Học liệu điện tử

(67 publications available)

Recent Submissions

Now showing 1 - 6 of 67
  • Publication
    Techniques and Principles in Language Teaching 3rd Edition
    (Oxford University Press, 2011) Larsen-Freeman, Diane; Anderson, Marti
    Techniques and Principles in Language Teaching has influenced the way thousands of teachers have taught English. This classic guide to developing the way you teach has been an essential resource to new and experienced teachers worldwide, and is now in its third edition. Each chapter focuses on a different teaching approach, describing it being used in the classroom, analyzing what happened, and helping you think how you could apply it to your own teaching. New features of the third edition include: a new discussion on the political dimensions of language teaching, a new digital technology chapter, and extended coverage of content-based and task-based approaches. On this site you will find additional resources, including author videos in which Diane Larsen-Freeman and Marti Anderson talk about the background to the book and new innovations in language teaching which are discussed in the third edition.
  • Publication
    Malware Analysis Techniques : Tricks for the Triage of Adversarial Software
    (Packt Publishing, 2021) Barker, Dylan
    Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malwareKey FeaturesBook DescriptionMalicious software poses a threat to every enterprise globally. Its growth is costing businesses millions of dollars due to currency theft as a result of ransomware and lost productivity. With this book, you'll learn how to quickly triage, identify, attribute, and remediate threats using proven analysis techniques. Malware Analysis Techniques begins with an overview of the nature of malware, the current threat landscape, and its impact on businesses. Once you've covered the basics of malware, you'll move on to discover more about the technical nature of malicious software, including static characteristics and dynamic attack methods within the MITRE ATT&CK framework.
  • Publication
    Practical Malware Analysis : The Hands-On Guide to Dissecting Malicious Software
    (2012) Sikorski, Michael; Honig, Andrew
    Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:–Set up a safe virtual environment to analyze malware–Quickly extract network signatures and host-based indicators–Use key analysis tools like IDA Pro, OllyDbg, and WinDbg–Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques–Use your newfound knowledge of Windows internals for malware analysis–Develop a methodology for unpacking malware and get practical experience with five of the most popular packers–Analyze special cases of malware with shellcode, C++, and 64-bit code
  • Publication
    Wireless Network Security A Beginner's Guide
    (McGraw Hill, 2012) Wrightson, Tyler
    Security Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included. This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away. Wireless Network Security: A Beginner's Guide features: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience
  • Publication
    Penetration Testing : A Hands-On Introduction to Hacking
    (2014) Weidman, Georgia
    Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.Learn how to:–Crack passwords and wireless network keys with brute-forcing and wordlists–Test web applications for vulnerabilities–Use the Metasploit Framework to launch exploits and write your own Metasploit modules–Automate social-engineering attacks–Bypass antivirus software–Turn access to one machine into total control of the enterprise in the post exploitation phase
  • Publication
    LPI Linux Essentials Study Guide : Exam 010 V1.6
    (Sybex, 2020) Bresnahan, Christine; Blum, Richard
    Provides a solid foundation for those considering a career in IT—covers the objectives of the new Linux Essentials Exam 010-160 v1.6 Linux is a secure, reliable, open source alternative to costly operating systems such as Microsoft Windows. As large organizations worldwide continue to add Linux servers, the need for IT professionals skilled in Linux continues to grow. The LPI Linux Essentials Study Guide is a valuable resource for anyone preparing to take the new Linux Essentials Exam—the entry-level certification from The Linux Professional Institute (LPI) which validates knowledge of Linux concepts and applications. Written by recognized experts on Linux and open source technologies, this accessible, user-friendly guide covers desktop skills, the command line, directories and files, networks, scripting, security, users and permissions, and much more.