Archives: Shop

  • Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data?even from organizations without a direct Internet connection?this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level?and this book shows you how to defend your high security network. Use targeted social engineering pretexts to create the initial compromise Leave a command and control structure in place for long-term access Escalate privilege and breach networks, operating systems, and trust structures Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

  • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored The companion Web site features downloadable code files

  • Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics?now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

  • Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker?s repertoire?why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the ?system? in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer?s bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don?t work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer?s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

  • In the tradition of the best-selling Getting to Know series, Getting to Know ArcGIS Pro, second edition teaches new and existing GIS users how to get started solving problems by visualizing, querying, creating, editing, analyzing, and presenting geospatial data in both 2D and 3D environments using ArcGIS Pro. This book teaches the basic functions and capabilities of ArcGIS Pro through practical project workflows and shows how to be productive with this essential component of the ArcGIS platform. The second edition has been updated for ArcGIS Pro 2.3.Note: This e-book requires ArcGIS software. You can download the ArcGIS Trial at http://www.esri.com/arcgis/trial, contact your school or business Esri Site License Administrator, or purchase a student or individual license through the Esri Store.

  • The definitive, easy-to-follow guide to writing Python code with spatial data in ArcGIS Pro, whether you?re new to programming or not.Python Scripting for ArcGIS Pro starts with the fundamentals of Python programming and then dives into how to write useful Python scripts that work with spatial data in ArcGIS Pro. Learn how to execute geoprocessing tools, describe, create and update data, as well as execute a number of specialized tasks. See how to write simple, custom scripts that will automate your ArcGIS Pro workflows.Some of the key topics you will learn include:? Python fundamentals? Setting up a Python editor? Automating geoprocessing tasks using ArcPy? Exploring and manipulating spatial and tabular data? Working with geometries using cursors? Working with rasters and map algebra? Map scripting? Debugging and error handlingHelpful ?points to remember,? key terms, and review questions are included at the end of each chapter to reinforce your understanding of Python. Corresponding data and exercises are available online. Whether you want to learn Python or already have some experience, Python Scripting for ArcGIS Pro is the comprehensive, hands-on book for learning the versatility of Python coding as an approach to solving problems and increasing your productivity in ArcGIS Pro. Follow the step-by-step instruction and common workflow guidance for automating tasks and scripting with Python.Don't forget to also check out Esri Press's other Python title: Advanced Python Scripting for ArcGIS Pro (9781589486188)

  • Designing Better Maps: A Guide for GIS Users, second edition, is a comprehensive guide to creating maps that communicate effectively. In Designing Better Maps, renowned cartographer Cynthia A. Brewer guides readers through the basics of good cartography, including layout design, scales, projections, color selection, font choices, and symbol placement. Designing Better Maps also describes the author's ColorBrewer application, an online color selection tool. The second edition includes a new chapter on map publishing.

  • Map Use: Reading, Analysis, Interpretation, eighth edition, is a comprehensive, foundational textbook designed for the college curriculum. Updated with a new chapter highlighting map design, including web maps, the new edition also adds information about what's going on with cartography today, including the use of imagery, remote sensing, and web concepts. Map Use provides students with the knowledge and skills to read and understand maps and offers professional cartographers a thorough reference resource. Nearly 600 full-color maps, photographs, and graphs illustrate the concepts behind communicating with maps, while an extensive glossary helps define key topics. Accommodating new developments in mapping, GPS, and geographic information system (GIS) technology, this newest edition renders basic cartographic principles accessible to all, from students of cartography and map design to those without a formal education in geography.

  • Updated for use with ArcGIS® Pro 2.6GIS Tutorial for ArcGIS Pro 2.6 is the introductory workbook for learning geographic information systems with ArcGIS Pro, the premier professional desktop geographic information system (GIS) application from Esri. Rooted in the science of geography, GIS is a framework for gathering, managing, and analyzing data using map visualizations and location intelligence. Using ArcGIS Pro for these tasks allows you to understand complex data with the leading GIS software that many businesses, organizations, and institutions use every day.Designed for use in classrooms or for self-learners, GIS Tutorial for ArcGIS Pro 2.6 delves into GIS concepts and hands-on lessons in every chapter for an easy-to-follow guide for learning GIS and ArcGIS Pro. Using proven teaching methods, this book shows you how to make maps, create and analyze spatial data, and manage operational systems with GIS. Step-by-step exercises use ArcGIS Pro along with ArcGIS Online, ArcGIS StoryMaps, ArcGIS Dashboards, and ArcGIS Collector, plus "Your Turn" sections where you reinforce what you learned using real-world data. Free downloadable video lectures and lecture slides covering the entire book are also available for everyone. Written by the authors of the top-selling GIS Tutorial 1: Basic Workbook, GIS Tutorial for Health, and GIS Tutorial for Crime Analysis books, GIS Tutorial for ArcGIS Pro 2.6 serves as a complete resource for learning and teaching ArcGIS Pro in GIS projects.

