Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks, Al-Assouli Hedaia Mahmood


Варианты приобретения
Цена: 1747.00р.
Кол-во:
 о цене
Наличие: Отсутствует. 
Возможна поставка под заказ. Дата поступления на склад уточняется после оформления заказа


Добавить в корзину
в Мои желания

Автор: Al-Assouli Hedaia Mahmood
Название:  Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks
ISBN: 9781008983717
Классификация:


ISBN-10: 1008983713
Обложка/Формат: Paperback
Страницы: 48
Вес: 0.14 кг.
Дата издания: 25.03.2021
Язык: English
Размер: 27.94 x 21.59 x 0.25 cm
Читательская аудитория: General (us: trade)
Рейтинг:
Поставляется из: США
Описание:

Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system. During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible.


Footprinting refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. An Ethical hacker has to spend the majority of his time in profiling an organization, gathering information about the host, network and people related to the organization. Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected.

Network scanning is used to recognize available network services, discover and recognize any filtering systems in place, look at what operating systems are in use, and to protect the network from attacks. It can also be used to determine the overall health of the network.

Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system. The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit in the System gaining phase.

The objective of the report is to explain to the user Footprinting, Reconnaissance, Scanning and Enumeration techniques and tools applied to computer networks

The report contains of the following parts:

Part A: Lab Setup

Part B: Foot printing and Reconnaissance

Part C: Scanning Methodology

Part D: Enumeration





Earning Money Online through Crypto Currency Airdrops, Mining, Faucets and Trading

Автор: Al-Assouli Hedaia Mahmood
Название: Earning Money Online through Crypto Currency Airdrops, Mining, Faucets and Trading
ISBN: 0359129331 ISBN-13(EAN): 9780359129331
Издательство: Неизвестно
Рейтинг:
Цена: 1966.00 р.
Наличие на складе: Нет в наличии.

Описание:

A crypto faucet is a website that will give you satoshis in exchange for viewing ads or completing simple tasks. Crypto currency mining is the process in which transactions between users are verified and added into the block chain. The process of mining is also responsible for introducing new coins into the existing circulating supply and is one of the key elements that allow cryptocurrencies to work as a peer-to-peer decentralized network, without the need for a third party central authority.


Cloud mining happens in the "cloud." That basically means that the hardware used for mining is not physically located at your premises, but it is accessed remotely through the internet.


An airdrop, in the cryptocurrency business, is a marketing stunt that involves sending free coins or tokens to wallet addresses in order to promote awareness of a new virtual currency.


In Bounty programs, participants get cryptocurrencies in exchange for promotion.

A cryptocurrency exchange is any system that operates on the basis of trading cryptocurrencies with other assets.


There are also some on-line service designed for those who wants to exchange electronic currencies quickly, safely and at a favorable rate, such as: Webmoney, Perfect Money, AdvCash, Payeer, Skrill, Neteller, Epay, Payza, PayPal, Visa/Master Card, Western uniоn, MoneyGram, Bitcoin, Ethereum, Litecoin.


This work will guide the user to a list of online sources to earn money in the internet through crypto faucets, mining, cloud mining, airdrops and bounties. Then I will list some of the best online crypto currency exchanges and electronic currencies exchangers that can be used.


The book consists from the following parts:

1. Some sources for crypto faucets

2. Definition of cryptocurrrency mining and cloud minining

3. Some useful websites for cryptocurrency mining and cloud minining

4. Airdrop and Bounty definitions

5. Some online sources to look for airdrops and bounties events

6. Some Youtube channels to fellow up latest airdrops, faucets and mining websites

7. Some websites to get information about cryptocurrency prices and market capitalization

8. Some trusted cryptocurrency exchanges

9. Some exchanger monitoring platforms

10. Some electronic currencies exchangers

Signal, Audio and Image Processing

Автор: Al-Assouli Hedaia Mahmood
Название: Signal, Audio and Image Processing
ISBN: 1716729475 ISBN-13(EAN): 9781716729478
Издательство: Неизвестно
Рейтинг:
Цена: 3276.00 р.
Наличие на складе: Нет в наличии.

