Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Evaluation of Some Online Payment Providers Services, Alasooly Hedaya Mahmood


Варианты приобретения
Цена: 3276.00р.
Кол-во:
 о цене
Наличие: Отсутствует. 
Возможна поставка под заказ. Дата поступления на склад уточняется после оформления заказа


Добавить в корзину
в Мои желания

Автор: Alasooly Hedaya Mahmood
Название:  Evaluation of Some Online Payment Providers Services
ISBN: 9781716623707
Классификация:




ISBN-10: 1716623707
Обложка/Формат: Paperback
Страницы: 100
Вес: 0.25 кг.
Дата издания: 18.12.2020
Язык: English
Размер: 27.99 x 21.59 x 0.53 cm
Читательская аудитория: General (us: trade)
Рейтинг:
Поставляется из: США


Starting Guide for Postfix Mail Server Configuration Supporting Anti Spam and Anti Virus

Автор: Alasooly Hedaya Mahmood
Название: Starting Guide for Postfix Mail Server Configuration Supporting Anti Spam and Anti Virus
ISBN: 1008985023 ISBN-13(EAN): 9781008985025
Издательство: Неизвестно
Рейтинг:
Цена: 2184.00 р.
Наличие на складе: Нет в наличии.

Описание:

This work provides starting guide for simple Postfix mail server configuration. Then I configured the Postfix mail server to support Anti-Spam and Anti-Virus, using two methods.

  • Method 1: With Postfix, SpamAssassin, ClamAV and Amavis-new
  • Method 2: With Postfix, SpamAssassin, ClamAV and Procmail

The report includes the following sections

1. How Postfix receives mail:

2. How Postfix delivers mail

3. Starting guide for quick Postfix configuration

4. Postfix mail server and Dovecot configuration

5. Installing ClamAV and SpamAssassin

6. Installing and configuring Squirrelmail:

7. Method 1 to support Antivirus and Antispam: Using Postfix, Amavis-new, ClamAV, SpamAssassin

8. Method 2 to support Antivirus and Antispam: Using Postfix, Procmail, ClamAV, SpamAssassin


Configuration of Apache Server to Support ASP

Автор: Alasooly Hedaya Mahmood
Название: Configuration of Apache Server to Support ASP
ISBN: 1008984523 ISBN-13(EAN): 9781008984523
Издательство: Неизвестно
Рейтинг:
Цена: 2184.00 р.
Наличие на складе: Нет в наличии.

Описание:

The paper aim is to configure Apache Server to support ASP. Two methods were tested. The first, by installing Bundle:: Apache:: ASP, and the second, by installing SUN ONE ASP Server. Two possible options for connecting to a Microsoft Access database with Sun ONE ASP for UNIX or Linux, using the using SequeLink, and using the Sun ONE ASP Database Publisher tool to migrate an Access database to MySQL, were studied. The paper is composed from the following parts,

1. Setting up working environment when working with CodeCharge Studio program, software for building web applications.

2. Connecting to databases in ASP.

3. ASP program example.

4. Configuring apache server to support ASP by installing Bundle:: Apacahe:: ASP.

5. Configuring apache server to support ASP by installing Sun ONE ASP.

Methods to Increase the Internal Storage Space of Android Devices

Автор: Alasooly Hedaya Mahmood
Название: Methods to Increase the Internal Storage Space of Android Devices
ISBN: 171647793X ISBN-13(EAN): 9781716477935
Издательство: Неизвестно
Рейтинг:
Цена: 2839.00 р.
Наличие на складе: Нет в наличии.

Описание:

As we all know, there are many Android phones are facing low internal memory issue when installing games and apps. This problem is especially serious in budget phones because most of these phones have little memory; for example, some Android phones only have 4G memory.


If you are running insufficient storage space on your Android phone, you can expand and increase internal memory through several different methods.


The common methods that can help to increase internal storage space of android.