  • Learn state-of-the-art skills to build compelling, useful, and fun Web GIS apps easily, with no previous programming experience required.Building on the foundation of the previous three editions, Getting to Know Web GIS, fourth edition, features the latest advances in Esri?s entire Web GIS platform, from the cloud server side to the client side. Discover and apply what?s new in ArcGIS Online, ArcGIS Enterprise, Map Viewer, Esri StoryMaps, Web AppBuilder, Survey123 for ArcGIS, and more. Learn about recent Web GIS products such as ArcGIS Experience Builder, ArcGIS Indoors, and ArcGIS QuickCapture. Understand updates in mobile GIS such as Collector for ArcGIS and AuGeo, and then build your own web apps. Further your skillset with detailed sections and chapters on ArcGIS Dashboard, ArcGIS Analytics for the Internet of Things, online spatial analysis, image services, 3D web scenes, ArcGIS API for JavaScript, and best practices in Web GIS.Each chapter is written for immediate productivity with a good balance of principles and hands-on exercises and includes: A conceptual discussion section to give you the big picture and principles,A detailed tutorial section with step-by-step instructions,A Q/A section to answer common questions, An assignment section to reinforce your comprehension, and A list of resources with more information.Ideal for classroom lab work and on-the-job training for GIS students, instructors, GIS analysts, managers, web developers, and other professionals, Getting to Know Web GIS, fourth edition, uses a holistic approach to systematically teach the breadth of Esri Geospatial Cloud.To download the instructor slides, tutorial data, and assignment data, visit esri.com/gtkwebgis4.

  • Although the concepts of GIS have remained fairly constant over time the software is continuallyevolving. With the release of ArcGIS Pro the latest software in the Esri GIS family a new generationof GIS has arrived. ArcGIS Pro has a 64-bit multithreaded architecture uses ribbon-stylemenus integrates 2D and 3D applications and is closely tied to ArcGIS Online.This text constitutes a major rewrite of Mastering ArcGIS a book that covered GIS conceptsand skills using the ArcGIS Desktop programs of ArcMap and ArcCatalog. Although the GISconcepts largely remain the same in both texts the implementation and in some cases theterminology has changed. 

  • Updated and Expanded for Python 3 It?s easy to start developing programs with Python, which is why the language is so popular. However, Python?s unique strengths, charms, and expressiveness can be hard to grasp, and there are hidden pitfalls that can easily trip you up. This second edition of Effective Python will help you master a truly ?Pythonic? approach to programming, harnessing Python?s full power to write exceptionally robust and well-performing code. Using the concise, scenario-driven style pioneered in Scott Meyers? best-selling Effective C++, Brett Slatkin brings together 90 Python best practices, tips, and shortcuts, and explains them with realistic code examples so that you can embrace Python with confidence. Drawing on years of experience building Python infrastructure at Google, Slatkin uncovers little-known quirks and idioms that powerfully impact code behavior and performance. You?ll understand the best way to accomplish key tasks so you can write code that?s easier to understand, maintain, and improve. In addition to even more advice, this new edition substantially revises all items from the first edition to reflect how best practices have evolved. Key features include 30 new actionable guidelines for all major areas of Python Detailed explanations and examples of statements, expressions, and built-in types Best practices for writing functions that clarify intention, promote reuse, and avoid bugs Better techniques and idioms for using comprehensions and generator functions Coverage of how to accurately express behaviors with classes and interfaces Guidance on how to avoid pitfalls with metaclasses and dynamic attributes More efficient and clear approaches to concurrency and parallelism Solutions for optimizing and hardening to maximize performance and quality Techniques and built-in modules that aid in debugging and testing Tools and best practices for collaborative development   Effective Python will prepare growing programmers to make a big impact using Python.