Skip to main content

Books in Multimedia

11-20 of 63 results in All results

Joe Grand's Best of Hardware, Wireless, and Game Console Hacking

  • 1st Edition
  • August 18, 2006
  • Joe Grand + 9 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 0 9 6 6 - 2
The book introduces the principles of hardware design and describes the tools and techniques required to begin hacking. The DVD contains hack instructions for over 20 game consoles and hardware devices from Nintendo, Apple, Sony, Microsoft, Palm and more.The presentation of these 20 projects on DVD media provides users with benefits and options not available on the printed page. All images are hi-res color that can be enlarged or printed, the text is easily searched, and the user can copy the contents to their hard disk and add comments directly into the PDF files. The DVD media also lends itself well to group projects (it includes a 10 user license).The 160-page book includes chapters on hacking tools and electrical engineering basics, along with chapters on the background, design and functionality of each hardware device.

Multimedia Security Technologies for Digital Rights Management

  • 1st Edition
  • July 6, 2006
  • Wenjun Zeng + 2 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 6 3 8 9 - 6
Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and provide access to critical and time-sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their aspiring collegiate protégés with the latest technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes and weaknesses. Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book.

Syngress IT Security Project Management Handbook

  • 1st Edition
  • July 4, 2006
  • Susan Snedaker
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 9 7 7 - 3
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success.

QuickTime for .NET and COM Developers

  • 1st Edition
  • January 17, 2006
  • John Cromie
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 5 4 7 2 - 6
At the heart of Apple's hugely popular iLife software suite—iMovie, iPhoto, iDVD, GarageBand, and iTunes—is QuickTime, the powerful media engine that drives elegant applications for managing movies, images, and audio files. The enduring success of QuickTime is in no small part attributable to its component architecture. This key feature has allowed it to embrace emerging digital media technologies and standards one by one as they have appeared over the 12 or so years since its launch. None of the competing technologies even comes close, let alone on both Mac OS X and Windows.QuickTime for .NET and COM Developers is the first guide to QuickTime for developers using popular RAD tools such a Visual Basic .NET, C#, and Visual Basic 6. A general introduction to QuickTime is followed by a detailed explanation of the QuickTime architecture from a.NET and COM perspective, liberally accompanied by code snippets. A number of implementation examples illustrate key QuickTime features, ranging from a simple movie player to a sophisticated interactive application. Also covered is QuickTime scripting in both QuickTime Player (using Windows Scripting) and in Microsoft Office applications (using VBA). Brief guides to developing with QuickTime in Delphi and ATL/WTL are also included.Part of the official Quicktime Developer Series, publishing the finest books on QuickTime in cooperation with Apple.

Penetration Tester's Open Source Toolkit

  • 1st Edition
  • January 11, 2006
  • Jeremy Faircloth + 5 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 9 5 2 - 0
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader “inside their heads” to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing.

Sarbanes-Oxley Compliance Using COBIT and Open Source Tools

  • 1st Edition
  • October 7, 2005
  • Christian B Lahti + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 9 6 7 - 4
This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides examples of the Open Source infrastructure components that can and should be made compliant. In addition, the book clearly documents which Open Source tools you should consider using in the journey towards compliance. Although many books and reference material have been authored on the financial and business side of Sox compliance, very little material is available that directly address the information technology considerations, even less so on how Open Source fits into that discussion.Each chapter begins with an analysis of the business and technical ramifications of Sarbanes-Oxley as regards to topics covered before moving into the detailed instructions on the use of the various Open Source applications and tools relating to the compliance objectives.

Nessus, Snort, and Ethereal Power Tools

  • 1st Edition
  • September 14, 2005
  • Brian Caswell + 3 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 9 4 2 - 1
Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book.

Network+ Study Guide & Practice Exams

  • 1st Edition
  • June 17, 2005
  • Robert Shimonski
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 9 4 4 - 5
The Network+ Study Guide covers all the objectives on the CompTIA exam, including the features and functions of networking components, and ensuring that readers have the knowledge and skills needed to install, configure and troubleshoot basic networking hardware, protocols and services. It covers exam topics such as media and topologies, protocols and standards, network implementation, and network support, as well as new exam topics on technologies such as wireless networking and Ethernet.

Apple I Replica Creation

  • 1st Edition
  • February 17, 2005
  • Tom Owad
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 9 2 1 - 5
The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design. The book will begin by teaching readers the basics of computer processing by discussing the functionality of the 9 chip on the Apple I motherboard. From there, readers will be taught the basics of memory access and video input and output. Readers then learn how to assemble the various hardware components into a fully functioning Apple I replica. Finally, readers will learn how to write their own applications to take run on their new/old computer.

Hacking a Terror Network: The Silent Threat of Covert Channels

  • 1st Edition
  • January 27, 2005
  • Russ Rogers + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 8 8 8 - 2
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.