Описание:

This project shows some selected signal techniques, including image and audio processing, using the Matlab digital signal processing and image processing toolboxes. The project is divided to 3 parts.


Part I includes design and implementation of different types of filters for filtering signal that has different sinusoidal frequency components or noise. The comparison was made between FIR low pass flter, butterworth filter, Chebycheve Type I low pass filter and Chebycheve Type II low pass filter. Then different types of IIR Butterworth filters were designed and implemented to filter a signal that has many harmonics components, including low pass filter, high pass filter, stop band filter and band pass filter.


Part II examined audio filtering in the sense of specific frequency suppression and extraction. There are many different types of filters available for the construction of filters. We will specifically use the Butterworth filter. An audio signal was read and different types of filters, including low pass filter, high pass filter, stop band filter and band pass filter, were designed and implemented in order to filter the audio signal from some frequency bands. Then the discrete cosine transform compression examined on the audio signal at different compression rates: 50%, 75%, 87.5%

Part III deals with image processing; the project shows examples in smoothing, sharpening, and edge detection. Other useful operations on the image were tested, including image cropping, image resizing, image, histogram equalization and altering image brightness

Review of Some Text to Speech Converters, Voice Changers, Video Editors, Animators, Speaking Avatar Makers and Live Streamers

Автор: Al-Assouli Hedaia
Название: Review of Some Text to Speech Converters, Voice Changers, Video Editors, Animators, Speaking Avatar Makers and Live Streamers
ISBN: 1716025230 ISBN-13(EAN): 9781716025235
Издательство: Неизвестно
Рейтинг:
Цена: 3276.00 р.
Наличие на складе: Нет в наличии.

Описание:

As videos are so much important todays, I believe that everyone must have some knowledge on creating and editing videos for of common tasks required by his personal or business use.


This book has mainly an objective to evaluate some text to speech converters, voice changers, video editors, cartoon animators and video recording and live streaming programs.


As I am Arabic, I gave special importance to look for the best tools that can convert Arabic text to voice with good quality because of the lack of these tools. And I also gave special importance to look for the best tools that can change the voice tune as a lot of people don't like to make videos with their voice for special reasons. Then I gave quick guide on how to use the two important video editors, VSDC Free Video Editor and Camtasia Studio. Then I gave quick guide on how to use two websites that enable people to create cartoon animation videos in a simple way, https: //www.animaker.com/ website and https: //www.powtoon.com website. Then I gave quick guide on how to us one of the best animator programs, which is Reallusion Cartoon Animator 4. I explained also how it is possible to make face mockup through Cartoon Animator 4Motion Live 2D Plugin. Then I introduced Adobe Character Animator as alternative program to make face mockup. Finally I explained about one of the video recording and live streaming programs, which is OBS Studio. I mentioned briefly how to setup OBS studio to create livestream video on Youtube and Facebook. At the end, I showed how to use Voki website to create customizable speaking avatars


This work is divided to the following sections.

1. Some tools to reshape the Arabic letters so they can be converted to voice in other tools.

2. Some tools to convert English text to speech TTS.

3. Some tools to convert Arabic text to speech TTS.

4. Evaluation of some voice changers

5. Creating video of audio file with list of images (slideshow) using VSDC Free Video Editor.:

6. Screen capture using VSDC Free Video Editor.

7. Video capture using VSDC Free Video Editor.

8. Using https: //www.animaker.com/ website to create simple cartoon animation video.

9. Using https: //www.powtoon.com website to create animation video.

10. Using Camtasia Studio Video Editor

11. Using Camtasia Studio Recorder

12. Using Reallusion Cartoon Animator 4:

13. Making Face Mockup on Cartoon Animator 4 through Motion Live 2D Plugin

14. Introduction to Adobe Character Animator

15. Setting OBS Studio for live stream:

16. Creating live stream video on Youtube with OBS studio:

17. Creating Live stream video on Facebook with OBS studio:

18. Using Voki website https: //www.voki.com/ to create customizable speaking avatars.


Zoom Video Conferencing Beginner`s Guide

Автор: Al-Assouli Hedaia Mahmood
Название: Zoom Video Conferencing Beginner`s Guide
ISBN: 1008988464 ISBN-13(EAN): 9781008988460
Издательство: Неизвестно
Рейтинг:
Цена: 1310.00 р.
Наличие на складе: Нет в наличии.

