Поиск книг                    Поиск по списку ISBN Расширенный поиск    
  Зарубежные издательства Российские издательства  
   Авторы    Каталог книг    Издательства    Новинки    Учебная литература    Специальные предложения  Бестселлеры
 
 
Книги    
Logobook
Книги зарубежных издательств на иностранных языках
Logobook
Книги российских издательств
Logobook
Представительство в Казахстане
 
Вход в систему   
 
Регистрация  Забыли?
 
Информация   
Контакты/Адрес/Проезд
Корзина
Ваши заказы
Доставка и Оплата
Заказ по телефону/email
Помощь
Есть вопрос?
О компании
LgBook.ru
FkBook.ru
 


Online Каталоги   
Cambridge University Press
Каталог учебной литературы
по английскому языку >>>

Oxford University Press
Каталог учебной литературы
по английскому языку >>>



Каталог учебной литературы
по английскому языку >>>

Pearson ELT

Читайте отзывы покупателей и оценивайте качество магазина на Яндекс.Маркете

Open Source Fuzzing Tools,, Noam Rathaus

Open Source Fuzzing Tools,

Автор: Noam Rathaus
Название:  Open Source Fuzzing Tools,   (Общедоступные инструменты по тестированию софта)
Издательство: Elsevier Science
Классификация:
Общая теория обработки данных
Базы данных

ISBN: 1597491950
ISBN-13(EAN): 9781597491952
ISBN: 1-59749-195-0
ISBN-13(EAN): 978-1-59749-195-2
Обложка/Формат: Paperback
Страницы: 210
Вес: 0.376 кг.
Дата издания: 20.12.2007
Серия: Syngress
Язык: ENG
Иллюстрации: 1, black & white illustrations
Размер: 235 x 191 mm, 376 grams
Читательская аудитория: Professional & Vocational
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание: Fuzzing is often described as a black box software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. Such program errors and crashes are indicative of the existence of a security vulnerability, which can later be researched and fixed.

Fuzz testing is now making a transition from a hacker-grown tool to a commercial-grade product. There are many different types of applications that can be fuzzed, many different ways they can be fuzzed, and a variety of different problems that can be uncovered. There are also problems that arise during fuzzing; when is enough enough? These issues and many others are fully explored.

Learn how fuzzing finds vulnerabilities; eliminate buffer overflows, format strings and other potential flaws; find coverage of available Fuzzing tools and complete coverage of open source and commercial tools and their uses; build your own Fuzzer; automate the process of vulnerability research by building your own tools; understand how fuzzing works within the development process; and, learn how fuzzing serves as a quality assurance tool for your own and third-party software.


 Варианты приобретения 
  Кол-во Наличие на складе Цена р. Купить / Отложить
1 Отсутствует. Возможна поставка под заказ.
При оформлении заказа до: 7 апр 2017
Ориентировочная дата поставки: 2 май 2017
При условии наличия книги у поставщика.
3924.00
 о цене
Добавить в корзину
Add to Wish list

Отзывы покупателей.
Добавить отзыв.
Data Mining: Practical Machine Learning Tools and Techniques,

Автор: Ian H. Witten
Название: Data Mining: Practical Machine Learning Tools and Techniques,
ISBN: 0123748569 ISBN-13(EAN): 9780123748560
Издательство: Elsevier Science
Цена: 4155 р.
Наличие на складе: Есть (1 шт.)
Описание: Like the popular second edition, Data Mining: Practical Machine Learning Tools and Techniques offers a thorough grounding in machine learning concepts as well as practical advice on applying machine learning tools and techniques in real-world data mining situations. Inside, you'll learn all you need to know about preparing inputs, interpreting outputs, evaluating results, and the algorithmic methods at the heart of successful data mining?including both tried-and-true techniques of today as well as methods at the leading edge of contemporary research. <br><br>Complementing the book is a fully functional platform-independent open source Weka software for machine learning, available for free download. <br><br>The book is a major revision of the second edition that appeared in 2005. While the basic core remains the same, it has been updated to reflect the changes that have taken place over the last four or five years. The highlights for the updated new edition include completely revised technique sections; new chapter on Data Transformations, new chapter on Ensemble Learning, new chapter on Massive Data Sets, a new ?book release? version of the popular Weka machine learning open source software (developed by the authors and specific to the Third Edition); new material on ?multi-instance learning?; new information on ranking the classification, plus comprehensive updates and modernization throughout. All in all, approximately 100 pages of new material.<br> <br><br>* Thorough grounding in machine learning concepts as well as practical advice on applying the tools and techniques<br><br>* Algorithmic methods at the heart of successful data mining?including tired and true methods as well as leading edge methods<br><br>* Performance improvement techniques that work by transforming the input or output<br><br>* Downloadable Weka, a collection of machine learning algorithms for data mining tasks, including tools for data pre-processing, classification, regression, clustering, association rules, and visualization?in an updated, interactive interface. <br>
Купить