- Method 1. Turn to cloud storage

- Method 2. Use USB OTG storage

- Method 3. Delete unwanted Apps and clean all the history and cache

- Method 4. Use Memory card to increase internal storage space of Android device.

- Method 5. Use Terminal Emulator App

- Method 6. Use Mounts2SD App

- Methods 7: Install and Run GOM Saver to Increase Storage Space on Android Phone

- Method 8: Install Root External 2 Internal SD App


In this report I will investigate the possible methods that can be used to increase the internal storage of Android device. I will also show how to troubleshoot and solve certain problem that we get when having Android devices. The report consists from the following parts:


1. Turning to cloud storage.

2. Using USB OTG storage.

3. Deleting unwanted Apps and clean all the history and cache.

4. How to root an android device.

5. Using external memory card to increase internal storage space of Android device.

6. Using Apps2SD App.

7. How to partition and format disks in windows using Diskpart tool.

8. Using Terminal Emulator App

9. How to transfer your Google Authenticator 2FA to a new phone.

10. How to install the ADB Driver on your Windows PC to communicate with an android device.

11. Installing Init.d, Busybox and mound2SD Apps on an Android device to increase the internal memory.

12. How to unlock the boot loader via fastboot on Android.

13. Installing TWRP custom recovery on an android device.

14. Installing ClockworkMod CWM recovery on an android phone.

15. Installing GOM Saver to increase storage space on Android device.

16. Installing Root External 2 Internal SD APK.

17. Installing Custom Rom.

18. How to recover your deleted Whatsapp messages.

19. How to backup Android devices personal data.

20. How to root the Samsung GT-S5310 using Odin flash tool:

21. How to root the Samsung Galaxy A7 (SM-A700FD)

22. How to flash the Samsung Galaxy A7 (SM-A700FD) with firmware file.

23. How to root Galaxy A7 A700FD] and install TWRP Recovery

24. How to root the Android device using Magisk

25. How to use Magisk to hide the root for Apps that can't accept to be installed in rooted devices



Evaluation of Some Windows and Linux Intrusion Detection Tools

Автор: Alasooly Hedaya Mahmood
Название: Evaluation of Some Windows and Linux Intrusion Detection Tools
ISBN: 1716728266 ISBN-13(EAN): 9781716728266
Издательство: Неизвестно
Рейтинг:
Цена: 1529.00 р.
Наличие на складе: Нет в наличии.

Описание:

The paper evaluates some the security tools. Top security tools can be found in http: //sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:

  • LANguard
  • Nessus
  • Snort
  • BASE
  • ACID
  • Rman
  • SnortCenter.
  • OSSEC
  • Sguil



Power Factor Correction

Автор: Alasooly Hedaya Mahmood
Название: Power Factor Correction
ISBN: 1716038146 ISBN-13(EAN): 9781716038143
Издательство: Неизвестно
Рейтинг:
Цена: 4805.00 р.
Наличие на складе: Нет в наличии.

Описание:

Power systems have two components of apparent power: active and reactive power. Both components are necessary for functioning of electrical systems. The active power is the average power absorbed by the resistive load. The reactive power is the measure of energy exchange between the source and reactive power of load. Energy storage devices do not dissipate or supply power, but exchange power with the rest of system.

Active power is the one that is converted to other forms of energy in the load yet reactive power is only responsible for magnetizing purposes. Power factor is a ratio depicting how much of the power supplied is real. The reactive current contribute in the value of the overall magnitude of current in transmission lines causing unnecessarily high line currents and low power factor.

Since a low power factor means higher amount of apparent power need to be supplied by the utility company, thus the company must also use bigger generators, large transformers and thicker transmission/distribution lines. This requires a higher capital expenditure and operational cost which usually result in the cost being passed to the consumer.

In this research, we seek to identify the effects of a low power factor on Swaziland Electricity Company's power supply system and recommend possible solutions to the problem. The results are useful in determining how to optimally deliver power to a load at a power factor that is reasonably close to unity, thus reducing the utility's operational costs while increasing the quality of the service being supplied.

