and Logging 524 Chapter 14: Confidentiality and Encryption 527 Index 531
£47.50
John Wiley & Sons Inc Pen Testing from Contract to Report
Book SynopsisProtect your system or web application with this accessible guide Penetration tests, also known as pen tests', are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications. Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions. In Pen Testing frTable of ContentsForeword viii Preface ix Acknowledgement x List of Abbreviations xi Companion Website xiii 1 Introduction to Penetration Testing 1 2 The Contract 19 3 Law and Legislation 39 4 Footprinting and Reconnaissance 53 5 Scanning Networks 81 6 Enumeration 111 7 Vulnerability Analysis 137 8 System Hacking 183 9 Malware Threats 239 10 Sniffing 265 11 Social Engineering 283 12 Denial of Service 315 13 Session Hijacking 343 14 Evading IDS, Firewalls, and Honeypots 363 15 Web Servers 389 16 Web Application Hacking 413 17 SQL Injection 481 18 Hacking Wireless Networks 517 19 Mobile Platforms 549 20 Internet of Things (IoT) 581 21 Cloud Computing 601 22 The Report 623 Index 639
£67.46
John Wiley & Sons Inc Virtualization Essentials
Book SynopsisLearn the fundamental concepts and skills by building your own virtual machine Virtualization is more important than ever, it''s how the Cloud works! As virtualization continues to expand, millions of companies all over the world are leveraging virtualization. IT professionals need a solid understanding of virtualization concepts and software to compete in today''s job market. The updated new edition of Virtualization Essentials teaches you the core concepts and skills necessary to work with virtualization environments. Designed for new and aspiring IT professionals alike, this practical guide offers an applied, real-world approach to help you develop the necessary skill set to work in Cloud computing, the DevOps space, and the rest of the virtual world. Virtualization Essentials simplifies complex concepts to ensure that you fully understand what virtualization is and how it works within the computing environment. Step by step, you'll learn how to builTable of ContentsIntroduction xv Chapter 1 Understanding Virtualization 1 Describing Virtualization 1 Microsoft Windows Drives Server Growth 3 Explaining Moore’s Law 7 Understanding the Importance of Virtualization 10 Examining Today’s Trends 12 Virtualization and Cloud Computing 15 Hyperconverged Infrastructure 16 Understanding Virtualization Software Operation 17 Virtualizing Servers 17 Virtualizing Desktops 18 Virtualizing Applications 19 Chapter 2 Understanding Hypervisors 23 Describing a Hypervisor 23 Exploring the History of Hypervisors 24 Understanding Type 1 Hypervisors 25 Understanding Type 2 Hypervisors 27 Understanding the Role of a Hypervisor 28 Holodecks and Traffic Cops 28 Resource Allocation 30 Comparing Today’s Hypervisors 31 VMware ESX 31 Citrix Hypervisor (Xen) 33 Microsoft Hyper- V 35 Other Solutions 36 Chapter 3 Understanding Virtual Machines 39 Describing a Virtual Machine 39 Examining CPUs in a Virtual Machine 42 Examining Memory in a Virtual Machine 43 Examining Network Resources in a Virtual Machine 44 Examining Storage in a Virtual Machine 45 Understanding How a Virtual Machine Works 47 Working with Virtual Machines 49 Understanding Virtual Machine Clones 50 Understanding Templates 51 Understanding Snapshots 52 Understanding OVF 53 Understanding Containers 54 Chapter 4 Creating a Virtual Machine 57 Performing P2V Conversions 57 Investigating the Physical- to- Virtual Process 58 Hot and Cold Cloning 59 Loading Your Environment 60 Loading VMware Workstation Player 61 Exploring VMware Workstation Player 66 Loading VirtualBox 70 Building a New Virtual Machine 75 Thinking About VM Configuration 76 Creating a First VM 77 Chapter 5 Installing Windows on a Virtual Machine 83 Loading Windows into a Virtual Machine 83 Installing Windows 11 84 Installing VMware Tools 97 Understanding Configuration Options 102 Optimizing a New Virtual Machine 107 Chapter 6 Installing Linux on a Virtual Machine 111 Loading Linux into a Virtual Machine 111 Exploring Oracle VM VirtualBox 112 Installing Linux into a Virtual Machine 115 Installing VirtualBox Guest Additions 126 Understanding Configuration Options 129 Optimizing a New Linux Virtual Machine 135 Chapter 7 Managing CPUs for a Virtual Machine 139 Understanding CPU Virtualization 139 Configuring VM CPU Options 143 Tuning Practices for VM CPUs 145 Choosing Multiple vCPUs vs a Single vCPU 145 Hyperthreading 146 Working with Intel and AMD Servers 147 Chapter 8 Managing Memory for a Virtual Machine 151 Understanding Memory Virtualization 151 Configuring VM Memory Options 154 Tuning Practices for VM Memory 156 Calculating Memory Overhead 157 Memory Optimizations 158 Chapter 9 Managing Storage for a Virtual Machine 165 Understanding Storage Virtualization 165 Configuring VM Storage Options 171 Tuning VM Storage 179 Chapter 10 Managing Networking for a Virtual Machine 187 Understanding Network Virtualization 187 Configuring VM Network Options 198 Tuning Practices for Virtual Networks 203 Chapter 11 Copying a Virtual Machine 207 Cloning a Virtual Machine 207 Working with Templates 217 Saving a Virtual Machine State 221 Creating a Snapshot 224 Merging Snapshots 228 Chapter 12 Managing Additional Devices in Virtual Machines 231 Using Virtual Machine Tools 231 Understanding Virtual Devices 234 Configuring a CD/DVD Drive 234 Configuring a Floppy Disk Drive 235 Configuring a Sound Card 239 Configuring USB Devices 240 Configuring Graphic Displays 242 Configuring Other Devices 243 Chapter 13 Understanding Availability 249 Increasing Availability 249 Protecting a Virtual Machine 252 Protecting Multiple Virtual Machines 256 Protecting Data Centers 261 Chapter 14 Understanding Applications in a Virtual Machine 265 Examining Virtual Infrastructure Performance Capabilities 265 Deploying Applications in a Virtual Environment 270 Understanding Virtual Appliances and vApps 279 Open Stack and Containers 281 Cloud and the Future of Virtualization 282 Appendix: Answers to Additional Exercises 285 Glossary 295 Index 301
£27.99
John Wiley & Sons Inc CCST Cisco Certified Support Technician Study
Book SynopsisThe ideal prep guide for earning your CCST Cybersecurity certification CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam is the perfect way to study for your certification as you prepare to start or upskill your IT career. Written by industry expert and Cisco guru Todd Lammle, this Sybex Study Guide uses the trusted Sybex approach, providing 100% coverage of CCST Cybersecurity exam objectives. You'll find detailed information and examples for must-know Cisco cybersecurity topics, as well as practical insights drawn from real-world scenarios. This study guide provides authoritative coverage of key exam topics, including essential security principles, basic network security concepts, endpoint security concepts, vulnerability assessment and risk management, and incident handling. You also get one year of FREE access to a robust set of online learning tools, including a test bank with hundreds of questions, a practice exam, a set of flashcards,
£36.09
John Wiley & Sons Inc CCSP For Dummies 2E 2 Practice Tests 100