Описание:

Zoom is a video telephony software program developed by Zoom Video Communications.

Zoom is a free (plus paid-for options) video conferencing tool that can be used on PCs, Macs and mobile devices.The free plan provides a video chatting service that allows up to 100 participants concurrently, with a 40-minute time restriction, and there are lots of features to support collaborative working..

In this report, I'll just give quick guide on how to sign up and use the Zoom application. The report contains the following sections:

1. Downloading and installing the Zoom application:

2. Starting new immediate meeting:

3. Joining a meeting:

4. Scheduling a meeting:



Wireless and Mobile Hacking and Sniffing Techniques

Автор: Al-Assouli Hedaia Mahmood
Название: Wireless and Mobile Hacking and Sniffing Techniques
ISBN: 1008982849 ISBN-13(EAN): 9781008982840
Издательство: Неизвестно
Рейтинг:
Цена: 2621.00 р.
Наличие на складе: Нет в наличии.

Описание:

Sniffing is the process of monitoring and capturing all the packets passing through a given network using sniffing tools. It is a form of "tapping phone wires" and get to know about the conversation. It is also called wiretapping applied to the computer networks.

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.


There are several ways how hackers can gain access to a public WiFi network and infiltrate connected devices to steal data. The most common practice that hackers use is called sniffing. This method allows hackers to hijack any packet of data that is being transmitted between a device and a router.


The mobile device has become an inseparable part of life today. The attackers are easily able to compromise the mobile network because of various vulnerabilities, the majority of the attacks are because of the untrusted apps. SMS is another way the attackers are gaining access to the mobile devices by sending phishing messages/spam messages to user


This report covers the main Wireless and Mobile Hacking and Sniffing Techniques. The report contains the following pars:

- Part A: Setup Lab

- Part B: Sniffer and Phishing Hacking

- Part C: Wireless Hacking Networks in Linux

- Part D: Mobile Platforms Hacking


Quick Guide for Creating Wordpress Online Store and Online Magazine, Creating EPUB E-books Using EPUB Editors and Converters, and Overview of Some Int

Автор: Al-Assouli Hedaia Mahmood
Название: Quick Guide for Creating Wordpress Online Store and Online Magazine, Creating EPUB E-books Using EPUB Editors and Converters, and Overview of Some Int
ISBN: 1716289572 ISBN-13(EAN): 9781716289576
Издательство: Неизвестно
Рейтинг:
Цена: 4805.00 р.
Наличие на складе: Нет в наличии.

Описание:

The aim from this book to provide a quick guide for creating wordpress online store and online magazine, creating epub e-books using epub editors and converters, and an overview of some internet fax, voice over ip calls and sms verifications services providers. The book id divided into four parts:

- I.Part A: Creating Wordpress Online Store and Wordpress Online Magazine

- II. Part B: Comparison between Internet Fax Services

- III. Part C: Overview of Some Voice Over IP Calls and SMS Verifications Services Providers

- IV. Part D: Creating EPUB E-books Using EPUB Editors and Converters

I.Part A: Creating Wordpress Online Store and Wordpress Online Magazine

The objective of this work is to develop a Word Press Online Store with Different Ecommerce Plugins and Themes and Word Press Online Magazine with MH Magazine Theme.The work consists of three parts:

- 1. Building Personal Websie with online shop the sell Ebooks:

- 2. Building Ecomerce website with mystile theme and woocommerce plugin

- 3. Building Online magazine website with MH-Magazine theme

II. Part B: Comparison between Internet Fax Services

As getting cheap internet fax service is important, I tried to look for cheap internet fax service that can fax to any country worldwide and can also use PayPal as it is safe payment than credit card. Unfortunately, I could not find cheap fax service for international destination. All internet fax services offer only cheap services to the free zones countries such as USA and Canada. I could not find cheap service to international destinations

III. Part C: Overview of Some Voice Over IP Calls and SMS Verifications Services Providers

This part provides brief survey of the some Voice Over IP (VOIP) providers, including the providers that offers free calls to some countries. Then, I will mention some websites that offer virtual phone numbers from around the world to receive activation codes and SMS confirmations online.

IV. Part D: Creating EPUB E-books Using EPUB Editors and Converters

I devoted this part of the book to evaluate some tools that can be used for creating, validating and editing E-books to be in proper Epub format without errors.





Configuration and Evaluation of Some Microsoft and Linux Proxy Servers, Security, Intrusion Detection, AntiVirus and AntiSpam Tools

Автор: Al-Assouli Hedaia Mahmood
Название: Configuration and Evaluation of Some Microsoft and Linux Proxy Servers, Security, Intrusion Detection, AntiVirus and AntiSpam Tools
ISBN: 1716297354 ISBN-13(EAN): 9781716297359
Издательство: Неизвестно
Рейтинг:
Цена: 4150.00 р.
Наличие на складе: Нет в наличии.

Описание:

The book consists from three parts:

- Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server

- Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools

- Part C: Quick Configuration of Postfix Mail Server to Support Anti Spam and Anti Virus Using Two Methods

I. Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server.

Part A concerns about basic Microsoft ISA server and Linux Squid Server configuration As a lot of technicians switch between ISA server and Squid server, I decided to write this paper to present some reference when configuring ISA and Squid. There a lot of issues that not covered, and you can go to the manual of ISA server and Squid server for detailed configuration of ISA and Squid. The paper is composed from two parts

Microsoft ISA server 2004 Configuration

Linux Squid Server Configuration

II. Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools

Part B evaluates some the security tools. Top security tools can be found in http: //sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:

LANguard, Nessus, Snort, BASE, ACID, Rman, SnortCenter, OSSEC, Sguil


III. Part C: Quick Configuration of Postfix Mail Server to Support Anti Spam and Anti Virus Using Two Methods

In Part C, I configured the Postfix mail server that support the Anti-Spam and Anti-Virus, using two methods, for sake of evaluation and realizing which method can be considered to be the best,

- Method 1: With Postfix, SpamAssassin, ClamAV and Amavis-new

- Method 2: With Postfix, SpamAssassin, ClamAV and Procmail


Quick Guide for Using External Memory Card to Increase Internal Storage Space of Android Devices

Автор: Al-Assouli Hedaia Mahmood
Название: Quick Guide for Using External Memory Card to Increase Internal Storage Space of Android Devices
ISBN: 3969536553 ISBN-13(EAN): 9783969536551
Издательство: Неизвестно
Рейтинг:
Цена: 2839.00 р.
Наличие на складе: Нет в наличии.

Описание:

As we all know, there are many Android phones are facing low internal memory issue when installing games and apps. This problem is especially serious in budget phones because most of these phones have little memory; for example, some Android phones only have 4G memory.

If you are running insufficient storage space on your Android phone, you can expand and increase internal memory through several different methods.

The common methods that can help to increase internal storage space of android.

- Method 1. Turn to cloud storage

- Method 2. Use USB OTG storage

- Method 3. Delete unwanted Apps and clean all the history and cache

- Method 4. Use Memory card to increase internal storage space of Android device.

- Method 5. Use Terminal Emulator App

- Method 6. Use Mounts2SD App

- Methods 7: Install and Run GOM Saver to Increase Storage Space on Android Phone

- Method 8: Install Root External 2 Internal SD App

In this report I will investigate the possible methods that can be used to increase the internal storage of Android device. I will also show how to troubleshoot and solve certain problem that we get when having Android devices. The report consists from the following parts:

1. Turning to cloud storage.

2. Using USB OTG storage.

3. Deleting unwanted Apps and clean all the history and cache.

4. How to root an android device.

5. Using external memory card to increase internal storage space of Android device.

6. Using Apps2SD App.

7. How to partition and format disks in windows using Diskpart tool.

8. Using Terminal Emulator App

9. How to transfer your Google Authenticator 2FA to a new phone.

10. How to install the ADB Driver on your Windows PC to communicate with an android device.

11. Installing Init.d, Busybox and mound2SD Apps on an Android device to increase the internal memory.

12. How to unlock the boot loader via fastboot on Android.

13. Installing TWRP custom recovery on an android device.

14. Installing ClockworkMod CWM recovery on an android phone.

15. Installing GOM Saver to increase storage space on Android device.

16. Installing Root External 2 Internal SD APK.

17. Installing Custom Rom.

18. How to recover your deleted Whatsapp messages.

19. How to backup Android devices personal data.

20. How to root the Samsung GT-S5310 using Odin flash tool:

21. How to root the Samsung Galaxy A7 (SM-A700FD)

22. How to flash the Samsung Galaxy A7 (SM-A700FD) with firmware file.

23. How to root Galaxy A7 A700FD] and install TWRP Recovery

24. How to root the Android device using Magisk

25. How to use Magisk to hide the root for Apps that can't accept to be installed in rooted devices




Power Electronics

Автор: Al-Assouli Hedaia Mahamood
Название: Power Electronics
ISBN: 1648998577 ISBN-13(EAN): 9781648998577
Издательство: Неизвестно
Рейтинг:
Цена: 2917.00 р.
Наличие на складе: Поставка под заказ.

Описание:

This book includes my lecture notes for power electronics course course. The characteristics and operation of electronic power devices, firing circuits, and driving circuits for power converters are described and implemented practically in the laboratory. Uncontrolled and controlled, single phase rectifiers are used in various electrical power applications. DC to DC power conversion circuits are investigated. Circuit simulation and practical laboratories are utilized to reinforce concepts.

The book is divided to different learning parts

- Part1- Describe the characteristics and operation of electronic power devices.

- Part2- Describe firing and driving circuits for power electronic converters.

- Part3- Analyse the use of uncontrolled and controlled single-phase rectifiers in various electrical power applications.

- Part4- Investigate the DC-to-DC power conversion circuits used in power applications.

Part1: Describe the characteristics and operation of electronic power devices.

1. Describe diode characteristics, types (power diode, general-purpose, and fast recovery), and connections (series, parallel and freewheeling).

2. Describe thyristor characteristics, two-transistor model, and purpose of di/dt and dv/dt protection.

3. Describe the power MOSFET and IGBT characteristics.

4. Compare electronic power devices in terms of various power converter applications, frequency of operation (switching speed), rating, and switching power losses.

Part 2: Describe firing and driving circuits for power electronic converters.

1. Describe ideal and non-ideal properties of operational amplifiers. Determine the operation of various related circuits (inverting and non-inverting amplifiers, buffer amplifier, summing amplifier)

2. Describe the use of an operational amplifier for PWM generation, for triangular and sine wave generation, as a comparator, and its integration into a 555 timer.

3. Explore other basic firing and driving circuits by focusing on requirements and control features such as based on specific power devices and operational amplifier.

Part 3: Analyse the use of uncontrolled and controlled single-phase rectifiers in various electrical power applications.

1. Determine the performance characteristics of uncontrolled single-phase, half-wave and full-wave rectifiers, with resistive and inductive loads.

2. Determine the performance characteristics of controlled single-phase, half-wave and full-wave rectifiers with resistive and inductive loads.

3. Determine the change in power factor when using uncontrolled and controlled rectifiers. Define input distortion and displacement factor.

4. Describe how power inversion may be achieved by varying the firing angle in controlled rectifiers.

Part 4: Investigate the DC-to-DC power conversion circuits used in power applications.

1. State the principle of step-down and step-up operations.

2. Explain the DC chopper classification and describe switch-mode regulators

3. Explain the operation of buck, boost

4. Explain the operation buck-boost regulators.



ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия