Browse Results

Showing 34,376 through 34,400 of 54,439 results

Kubernetes Cookbook

by Sameer Naik Sébastien Goasguen Jonathan Michaux

Kubernetes is the de facto standard for container orchestration and distributed applications management across a microservices framework. With this practical cookbook, you'll learn hands-on Kubernetes recipes for automating the deployment, scaling, and operations of application containers across clusters of hosts.In this fully updated second edition, Sameer Naik, Sébastien Goasguen, and Jonathan Michaux from TriggerMesh provide a problem-solution-discussion format with easy lookups to help you find the detailed answers you need—fast. Kubernetes lets you deploy your applications quickly and predictably, so you can efficiently respond to customer demand. This cookbook delivers the essential knowledge that developers and system administrators need to get there.Recipes in this cookbook focus on:Creating a Kubernetes clusterUsing the Kubernetes command-line interfaceManaging fundamental workload typesWorking with servicesExploring the Kubernetes APIManaging stateful and non-cloud-native appsWorking with volumes and configuration dataCluster-level and application-level scalingSecuring your applicationsMonitoring and loggingMaintenance and troubleshooting

Developments in Intellectual Property Strategy: The Impact of Artificial Intelligence, Robotics and New Technologies

by Nadia Naim

Research in the area of intellectual property (IP) is increasingly relevant to the rapidly growing artificial intelligence (AI) and robotics industries, affecting the legal, business, manufacturing, and healthcare sectors. This contributed volume aims to develop our understanding of the legal and ethical challenges posed by artificial intelligence and robotics technologies and the appropriate intellectual property based legal and regulatory responses. It provides a philosophical and legal framework for considering concepts and principles that relate to the development and use of such technologies at the international, regional, and national levels. The legal discourse in IP concerns the ever-growing AI sector and how businesses can protect their IP and incorporate AI. Moral sentiments often take a back seat to market sentiments, even in shaping the direction of ethical business strategy. This anomaly persists despite growing interest in ethics and IP. Taking an interdisciplinary and diverse perspective, this book enriches the evolving definition and scope of IP literature by focusing on actors, products and regulation that shape the business sector. Considering the gap between theory and practice, this book bridges academic and professional knowledge in unpacking legal, ethical and governance issues in the intellectual property industry. In an effort to include as many viewpoints as possible, contributions have been gathered from diverse fields, including business, ethics, governance, law, philosophy and technology studies. This book will appeal to academics in the field of intellectual property, business ethics, AI, emerging technologies and strategic innovation, as well as practitioners and policy makers.

Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals

by Nagendra Kumar Nainar Ashish Panda

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. What You'll LearnReview Wireshark analysis and network forensicsStudy traffic capture and its analytics from mobile devicesAnalyze various access technology and cloud trafficWrite your own dissector for any new or proprietary packet formatsCapture secured application traffic for analysisWho This Book Is ForIT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud Operators

Cloud Computing and Big Data: 7th Conference, JCC&BD 2019, La Plata, Buenos Aires, Argentina, June 24–28, 2019, Revised Selected Papers (Communications in Computer and Information Science #1050)

by Marcelo Naiouf Franco Chichizola Enzo Rucci

This book constitutes the revised selected papers of the 7th International Conference on Cloud Computing and Big Data, JCC&BD 2019, held in La Plata, Buenos Aires, Argentina, in June 2019.The 12 full papers presented were carefully reviewed and selected from a total of 31 submissions. They are dealing with such topics as cloud computing and HPC; Big Data and data intelligence; mobile computing.

Cloud Computing, Big Data & Emerging Topics: 9th Conference, JCC-BD&ET, La Plata, Argentina, June 22-25, 2021, Proceedings (Communications in Computer and Information Science #1444)

by Marcelo Naiouf Enzo Rucci Franco Chichizola Laura De Giusti

This book constitutes the revised selected papers of the 9th International Conference on Cloud Computing, Big Data & Emerging Topics, JCC-BD&ET 2021, held in La Plata, Argentina*, in June 2021.The 12 full papers and 2 short papers presented were carefully reviewed and selected from a total of 37 submissions. The papers are organized in topical sections on parallel and distributed computing; machine and deep learning; big data; web and mobile computing; visualization..*The conference was held virtually due to the COVID-19 pandemic.