Book SynopsisGet CCSP certified and elevate your career into the world of cloud security CCSP For Dummies is a valuable resource for anyone seeking to gain their Certified Cloud Security Professional (CCSP) certification and advance their cloud security career. This book offers a thorough review of subject knowledge in all six domains, with real-world examples and scenarios, so you can be sure that you're heading into test day with the most current understanding of cloud security. You'll also get tips on setting up a study plan and getting ready for exam day, along with digital flashcards and access to two updated online practice tests. . Review all content covered on the CCSP exam with clear explanations Prepare for test day with expert test-taking strategies, practice tests, and digital flashcardsGet the certification you need to launch a lucrative career in cloud securitySet up a study plan so you can comfortably work your way through all subject matter before test dayThis Dummies study guide is excellent for anyone taking the CCSP exam for the first time, as well as those who need to brush up on their skills to renew their credentials.Table of ContentsIntroduction 1 Part 1: Starting Your CCSP Journey 7 Chapter 1: Familiarizing Yourself with (ISC) 2 and the CCSP Certification 9 Chapter 2: Identifying Information Security Fundamentals 25 Part 2: Exploring the CCSP Certification Domains 45 Chapter 3: Domain 1: Cloud Concepts, Architecture, and Design, Part 1 47 Chapter 4: Domain 1: Cloud Concepts, Architecture, and Design, Part 2 73 Chapter 5: Domain 2: Cloud Data Security, Part 1 105 Chapter 6: Domain 2: Cloud Data Security, Part 2 125 Chapter 7: Domain 3: Cloud Platform and Infrastructure Security, Part 1 147 Chapter 8: Domain 3: Cloud Platform and Infrastructure Security, Part 2 173 Chapter 9: Domain 4: Cloud Application Security, Part 1 195 Chapter 10: Domain 4: Cloud Application Security, Part 2 223 Chapter 11: Domain 5: Cloud Security Operations, Part 1 243 Chapter 12: Domain 5: Cloud Security Operations, Part 2 273 Chapter 13: Domain 6: Legal, Risk, and Compliance, Part 1 289 Chapter 14: Domain 6: Legal, Risk and Compliance, Part 2 307 Part 3: The Part of Tens 335 Chapter 15: Ten (or So) Tips to Help You Prepare for the CCSP Exam 337 Chapter 16: Ten Keys to Success on Exam Day 343 Part 4: Appendixes 347 Appendix A: Glossary 349 Appendix B: Helpful Resources 369 Index 373
£27.99
John Wiley & Sons Inc CCNA Certification Study Guide Volume 1
Book SynopsisYour comprehensive guide to succeeding on the UPDATED CCNA Certification exam In the newly revised second edition of the CCNA Certification Study Guide Volume 1: Exam 200-301 v1.1, celebrated Cisco educator and network guru Todd Lammle and expert Donald Robb deliver an intuitive and efficient roadmap to the challenging CCNA Certification test. The updated Study Guide covers many topics, including network fundamentals and access, IP connectivity and services, security fundamentals, automation, programmability, artificial intelligence, and more. The CCNA Certification Study Guide comes with complementary access to a robust set of online study tools designed to assess and advance your exam readiness. You'll find: Up-to-date information relevant to the latest Cisco technologies and job rolesAn interactive online test bank, including hundreds of practice test questions, flashcards, and a glossary of key terms and definitionsDiscussions of everything from VLANs and Inter-VLAN Routing to switching, OSPF, IP routing, and more Perfect for anyone preparing to pursue the updated CCNA Certification, the CCNA Certification Study Guide Volume 1: Exam 200-301 v1.1, Second Editon, is a must-read for practicing IT professionals looking for a refresher on Cisco networking fundamentals.