TABLE OF CONTENTS


- ABSTRACT


- CHAPTER 1: INTRODUCTION


- CHAPTER 2: LITERATURE REVIEW


- CHAPTER 3: RESEARCH METHODOLOGY


- CHAPTER 4: DATA COLLECTION


- CHAPTER 5: RESULTS AND ANALYSIS OF THE SIMULATION MODEL


- CHAPTER 6: BENEFITS OF POWER FACTOR CORRECTION


- CHAPTER 7: FINDINGS, RECOMMENDATIONS AND CONCLUSIONS


- REFERENCES


- APPENDIXES


- Appendix A: Load Profiles


- Appendix B - Substations


- Appendix C: Simulation Results


Some Tutorials in Computer Networking Hacking

Автор: Alasooly Hedaya Mahmood
Название: Some Tutorials in Computer Networking Hacking
ISBN: 1387861867 ISBN-13(EAN): 9781387861866
Издательство: Неизвестно
Рейтинг:
Цена: 4368.00 р.
Наличие на складе: Нет в наличии.

Описание:

The objective of this work is to provide some quick tutorials in computer networking hacking.


The work includes the following tutorials:


  • Tutorial 1: Setting Up Penetrating Tutorial in Linux.
  • Tutorial 2: Setting Up Penetrating Tutorial in Windows.
  • Tutorial 3: OS Command Injection:
  • Tutorial 4: Basic SQL Injection Commands.
  • Tutorial 5: Manual SQL injection using order by and union select technique.
  • Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection.
  • Tutorial 7: Uploading Shell in the Site having LFI.
  • Tutorial 8: Advanced Way for Uploading Shell
  • Tutorial 9: Uploading shell Using Sqli Command.
  • Tutorial 10: Uploading Shell Using SQLmap
  • Tutorial 11: Post Based SQL Injection
  • Tutorial 12: Cracking the Hashes Using Hashcat.
  • Tutorial 13: Hacking windows 7 and 8 through Metasploite
  • Tutorial 14: Tutorial on Cross Site Scripting
  • Tutorial 15: Hacking Android Mobile Using Metasploit
  • Tutorial 16: Man of the middle attack:
  • Tutorial 17: Using SQLmap for SQL injection
  • Tutorial 18: Hide Your Ip
  • Tutorial 19: Uploading Shell and Payloads Using SQLmap
  • Tutorial 20: Using Sql Shell in SQLmap
  • Tutorial 21: Blind SQL Injection
  • Tutorial 22: Jack Hridoy SQL Injection Solution
  • Tutorial 23: Using Hydra to Get the PasswordTutorial 24: Finding the phpmyadmin page using websploit.
  • Tutorial 25: How to root the server using back connect
  • Tutorial 25: How to root the server using back connect
  • Tutorial 26: HTML Injection
  • Tutorial 27: Tutuorial in manual SQl Injection
  • Tutorial 28: Venom psh-cmd-exe payload
  • Tutorial 29: Cross site Request Forgery (CSRF)
  • Tutorial 30: Disable Victim Computer
  • Tutorial 31: Exploit any firefox by xpi_bootstrapped addon
  • Tutorial 32: Hack android mobile with metasploit
  • Tutorial 33: PHP Code Injection to Meterpreter Session
  • Tutorial 34: Basic google operators
  • Tutorial 35: Hacking Credit Cards with google
  • Tutorial 36: Finding Vulnerable Websites in Google
  • Tutorial 37: Using the httrack to download website
  • Tutorial 38: Getting the credit cards using sql injection and the SQLi dumper
  • Tutorial 39: Using burp suite to brute force password
The Hedaya, or Guide: A Commentary on the Mussulman Laws.

Автор: Marghinani Ali Ibn Abi Bakr, Hamilton Charles
Название: The Hedaya, or Guide: A Commentary on the Mussulman Laws.
ISBN: 1289355517 ISBN-13(EAN): 9781289355517
Издательство: Неизвестно
Цена: 5472.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия