Archives: Shop

  • Designing Better Maps: A Guide for GIS Users, second edition, is a comprehensive guide to creating maps that communicate effectively. In Designing Better Maps, renowned cartographer Cynthia A. Brewer guides readers through the basics of good cartography, including layout design, scales, projections, color selection, font choices, and symbol placement. Designing Better Maps also describes the author's ColorBrewer application, an online color selection tool. The second edition includes a new chapter on map publishing.

  • The definitive, easy-to-follow guide to writing Python code with spatial data in ArcGIS Pro, whether you?re new to programming or not.Python Scripting for ArcGIS Pro starts with the fundamentals of Python programming and then dives into how to write useful Python scripts that work with spatial data in ArcGIS Pro. Learn how to execute geoprocessing tools, describe, create and update data, as well as execute a number of specialized tasks. See how to write simple, custom scripts that will automate your ArcGIS Pro workflows.Some of the key topics you will learn include:? Python fundamentals? Setting up a Python editor? Automating geoprocessing tasks using ArcPy? Exploring and manipulating spatial and tabular data? Working with geometries using cursors? Working with rasters and map algebra? Map scripting? Debugging and error handlingHelpful ?points to remember,? key terms, and review questions are included at the end of each chapter to reinforce your understanding of Python. Corresponding data and exercises are available online. Whether you want to learn Python or already have some experience, Python Scripting for ArcGIS Pro is the comprehensive, hands-on book for learning the versatility of Python coding as an approach to solving problems and increasing your productivity in ArcGIS Pro. Follow the step-by-step instruction and common workflow guidance for automating tasks and scripting with Python.Don't forget to also check out Esri Press's other Python title: Advanced Python Scripting for ArcGIS Pro (9781589486188)

  • In the tradition of the best-selling Getting to Know series, Getting to Know ArcGIS Pro, second edition teaches new and existing GIS users how to get started solving problems by visualizing, querying, creating, editing, analyzing, and presenting geospatial data in both 2D and 3D environments using ArcGIS Pro. This book teaches the basic functions and capabilities of ArcGIS Pro through practical project workflows and shows how to be productive with this essential component of the ArcGIS platform. The second edition has been updated for ArcGIS Pro 2.3.Note: This e-book requires ArcGIS software. You can download the ArcGIS Trial at http://www.esri.com/arcgis/trial, contact your school or business Esri Site License Administrator, or purchase a student or individual license through the Esri Store.

  • Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker?s repertoire?why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the ?system? in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer?s bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don?t work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer?s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

  • Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics?now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

  • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored The companion Web site features downloadable code files

  • Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data?even from organizations without a direct Internet connection?this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level?and this book shows you how to defend your high security network. Use targeted social engineering pretexts to create the initial compromise Leave a command and control structure in place for long-term access Escalate privilege and breach networks, operating systems, and trust structures Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

  • Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker?s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifactsWrite code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devicesData-mine popular social media websites and evade modern anti-virus

  • Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools?and how to build your own when the pre-built ones won't cut it.You'll learn how to:?Automate tedious reversing and security tasks?Design and program your own debugger?Learn how to fuzz Windows drivers and create powerful fuzzers from scratch?Have fun with code and library injection, soft and hard hooking techniques, and other software trickery?Sniff secure traffic out of an encrypted web browser session?Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and moreThe world's best hackers are using Python to do their handiwork. Shouldn't you?

  • The definitive guide?fully updated for Windows 10 and Windows Server 2016   Delve inside Windows architecture and internals, and see how core components work behind the scenes. Led by a team of internals experts, this classic guide has been fully updated for Windows 10 and Windows Server 2016. Whether you are a developer or an IT professional, you?ll get critical, insider perspectives on how Windows operates. And through hands-on experiments, you?ll experience its internal behavior firsthand?knowledge you can apply to improve application design, debugging, system performance, and support.     This book will help you: ·        Understand the Window system architecture and its most important entities, such as processes and threads ·        Examine how processes manage resources and threads scheduled for execution inside processes ·        Observe how Windows manages virtual and physical memory ·        Dig into the Windows I/O system and see how device drivers work and integrate with the rest of the system ·        Go inside the Windows security model to see how it manages access, auditing, and authorization, and learn about the new mechanisms in Windows 10 and Server 2016

  • Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker?s Handbook, Fifth Edition explains the enemy?s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition.?Build and launch spoofing exploits with Ettercap?Induce error conditions and crash software using fuzzers?Use advanced reverse engineering to exploit Windows and Linux software?Bypass Windows Access Control and memory protection schemes?Exploit web applications with Padding Oracle Attacks?Learn the use-after-free technique used in recent zero days?Hijack web browsers with advanced XSS attacks?Understand ransomware and how it takes control of your desktop?Dissect Android malware with JEB and DAD decompilers?Find one-day vulnerabilities with binary diffing?Exploit wireless systems with Software Defined Radios (SDR)?Exploit Internet of things devices?Dissect and exploit embedded devices?Understand bug bounty programs?Deploy next-generation honeypots?Dissect ATM malware and analyze common ATM attacks?Learn the business side of ethical hacking

  • The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.