Wydawca: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
4025
Ebook

BackTrack 5 Wireless Penetration Testing Beginner's Guide. Master bleeding edge wireless testing techniques with BackTrack 5

Vivek Ramachandran

Wireless has become ubiquitous in today’s world. The mobility and flexibility provided by it makes our lives more comfortable and productive. But this comes at a cost – Wireless technologies are inherently insecure and can be easily broken. BackTrack is a penetration testing and security auditing distribution that comes with a myriad of wireless networking tools used to simulate network attacks and detect security loopholes. Backtrack 5 Wireless Penetration Testing Beginner’s Guide will take you through the journey of becoming a Wireless hacker. You will learn various wireless testing methodologies taught using live examples, which you will implement throughout this book. The engaging practical sessions very gradually grow in complexity giving you enough time to ramp up before you get to advanced wireless attacks.This book will take you through the basic concepts in Wireless and creating a lab environment for your experiments to the business of different lab sessions in wireless security basics, slowly turn on the heat and move to more complicated scenarios, and finally end your journey by conducting bleeding edge wireless attacks in your lab.There are many interesting and new things that you will learn in this book – War Driving, WLAN packet sniffing, Network Scanning, Circumventing hidden SSIDs and MAC filters, bypassing Shared Authentication, Cracking WEP and WPA/WPA2 encryption, Access Point MAC spoofing, Rogue Devices, Evil Twins, Denial of Service attacks, Viral SSIDs, Honeypot and Hotspot attacks, Caffe Latte WEP Attack, Man-in-the-Middle attacks, Evading Wireless Intrusion Prevention systems and a bunch of other cutting edge wireless attacks.If you were ever curious about what wireless security and hacking was all about, then this book will get you started by providing you with the knowledge and practical know-how to become a wireless hacker.

4026
Ebook

The Oracle Universal Content Management Handbook. Build, Administer, and Manage Oracle Stellent UCM Solutions

Dmitri Khanine

Oracle UCM is a world-leading Enterprise Content Management platform. From Document Management, Web, Records, and more—Oracle has got all your business needs covered. Oracle UCM enables your organization to efficiently manage, store, preserve, and deliver content and documents.Written by Oracle ACE Dmitri Khanine, this book is a complete practical guide to building an ECM system and successfully configuring, administering, and operating it. It also shows you how to efficiently manage your organization's content and customize the UCM to fit your needs.This book wastes no time in getting you up and running and dives straight into the installation of the content server in Chapter 1. In the second chapter, you will master all the major controls and the admin interface. Metadata—a very important ingredient of any ECM—is thoroughly covered in Chapter 3. The book then moves on to the important tasks of securing your ECM system, configuring and managing workflows, and understanding and implementing virtual folders. The book also gives you an under-the-hood view of Stellent in Chapter 7. In the later chapters, you will learn how to migrate content like a pro and easily customize Oracle ECM. A bonus addition to the book is the final chapter, which is an easy-to-follow primer on web content management.

4027
Ebook

Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition

Kevin Cardwell

Security flaws and new hacking techniques emerge overnight – security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams. Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you’re going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients.Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams.

4028
Ebook

Effective Angular. Develop applications of any size by effectively using Angular with Nx, RxJS, NgRx, and Cypress

Roberto Heckers

Angular is an open-source, front-end framework used to build web applications using TypeScript. Angular is a component-based framework, which means you build apps by developing and composing reusable components. This framework has all the built-in features needed to develop complex, feature-rich web apps. Written by an Angular specialist working with some of the top companies in the Netherlands, this book teaches you how to harness the full potential of the Angular framework.You’ll explore different front-end architecture designs and set up a scalable environment for Angular applications and libraries using Nx, before taking a deep dive into the framework's newest and most powerful features. Next, you’ll learn to manipulate the Document Object Model (DOM) with Angular directives, pipes, and animations, and build reusable components like a pro. The book spotlights best practices and flags potential pitfalls at every step of the way. You’ll also learn design patterns that fit well when using the Angular framework, reactive programming with RxJS and Angular signals, and how to manage application states effectively. The book teaches you about accessibility, testing, and optimizing your app for deployment.By the end of this book, you’ll be able to use Angular effectively to build enterprise-ready, scalable front-end applications.