Cloud Computing, Big Data & Emerging Topics: 11th Conference, JCC-BD&ET 2023, La Plata, Argentina, June 27–29, 2023, Proceedings (Communications in Computer and Information Science #1828)

by Marcelo Naiouf Enzo Rucci Franco Chichizola Laura De Giusti

This book constitutes the revised selected papers of the 11th International Conference on Cloud Computing, Big Data & Emerging Topics, JCC-BD&ET 2023, held in La Plata, Argentina*, in June 2023.The 14 full papers were carefully reviewed and selected from a total of 38 submissions. The papers are organized in topical sections on: Parallel and Distributed Computing, Big Data, Machine and Deep Learning, Smart Cities and E-Government, Visualization.

Introduction to Finite Element Analysis: A Textbook for Engineering Students

by S. Unnikrishnan Nair S. Somanath

This textbook covers the basic concepts and applications of finite element analysis. It is specifically aimed at introducing this advanced topic to undergraduate-level engineering students and practicing engineers in a lucid manner. It also introduces a structural and heat transfer analysis software FEASTSMT which has wide applications in civil, mechanical, nuclear and automobile engineering domains. This software has been developed by generations of scientists and engineers of Vikram Sarabhai Space Centre and Indian Space Research Organisation. Supported with many illustrative examples, the textbook covers the classical methods of estimating solutions of mathematical models. The book is written in an easy-to-understand manner. This textbook also contains numeral exercise problems to aid self-learning of the students. The solutions to these problems are demonstrated using finite element software. Furthermore, the textbook contains several tutorials and associated online resources on usage of the FEASTSMT software. Given the contents, this textbook is highly useful for the undergraduate students of various disciplines of engineering. It is also a good reference book for the practicing engineers.

Instant Liferay Portal 6 Starter

by Sandeep Nair

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A simple Starter approach towards understanding significant areas of portals such as content management, document management, and collaboration. It also provides an overview of Liferay concepts and terminologies.Instant Liferay Portal 6 Starter is great for new users who want to know what Liferay is all about. It will quickly give them an overview about Liferay Portal and its features. It is also good for those who want to analyze whether Liferay is fit for their requirements and are interested in what unique features Liferay can offer.

Liferay Beginner’s Guide

by Sandeep Nair Robert Chen

Part of Packt's Beginner's Guide series, each chapter follows the creation of a fictional neighbourhood site to demonstrate an aspect of Liferay portal with practical examples, screenshots, and step-by-step instructions. All you need in order to benefit from the Liferay Beginner's Guide is programming experience. No prior knowledge of Liferay is required, although experienced Liferay portal programmers who need to get up to speed with its latest features will also find this book useful.

Digital Transformation with Dataverse for Teams: Become a citizen developer and lead the digital transformation wave with Microsoft Teams and Power Platform

by Srikumar Nair Charles Lamanna

Design, build, and deploy multi-platform apps to overcome crucial business problems by leveraging the capabilities of low-code and no-code development enabled through Microsoft Power Platform and TeamsKey FeaturesFind out how you can accelerate the digital transformation of your organization as a citizen developerBuild your first app with the help of step-by-step guidance and add capabilities with flows and botsLearn about lifecycle management for applications, environments, and licensingBook DescriptionMicrosoft Dataverse for Teams is a built-in, low-code data platform for Teams and enables everyone to easily build and deploy apps, flows, and intelligent chatbots using Power Apps, Power Automate, and Power Virtual Agents (PVA) embedded in Microsoft Teams. Without learning any coding language, you will be able to build apps with step-by-step explanations for setting up Teams, creating tables to store data, and leverage the data for your digital solutions. With the techniques covered in the book, you'll be able to develop your first app with Dataverse for Teams within an hour! You'll then learn how to automate repetitive tasks or build alerts using Power Automate and Power Virtual Agents. As you get to grips with building these digital solutions, you'll also be able to understand when to consider upgrading from Dataverse for Teams to Dataverse, along with its advanced features. Finally, you'll explore features for administration and governance and understand the licensing requirements of Microsoft Dataverse for Teams and PowerApps. Having acquired the skills to build and deploy an enterprise-grade digital solution, by the end of the book, you will have become a qualified citizen developer and be ready to lead a digital revolution in your organization.What you will learnGain a deeper understanding of Microsoft Dataverse for Teams by exploring various business scenariosDesign, build, and deploy enterprise-grade applications for TeamsDevelop Power Automate flows and PVA bots using Dataverse for TeamsDiscover administration and security best practicesUnderstand the licensing requirements and advanced features of Microsoft DataverseIdentify scenarios in your organizations where your citizen development skills can be leveragedWho this book is forThe book is for citizen developers, business professionals, or anyone looking to develop applications to solve critical business problems. Basic knowledge of using software like PowerPoint, Excel-like formulae, and navigating between application screens is all you need to get started with this book.

Learning LibGDX Game Development - Second Edition

by Suryakumar Balakrishnan Nair Andreas Oehlke

This book is aimed at indie and existing game developers as well as those who want to get started with game development using LibGDX. Basic knowledge of Java programming and game development is required.

Learning LibGDX Game Development Second Edition

by Suryakumar Balakrishnan Nair Andreas Oehlke

<P><P>Wield the power of the LibGDX framework to create a cross-platform game <P><P>About This Book <P><P>Write your game code once and run it on a multitude of platforms using LibGDX <P><P>Learn about the key features of LibGDX that will ease and speed up your development cycles <P><P>An easy-to-follow, comprehensive guide that will help you develop games in LibGDX successfully <P><P>Who This Book Is For <P><P>This book is aimed at indie and existing game developers as well as those who want to get started with game development using LibGDX. Basic knowledge of Java programming and game development is required. <P><P>What You Will Learn <P><P>Set up a cross-platform project using Gradle and test the base code required for game building <P><P>Speed up your overall productivity with the stunning JVM Code Hot Swapping feature <P><P>Use Scene2D to create and organize complex menu structures <P><P>Automate the creation of texture atlases using TexturePacker <P><P>Manage and play audio files and add special effects to your game to improve its look and feel <P><P>Learn 2D physics simulation using Box2D <P><P>Understand more about 3D programming using the new LibGDX 3D API <P><P>Use the LibGDX Bullet wrapper for 3D physics simulation <P><P>In Detail <P><P>LibGDX is a multiplatform game development framework, and is one of the most popular frameworks for building games, providing a comprehensive set of development capabilities and features to use and incorporate into games. <P><P>This book starts off by introducing you to LibGDX and how to use its project setup tool to build an application that can support multiple platforms, before gradually moving on to configuring your game. Then, you will learn to organize resources, create a scene, actors, and a menu system. You will also enhance the visual appearance of your game and manage its transitions, along with music and sound effects. You will then move on to cover the advanced programming techniques and create and manage different kinds of animations. <P><P>Finally, you will be introduced to the basics of 3D programming and the 3D physics engine. By the end of this book, you will be able to start developing your very own cross-platform games using the LibGDX framework.

Practical Domain-Driven Design in Enterprise Java: Using Jakarta EE, Eclipse MicroProfile, Spring Boot, and the Axon Framework

by Vijay Nair

See how Domain-Driven Design (DDD) combines with Jakarta EE MicroProfile or Spring Boot to offer a complete suite for building enterprise-grade applications. In this book you will see how these all come together in one of the most efficient ways to develop complex software. Practical Domain-Driven Design in Enterprise Java starts by building out the Cargo Tracker reference application as a monolithic application using the Jakarta EE platform. By doing so, you will map concepts of DDD (bounded contexts, language, and aggregates) to the corresponding available tools (CDI, JAX-RS, and JPA) within the Jakarta EE platform. Once you have completed the monolithic application, you will walk through the complete conversion of the monolith to a microservices-based architecture, again mapping the concepts of DDD and the corresponding available tools within the MicroProfile platform (config, discovery, and fault tolerance). To finish this section, you will examine the same microservices architecture on the Spring Boot platform. The final set of chapters looks at what the application would be like if you used the CQRS and event sourcing patterns. Here you’ll use the Axon framework as the base framework. What You Will LearnDiscover the DDD architectural principles and use the DDD design patternsUse the new Eclipse Jakarta EE platform Work with the Spring Boot frameworkImplement microservices design patterns, including context mapping, logic design, entities, integration, testing, and securityCarry out event sourcingApply CQRS Who This Book Is ForJunior developers intending to start working on enterprise Java; senior developers transitioning from monolithic- to microservices-based architectures; and architects transitioning to a DDD philosophy of building applications.

Getting Started with Beautiful Soup

by Vineeth G. Nair

This book is a practical, hands-on guide that takes you through the techniques of web scraping using Beautiful Soup. Getting Started with Beautiful Soup is great for anybody who is interested in website scraping and extracting information. However, a basic knowledge of Python, HTML tags, and CSS is required for better understanding.

China's Megatrends: The 8 Pillars of a New Society

by John Naisbitt Doris Naisbitt

“[John Naisbitt’s] vision of the world’s economy has the mark of genius.” —Minneapolis Star TribuneInternationally-renowned futurist and bestselling author John Naisbitt is back with China’s Megatrends, the most comprehensive look at the present and future of China and the transformation that is reshaping its economic, political, and social systems. Since publishing the enormously popular Megatrends—a New York Times bestseller for two years that has been published in 57 countries—John Naisbitt has become the most respected and well-known prognosticator of global trends. To write China’s Megatrends, Naisbitt and wife Doris were granted unprecedented access by the Chinese government to all aspects of the country and its social model. Using the same techniques of information gathering and analysis as Megatrends, the Naisbitts present a prescient and unique perspective on the emergent global power and its role in the future of globalization.

Argentina innovadora: Quiénes son los emprendedores, científicos y artistas que están cambiando el país

by Silvia Naishtat María Eugenia Estenssoro

Cómo hicieron los emprendedores tecnológicos que hace veinte años decidieron realizar el sueño de una nación innovadora y creativa, reconocida por su talento en el resto del mundo. En América Latina hay siete unicornios, y cuatro son argentinos. No se trata de seres mitológicos, sino de empresas tecnológicas valuadas en más de mil millones de dólares. No solo se distinguen por su valor, sino por llevar en su ADN una gran dosis de espíritu rupturista e innovador. Surgieron y se desarrollaron a contramano de la realidad local, y hoy son multinacionales que generan riqueza, trabajo de calidad y crecimiento sostenido. Mercado Libre es la principal plataforma de comercio electrónico de habla hispana y un caso de estudio en la Universidad de Stanford. Despegar es la quinta agencia de turismo del mundo. Globant suministra tecnología a empresas como Disney y Google. OLX está presente en ciento veinte países y es la mayor compañía de venta de clasificados por internet en la India. Pero no son casos excepcionales, y el término "unicornios" se extiende a otras empresas con las mismas características: Gran Data anticipa el comportamiento de los consumidores para las principales compañías telefónicas de los Estados Unidos; Satellogic ya lanzó cinco satélites al espacio que brindan imágenes con una resolución nunca antes alcanzada; y Bioceres posee un gen resistente a la sequía que puede permitir una nueva revolución productiva en el agro. Luego de dos años de viajes y entrevistas, María Eugenia Estenssoro y Silvia Naishtat concluyen que estos son ejemplos descollantes de que la Argentina no es solo un semillero de futbolistas de calidad internacional: con políticas públicas adecuadas, el país puede aspirar también a ser un polo mundial de innovación en áreas tan diversas como la biotecnología, el arte y la comunicación.

Advanced Biosignal Processing

by Amine Nait-Ali

Through 17 chapters, this book presents the principle of many advanced biosignal processing techniques. After an important chapter introducing the main biosignal properties as well as the most recent acquisition techniques, it highlights five specific parts which build the body of this book. Each part concerns one of the most intensively used biosignals in the clinical routine, namely the Electrocardiogram (ECG), the Elektroenzephalogram (EEG), the Electromyogram (EMG) and the Evoked Potential (EP). In addition, each part gathers a certain number of chapters related to analysis, detection, classification, source separation and feature extraction. These aspects are explored by means of various advanced signal processing approaches, namely wavelets, Empirical Modal Decomposition, Neural networks, Markov models, Metaheuristics as well as hybrid approaches including wavelet networks, and neuro-fuzzy networks. The last part, concerns the Multimodal Biosignal processing, in which we present two different chapters related to the biomedical compression and the data fusion. Instead organising the chapters by approaches, the present book has been voluntarily structured according to signal categories (ECG, EEG, EMG, EP). This helps the reader, interested in a specific field, to assimilate easily the techniques dedicated to a given class of biosignals. Furthermore, most of signals used for illustration purpose in this book can be downloaded from the Medical Database for the Evaluation of Image and Signal Processing Algorithm. These materials assist considerably the user in evaluating the performances of their developed algorithms. This book is suited for final year graduate students, engineers and researchers in biomedical engineering and practicing engineers in biomedical science and medical physics.

Hidden Biometrics: When Biometric Security Meets Biomedical Engineering (Series in BioEngineering)

by Amine Nait-Ali

This book explores intrinsic and human body part biometrics and biometrics of human physiological activities, invisible to the naked eye. This includes, for instance, brain structures, skeleton morphology, heart activity, etc. These human body parts can only be visualized using specific imaging techniques or sensors, commonly employed in the biomedical engineering field. As such, the book connects two fields, namely biometric security and biomedical engineering.The book is suitable for advanced graduate and postgraduate students, engineers and researchers, especially in Signal and Image Processing, Biometrics, and Biomedical Engineering.

How the ThinkPad Changed the World—and Is Shaping the Future

by Arimasa Naitoh William Holstein

The ThinkPad notebook computer has been at the center of the digital revolution that has transformed millions of lives around the world, allowing users to obtain access to their documents, pictures and other personal data from virtually anywhere at any time. More than 100 million ThinkPads have been sold since they were introduced in 1992, some twenty-five years ago. ThinkPads played a prominent role in NASA's space exploration and at the International Space Station. They accompanied explorers who traversed the entire length of the Nile River and conquered Mount Everest. ThinkPads also played a major role in changing the very architecture of how humanity's knowledge is stored and made available.In this book, Arimasa Naitoh, the father of the ThinkPad, collaborates with American business journalist and author William J. Holstein to write candidly about the incredible technological and personal struggles he and fellow engineers faced. And he offers his vision of the future of mobile computing—because this revolution is not even close to being finished.

Wireless Vehicular Networks for Car Collision Avoidance

by Rola Naja

Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks.The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

Artificial Intelligence in Healthcare and Medicine

by Kayvan Najarian

This book provides a comprehensive overview of the recent developments in clinical decision support systems, precision health, and data science in medicine. The book targets clinical researchers and computational scientists seeking to understand the recent advances of artificial intelligence (AI) in health and medicine. Since AI and its applications are believed to have the potential to revolutionize healthcare and medicine, there is a clear need to explore and investigate the state-of-the-art advancements in the field. This book provides a detailed description of the advancements, challenges, and opportunities of using AI in medical and health applications. Over 10 case studies are included in the book that cover topics related to biomedical image processing, machine learning for healthcare, clinical decision support systems, visualization of high dimensional data, data security and privacy, bioinformatics, and biometrics. The book is intended for clinical researchers and computational scientists seeking to understand the recent advances of AI in health and medicine. Many universities may use the book as a secondary training text. Companies in the healthcare sector can greatly benefit from the case studies covered in the book. Moreover, this book also: Provides an overview of the recent developments in clinical decision support systems, precision health, and data science in medicine Examines the advancements, challenges, and opportunities of using AI in medical and health applications Includes 10 cases for practical application and reference Kayvan Najarian is a Professor in the Department of Computational Medicine and Bioinformatics, Department of Electrical Engineering and Computer Science, and Department of Emergency Medicine at the University of Michigan, Ann Arbor. Delaram Kahrobaei is the University Dean for Research at City University of New York (CUNY), a Professor of Computer Science and Mathematics, Queens College CUNY, and the former Chair of Cyber Security, University of York. Enrique Domínguez is a professor in the Department of Computer Science at the University of Malaga and a member of the Biomedical Research Institute of Malaga. Reza Soroushmehr is a Research Assistant Professor in the Department of Computational Medicine and Bioinformatics and a member of the Michigan Center for Integrative Research in Critical Care, University of Michigan, Ann Arbor.

Technological Innovation for Cyber-Physical Systems

by Shirin Najdi Nazanin Vafaei António J. Falcão Luis M. Camarinha-Matos

This book constitutes the refereed proceedings of the 7th IFIP WG 5. 5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2016, held in Costa de Caparica, Portugal, in April 2016. The 53 revised full papers were carefully reviewed and selected from 112 submissions. The papers present selected results produced in engineering doctoral programs and focus on research, development, and application of cyber-physical systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: enterprise collaborative networks; ontologies; Petri nets; manufacturing systems; biomedical applications; intelligent environments; control and fault tolerance; optimization and decision support; wireless technologies; energy: smart grids, renewables, management, and optimization; bio-energy; and electronics.

Kali Linux Web Penetration Testing Cookbook

by Gilberto Najera-Gutierrez

This book is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. You should know the basics of operating a Linux environment and have some exposure to security technologies and tools.

Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

by Gilberto Najera-Gutierrez

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilitiesConduct a preliminary assessment of attack surfaces and run exploits in your labExplore new tools in the Kali Linux ecosystem for web penetration testingBook DescriptionWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform that provides a broad array of testing tools, many of which can be used to execute web penetration testing. Kali Linux Web Penetration Testing Cookbook gives you the skills you need to cover every stage of a penetration test – from gathering information about the system and application, to identifying vulnerabilities through manual testing. You will also cover the use of vulnerability scanners and look at basic and advanced exploitation techniques that may lead to a full system compromise. You will start by setting up a testing laboratory, exploring the latest features of tools included in Kali Linux and performing a wide range of tasks with OWASP ZAP, Burp Suite and other web proxies and security testing tools. As you make your way through the book, you will learn how to use automated scanners to find security flaws in web applications and understand how to bypass basic security controls. In the concluding chapters, you will look at what you have learned in the context of the Open Web Application Security Project (OWASP) and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively. By the end of this book, you will have acquired the skills you need to identify, exploit, and prevent web application vulnerabilities.What you will learnSet up a secure penetration testing laboratoryUse proxies, crawlers, and spiders to investigate an entire websiteIdentify cross-site scripting and client-side vulnerabilitiesExploit vulnerabilities that allow the insertion of code into web applicationsExploit vulnerabilities that require complex setupsImprove testing efficiency using automated vulnerability scannersLearn how to circumvent security controls put in place to prevent attacksWho this book is forKali Linux Web Penetration Testing Cookbook is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. The basics of operating a Linux environment and prior exposure to security technologies and tools are necessary.

Web Penetration Testing with Kali Linux - Third Edition: Explore The Methods And Tools Of Ethical Hacking With Kali Linux, 3rd Edition

by Gilberto Nájera-Gutiérrez

Web Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side attacks and fuzzing in particular. From the start of the book, you'll be given a thorough grounding in the concepts of hacking and penetration testing, and you'll see the tools used in Kali Linux that relate to web application hacking. You'll gain a deep understanding of classicalSQL, command-injection flaws, and the many ways to exploit these flaws. Web penetration testing also needs a general overview of client-side attacks, which is rounded out by a long discussion of scripting and input validation flaws. There is also an important chapter on cryptographic implementation flaws, where we discuss the most recent problems with cryptographic layers in the networking stack. The importance of these attacks cannot be overstated, and defending against them is relevant to most internet users and, of course, penetration testers. At the end of the book, you'll use an automated technique called fuzzing to identify flaws in a web application. Finally, you'll gain an understanding of web application vulnerabilities and the ways they can be exploited using the tools in Kali Linux.

Refine Search

Showing 34,376 through 34,400 of 54,439 results