£38.00
John Wiley & Sons Inc Fighting Phishing
Book SynopsisKeep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world''s number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them Educate yourself and other users on how
£18.69
John Wiley & Sons Inc ISC2 CISSP Certified Information Systems Security
Book Synopsis
£30.39
Wiley The Reign of Botnets
Book SynopsisA top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves. The author uses plain language to lift the veil on bots and fraud, making a topic critical to your website''s security easy to understand and even easier to implement. You''ll learn how attackers think, what motivates them, how their strategies have evolved over time, and how website owners have changed their own behaviors to keep up with their adversaries. You''ll also discover how you can best respond to patterns and incidents that pose a threat to your site, your business, and your customers. The book includes: A description of common bot detection techniques exploring the diffe
£24.79
John Wiley & Sons Networking AllinOne For Dummies
Book Synopsis
£28.49
John Wiley & Sons Inc Security Engineering and Tobias on Locks TwoBook
Book SynopsisA value-packed two-book set that combines the best of engineering dependable and secure software systems with the best in-depth look at physical lock security and insecurity In Security Engineering: A Guide to Building Dependable Distributed Systems, Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. Now the latest edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and
£90.00
John Wiley & Sons Inc CCNA Certification Study Guide Volume 2
Book SynopsisCisco expert Todd Lammle prepares you for the UPDATED Cisco CCNA certification Exam 200-301! Cisco, the world leader in network technologies, has released the UPDATED Cisco Certified Network Associate (CCNA) exam. This consolidated certification exam tests your ability to implement and administer a wide range of modern IT networking technologies. TheCCNA Certification Study Guide Volume 2: Exam 200-301, Second Edition,covers every exam objective, including network components, IP connectivity and routing, network security, virtual networking, and much more. Clear and accurate chapters provide you with real-world examples, hands-on activities, in-depth explanations, and numerous review questions to ensure that you're fully prepared on exam day. Written by the leading expert on Cisco technologies and certifications, this comprehensive exam guide includes access to the acclaimed Sybex online learning systeman interactive environment featuring practice exams,
£38.00
Sybex CCNA Certification Study Guide Volume 1 and
Book SynopsisA two-volume Study Guide set to help you prepare for success on the UPDATED Cisco CCNA Certification Exam 200-301 v1.1. Get certified and advance your technical career. To earn a Cisco Certified Network Associate (CCNA) certification, you only need to pass one exam that validates your knowledge and skills related to everything from networking to automation. This inclusive, two-book set provides what you need to know to succeed on the UPDATED CCNA Exam 200-301 v1.1. The set includesCCNA Certification Study Guide Volume 1, Second Edition, and CCNA Certification Study Guide Volume 2, Second Edition. Both Study Guidesprovide comprehensive information and foundational knowledge about core Cisco technologies, helping you implement and administer Cisco solutions. Volumes 1 and 2 prepare you to take and pass the UPDATED CCNA certification Exam 200-301 v1.1, which assesses your abilities related to network fundamentals. Both books cover a range of topics so you can get ready for the exam and apply your technical knowledge. Prepare for testing on network and security fundamentalsReview network access conceptsSolidify your knowledge related to IP connectivity and servicesAssess your automation and programmability skills Written by a Cisco expert, Todd Lammle, this 2-volume Study Guide set helps you master the concepts you need to succeed as a networking administrator. It also connects you to online interactive learning tools, including sample questions, a pre-assessment, practice exam, flashcards, and a glossary. If you want to earn the new CCNA certification and keep moving forward in your IT career, this book and study guide are for you.
£56.25
John Wiley & Sons Cybersecurity For Dummies
Book Synopsis
£18.39
John Wiley & Sons Hacking For Dummies
£18.39
John Wiley & Sons Preventing Bluetooth and Wireless Attacks in IoMT
Book Synopsis
£37.05
John Wiley & Sons Grey Area Dark Web Data Collection and the Future of OSINT
£30.39
Cengage Learning Guide to UNIX Using Linux Fourth Edition
Book SynopsisWritten with a clear, straightforward writing style and packed with step-by-step projects for direct, hands-on learning, Guide to UNIX Using Linux, 4E is the perfect resource for learning UNIX and Linux from the ground up. Through the use of practical examples, end-of-chapter reviews, and interactive exercises, novice users are transformed into confident UNIX/Linux users who can employ utilities, master files, manage and query data, create scripts, access a network or the Internet, and navigate popular user interfaces and software. The updated 4th edition incorporates coverage of the latest versions of UNIX and Linux, including new versions of Red Hat, Fedora, SUSE, and Ubuntu Linux. A new chapter has also been added to cover basic networking utilities, and several other chapters have been expanded to include additional information on the KDE and GNOME desktops, as well as coverage of the popular OpenOffice.org office suite. With a strong focus on universal UNIX and Linux commands that are transferable to all versions of Linux, this book is a "must-have" for anyone seeking to develop their knowledge of these systems.
£259.30
Taylor & Francis Ltd Broadband Mobile Multimedia
Book SynopsisMultimedia service provisioning is believed to be one of the prerequisites to guarantee the success of next-generation wireless networks. Examining the role of multimedia in state-of-the-art wireless systems and networks, Broadband Mobile Multimedia: Techniques and Applications presents a collection of introductory concepts, fundamental techniques, the latest advances, and open issues in this important area. Divided into four sections, the volume begins with an introduction to various broadband wireless multimedia systems. Using video as an application example, it then focuses on the routing and cross-layer design issue of multimedia communication over multihop wireless ad hoc and sensor networks. The next section discusses issues related to multimedia communications over WLANsa dominant part of today's broadband wireless access networks. The book concludes with recent developments in quality-of-service (QoS) provisioning mechanisms and other enabling technologies, includiTable of ContentsMultimedia Systems. Multimedia over Ad Hoc and Sensor Networks. Multimedia over Wireless Local Area Networks. Quality of Service and Enabling Technologies. Index.
£114.00
Taylor & Francis Inc BioInspired Computing and Networking
Book SynopsisSeeking new methods to satisfy increasing communication demands, researchers continue to find inspiration from the complex systems found in nature. From ant-inspired allocation to a swarm algorithm derived from honeybees, Bio-Inspired Computing and Networking explains how the study of biological systems can significantly improve computing, networking, and robotics. Containing contributions from leading researchers from around the world, the book investigates the fundamental aspects and applications of bio-inspired computing and networking. Presenting the latest advances in bio-inspired communication, computing, networking, clustering, optimization, and robotics, the book considers state-of-the-art approaches, novel technologies, and experimental studies, including bio-inspired: Optimization of dynamic NP-hard problems Top-down controller design for distributing a robot swarm among multiple tasks Self-organTable of ContentsAnimal Behaviors and Animal Communications. Animal Models for Computing and Communications: Past Approaches and Future Challenges. Social Behaviors of the California Sea Lion, Bottlenose Dolphin, and Orca Whale. Bio-Inspired Computing and Robots. Social Insect Societies for the Optimization of Dynamic NP-Hard Problems. Bio-Inspired Locomotion Control of the Hexapod Robot Gregor III. BEECLUST: A Swarm Algorithm Derived from Honeybees: Derivation of the Algorithm, Analysis by Mathematical Models, and Implementation on a Robot Swarm. Self-Organizing Data and Signals Cellular Systems. Bio-Inspired Process Control. Multirobot Search Using Bio-Inspired Cooperation and Communication Paradigms. Abstractions for Planning and Control of Robotic Swarms. Ant-Inspired Allocation: Top-Down Controller Design for Distributing A Robot Swarm among Multiple Tasks. Human Peripheral Nervous System Controlling Robots. Bio-Inspired Communications and Networks. Adaptive Social Hierarchies: From Nature to Networks. Chemical Relaying Protocols. Attractor Selection as Self-Adaptive Control Mechanism for Communication Networks. Topological Robustness of Biological Systems for Information Networks—Modularity. Biologically Inspired Dynamic Spectrum Access in Cognitive Radio Networks. Weakly Connected Oscillatory Networks for Information Processing. Modeling the Dynamics of Cellular Signaling for Communication Networks. A Biologically Inspired QoS-Aware Architecture for Scalable, Adaptive, and Survivable Network Systems.
£180.50
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG The Definitive Guide to Plone
Book SynopsisPlone allows big and small companies, freelancers, individuals, institutions and organizations to create and manage Internet sites, intranets, and Web applications. This book details how to use and customize Plone for a wide-range of online applications.Table of ContentsA table of contents is not available for this title.
£30.17