4029
Ebook

Flash Multiplayer Virtual Worlds. Build immersive, full-featured interactive worlds for games, online communities, and more

Makzan Makzan (Mak Seng Hin), Seng Hin Mak

Flash virtual worlds are some of the most exciting—and profitable—online business being built today. Using Flash, developers can build interactive environments where users can interact with the virtual world and one another, compete, and have fun. Creating a playful environment on an electronic network presents unique challenges as you combine a fun, upbeat frontend with some serious and complex server logic.This handy book assists you in building amazing virtual worlds in no time by implementing ActionScripts in a Flash IDE. With this book in hand, you will build virtual worlds that have avatars walking around and interacting with non playing characters, completing challenging quests, and allowing users to link with real-world friends.The fun begins with first exploring existing virtual world games such as Club Penguin, Mole, Dofus, and World of Warcraft. We will then design our virtual environment. Then we will create avatars and move the avatars in the virtual world. We will add some triggers to add amusement and life to the virtual world. We will allow the avatars to interact with other players and create a buddy list for each user. Then we will integrate buildings and other environment to the virtual world. We will also let the players interact with non-player characters to complete some tasks. Finally, we move on to add interesting quests to the virtual world, which need to be accomplished by the player to gear up to the next level of the game.This example-rich, hands-on guide sequentially develops a multiplayer virtual world—the platform, the environment, quests, avatars, non-playing characters, and interaction between them.

4030
Ebook

OpenCV Android Programming By Example. Leverage OpenCV to develop vision-aware and intelligent Android applications

Amgad Muhammad, Erik Hellman, Erik A Westenius, Amgad M Ahmed Muhammad

Starting from the basics of computer vision and OpenCV, we'll take you all the way to creating exciting applications. You will discover that, though computer vision is a challenging subject, the ideas and algorithms used are simple and intuitive, and you will appreciate the abstraction layer that OpenCV uses to do the heavy lifting for you. Packed with many examples, the book will help you understand the main data structures used within OpenCV, and how you can use them to gain performance boosts. Next we will discuss and use several image processing algorithms such as histogram equalization, filters, and color space conversion. You then will learn about image gradients and how they are used in many shape analysis techniques such as edge detection, Hough Line Transform, and Hough Circle Transform. In addition to using shape analysis to find things in images, you will learn how to describe objects in images in a more robust way using different feature detectors and descriptors. By the end of this book, you will be able to make intelligent decisions using the famous Adaboost learning algorithm.

4031
Ebook

Effective Concurrency in Go. Develop, analyze, and troubleshoot high performance concurrent applications with ease

Burak Serdar

The Go language has been gaining momentum due to its treatment of concurrency as a core language feature, making concurrent programming more accessible than ever. However, concurrency is still an inherently difficult skill to master, since it requires the development of the right mindset to decompose problems into concurrent components correctly. This book will guide you in deepening your understanding of concurrency and show you how to make the most of its advantages.You’ll start by learning what guarantees are offered by the language when running concurrent programs. Through multiple examples, you will see how to use this information to develop concurrent algorithms that run without data races and complete successfully. You’ll also find out all you need to know about multiple common concurrency patterns, such as worker pools, asynchronous pipelines, fan-in/fan-out, scheduling periodic or future tasks, and error and panic handling in goroutines.The central theme of this book is to give you, the developer, an understanding of why concurrent programs behave the way they do, and how they can be used to build correct programs that work the same way in all platforms.By the time you finish the final chapter, you’ll be able to develop, analyze, and troubleshoot concurrent algorithms written in Go.

4032
Ebook

Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition

Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty

Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This updated fourth edition of Practical Mobile Forensics delves into the concepts of mobile forensics and its importance in today's world.The book focuses on teaching you the latest forensic techniques to investigate mobile devices across various mobile platforms. You will learn forensic techniques for multiple OS versions, including iOS 11 to iOS 13, Android 8 to Android 10, and Windows 10. The book then takes you through the latest open source and commercial mobile forensic tools, enabling you to analyze and retrieve data effectively. From inspecting the device and retrieving data from the cloud, through to successfully documenting reports of your investigations, you'll explore new techniques while building on your practical knowledge. Toward the end, you will understand the reverse engineering of applications and ways to identify malware. Finally, the book guides you through parsing popular third-party applications, including Facebook and WhatsApp.By the end of this book, you will be proficient in various mobile forensic techniques to analyze and extract data from mobile devices with the help of open source solutions.