GFI Network Security and PCI Compliance Power Tools,

Автор: Brien Posey
Название: GFI Network Security and PCI Compliance Power Tools,
ISBN: 159749285X ISBN-13(EAN): 9781597492850
Издательство: Elsevier Science
Цена: 3924 р.
Наличие на складе: Поставка под заказ.
Описание: Reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. This book pinpoints the important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively.
Купить

Human Interface and the Management of Information. Methods, Techniques and Tools in Information Design / Symposium on Human Interface 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part I

Автор: Smith Michael J., Salvendy Gavriel
Название: Human Interface and the Management of Information. Methods, Techniques and Tools in Information Design / Symposium on Human Interface 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part I
ISBN: 3540733442 ISBN-13(EAN): 9783540733447
Издательство: Springer
Цена: 12319 р.
Наличие на складе: Нет в наличии.
Описание: This two-volume set LNCS 4557 and 4558 constitutes the refereed proceedings of the Symposium on Human Interface 2007, held in Beijing, China in July 2007 in the framework of the 12th International Conference on Human-Computer Interaction, HCII 2007 with 8 other thematically similar conferences.
Купить

Building open source network security tools

Автор: Schiffman, Mike
Название: Building open source network security tools
ISBN: 0471205443 ISBN-13(EAN): 9780471205449
Издательство: Wiley
Цена: 2727 р.
Наличие на складе: Поставка под заказ.
Описание: Shows how to combine techniques to build customized network security tools. This book helps you to learn about the Network Security Tool Paradigm in addition to available components including libpcap, libnet, libnids, libsf, libdnet, and OpenSSL. It offers a discussion of these components, helping you gain an understanding of the native datatypes.
Купить

How to Cheat at Configuring Open Source Security Tools,

Автор: Michael Gregg
Название: How to Cheat at Configuring Open Source Security Tools,
ISBN: 1597491705 ISBN-13(EAN): 9781597491709
Издательство: Elsevier Science
Цена: 3308 р.
Наличие на складе: Поставка под заказ.
Описание: Offers an introduction to managing an infrastructure with Open Source Security tools. This book helps you learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. It covers the some of the popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet.
Купить

PHP 5: Your visual blueprintTM for creating open source, server-side content

Автор: Toby Boudreaux
Название: PHP 5: Your visual blueprintTM for creating open source, server-side content
ISBN: 0764583328 ISBN-13(EAN): 9780764583322
Издательство: Wiley
Цена: 1495 р.
Наличие на складе: Поставка под заказ.
Описание: Now revised to cover features found in PHP4 and PHP5, this new edition shows Web developers step by step how to create dynamic, data-driven Web applications Two-color screen shots accompanied by concise callouts demonstrate how to tackle more than 100 key PHP tasks, including using cookies to monitor the activity of Web site visitors, retrieving information from MySQL or other databases, creating images and Web pages on the fly, and processing XML documents Shows how to use PHP with Apache Web server, process data forms, access data files, troubleshoot PHP scripts, and migrate scripts to PHP5 A companion Web site features a fully searchable e-version of the book, plus all code that appears in the text-ready to plug into users' Web pages
Купить

