Skip to main content

Books in Social sciences and humanities

    • The Real MCTS/MCITP Exam 70-646 Prep Kit

      Independent and Complete Self-Paced Solutions
      • 1st Edition
      • Anthony Piltzecker
      • English
      This exam is designed to validate skills as a Windows Server 2008 Server Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-646.The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCITP candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. A MCITP Server Administrator is responsible for the operations and day-to-day management of an infrastructure of servers for an enterprise organization. Server administrators manage the infrastructure, web, and IT application servers, and use scripts to accomplish tasks on a regular basis. They conduct most server management tasks remotely by using Terminal Server or administration tools installed on their local workstation. MCITP Server Administrators also support engineering projects, and are responsible for server builds and configuration.
    • UNIX and Linux Forensic Analysis DVD Toolkit

      • 1st Edition
      • Chris Pogue + 2 more
      • English
      This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by the attacker. The book begins with a chapter to describe why and how the book was written, and for whom, and then immediately begins addressing the issues of live response (volatile) data collection and analysis. The book continues by addressing issues of collecting and analyzing the contents of physical memory (i.e., RAM). The following chapters address /proc analysis, revealing the wealth of significant evidence, and analysis of files created by or on UNIX systems. Then the book addresses the underground world of UNIX hacking and reveals methods and techniques used by hackers, malware coders, and anti-forensic developers. The book then illustrates to the investigator how to analyze these files and extract the information they need to perform a comprehensive forensic analysis. The final chapter includes a detailed discussion of loadable kernel Modules and malware. Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else.
    • Netcat Power Tools

      • 1st Edition
      • Jan Kanclirz
      • English
      Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.* Get Up and Running with Netcat Simple yet powerful...Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.* Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town...Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.
    • Scene of the Cybercrime

      • 2nd Edition
      • Debra Littlejohn Shinder + 1 more
      • English
      When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months. Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard. Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless. It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws.
    • The Psychology of Learning and Motivation

      Advances in Research and Theory
      • 1st Edition
      • Volume 49
      • English
      The Psychology of Learning and Motivation publishes empirical and theoretical contributions in cognitive and experimental psychology, ranging from classical and instrumental conditioning to complex learning and problem solving. Volume 49 contains chapters on short-term memory, theory and measurement of working memory capacity limits, development of perceptual grouping in infancy, co-constructing conceptual domains through family conversations and activities, the concrete substrates of abstract rule use, ambiguity, accessibility, and a division of labor for communicative success, and lexical expertise and reading skill.
    • Managing Relationships with Industry

      A Physician's Compliance Manual
      • 1st Edition
      • Steven C. Schachter + 3 more
      • English
      Now more than ever, doctors are being targeted by government prosecutors and whistleblowers challenging the legality of their relationships with drug and device companies. With reputations at stake and the risk of civil and criminal liability, it is incumbent upon doctors to protect themselves. Managing Relationships with Industry: A Physician’s Compliance Manual is an indispensable resource for doctors, professional societies, academic medical centers, community hospitals, and group practices struggling to understand the ever changing law and ethical standards on interactions with pharmaceutical and device companies. It is the first comprehensive summary of the law and ethics on physician relationships with industry written for the physician. Authored by a former state Attorney General, Harvard Medical School Professor, health care lawyer and professor of ethics, Managing Relationships approaches the topic from a balanced and reasoned perspective adding to the on-going national dialogue and debate on the proper limits to medicine’s relationship with industry.
    • The Best Damn Windows Server 2008 Book Period

      • 2nd Edition
      • Anthony Piltzecker
      • English
      Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller.
    • Nagios 3 Enterprise Network Monitoring

      Including Plug-Ins and Hardware Devices
      • 1st Edition
      • Andrew Hay + 4 more
      • English
      The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you. Once up and running, you'll see how a number of useful add-ons and enhancements for Nagios can extend the functionality of Nagios throughout your organization. And, if you want to learn how to write your own plugins...this is the book for you! In these pages you'll find a cookbook-style chapter full of useful plugins that monitor a variety of devices, from HTTP-based applications to CPU utilization to LDAP servers and more.
    • Organising Knowledge in a Global Society

      Principles and Practice in Libraries and Information Centres
      • 1st Edition
      • Philip Hider + 1 more
      • English
      Organising Knowledge in a Global Society updates the successful first edition, which has been widely used as an introduction to the field of information organisation, both in Australia and overseas. The work reflects current practice and trends, paying particular attention to how libraries and other information services provide intellectual access to digital information resources through metadata. In this revision, the various information organisation components of the Web 2.0 phenomenon are discussed, including social tagging and folksonomies. The new edition also covers the latest developments in metadata standards, such as Resource Description and Access, and information retrieval systems such as the increasing support for faceted navigation. Examples and case studies have been updated throughout.
    • Information History - An Introduction

      Exploring an Emergent Field
      • 1st Edition
      • Toni Weller
      • English
      This is a pioneering introduction to the emergent field of information history. It explores how the contemporary values and concerns of our own information society have helped lead to a reconsideration of our history, and of what constitutes our historical understanding of information in the twenty-first century. In Information History, Toni Weller examines the historiography of information and asks how the key schools of thought have explored the concept in terms of its social, technological, economic and cultural understandings. Based on personal experiences, the author also proposes some practical applications of information history in research and university teaching, offering some suggestions as to how the field may develop based on its growth during the last decade.