Social Engineering in It Security: Tools, Tactics, and Techniques

Автор: Conheady Sharon
Название: Social Engineering in It Security: Tools, Tactics, and Techniques
ISBN: 0071818464 ISBN-13(EAN): 9780071818469
Издательство: McGraw-Hill
Цена: 2463 р.
Наличие на складе: Поставка под заказ.
Купить

Visual Intelligence: Microsoft Tools and Techniques for Visualizing Data

Автор: Stacey
Название: Visual Intelligence: Microsoft Tools and Techniques for Visualizing Data
ISBN: 1118388038 ISBN-13(EAN): 9781118388037
Издательство: Wiley
Цена: 2991 р.
Наличие на складе: Поставка под заказ.
Описание: Visual Intelligence provides expert guidance to readers who are seeking to successfully use Microsoft tools to organize and present information using best-of-breed visualizations. The book will begin by introducing data visualization design concepts.   Next, the book introduces the various Microsoft tools used to store and display data and discusses ways to organize data to support visualization. Following the foundational material, the book will dive into a detailed discussion of different types or classes of visualizations, and the appropriate use of each. A key element of these chapters will be usage scenario that highlight the strengths and weaknesses of each tool for visualizing data, and will include a practical implementation of the visualization using the appropriate tools for that visualization. The ultimate goal of this book is to provide readers with a unique resource to learn and apply best practices for choosing a data visualization, choosing a tool from the Microsoft stack, and building a dynamic data visualization. The book will include both out of the box Microsoft visualizations, as well as custom-developed illustrations and implementations of visualizations, in full color.   Supporting code examples will also be provided.
Купить

The Kimball Group Reader: Relentlessly Practical Tools for Data Warehousing and Business Intelligence

Автор: Kimball Ralph, Ross Margy, Thornthwaite Warren
Название: The Kimball Group Reader: Relentlessly Practical Tools for Data Warehousing and Business Intelligence
ISBN: 0470563109 ISBN-13(EAN): 9780470563106
Издательство: Wiley
Цена: 2727 р.
Наличие на складе: Поставка под заказ.
Купить

Mathematical tools for data mining

Автор: Simovici, Dan A. Djeraba, Chabane
Название: Mathematical tools for data mining
ISBN: 1848002009 ISBN-13(EAN): 9781848002005
Издательство: Springer
Цена: 11549 р.
Наличие на складе: Нет в наличии.
Описание: Presents the mathematical foundations of data mining integrated with applications. This book includes a study of functions and relations. It provides graphs and hypergraphs. It covers partially ordered sets, lattices and Boolean algebras as well as finite partially ordered sets. It focuses on metric spaces. It also includes combinatorics.
Купить

Writing Security Tools and Exploits,

Автор: James C Foster
Название: Writing Security Tools and Exploits,
ISBN: 1597499978 ISBN-13(EAN): 9781597499972
Издательство: Elsevier Science
Цена: 3000 р.
Наличие на складе: Поставка под заказ.
Описание: "Writing Security Tools and Exploits" will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis.

Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed "Hacker Code Library v1.0".

"The Hacker Code Library" will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software. It provides readers with working code to develop and modify the most common security tools including Nmap and Nessus.

You can learn to reverse engineer and write exploits for various operating systems, databases, an applications and, learn to automate reporting and analysis of security log files.

Купить

Penetration Tester`s Open Source Toolkit,2

Автор: Chris Hurley
Название: Penetration Tester`s Open Source Toolkit,2
ISBN: 1597492132 ISBN-13(EAN): 9781597492133
Издательство: Elsevier Science
Цена: 3077 р.
Наличие на складе: Поставка под заказ.
Описание: Features over 300 pentesting applications included with BackTrack 2. This book offers information on Snort, Nessus, Wireshark, Metasploit, Kismet and other Open Source platforms. It helps you to: perform network reconnaissance, and master the objectives, methodology, and tools of the least understood aspect of a penetration test.
Купить


 
ООО "Логосфера " Тел:(495) 748-51-16 Факс: (495) 689-73-83 доб.116 www.logobook.ru
Visa, Master Card, Diners, AMEX, JCB, Web Money, Yandex Money Сбербанк онлайн