´´Hacking´´ ist die Kunst, kreativ Probleme zu lösen - vom Entwickeln einer unkonventionellen Programmierlösung bis hin zum Aufdecken von Sicherheitslöchern in einem schlampig entworfenen Programm. Viele Menschen bezeichnen sich als Hacker, aber nur wenige besitzen das eigentlich notwendige Hintergrundwissen. Jon Erickson zeigt nicht, wie man sich existierende Exploits beschafft und diese einsetzt, sondern vermittelt detailliert, wie Hacking-Techniken und Exploits tatsächlich funktionieren. Dazu führt er aus einer Hacker-Perspektive in die Grundlagen der Programmiersprache C ein und erklärt die wesentlichen Aspekte der Computersicherheit in den drei eng zusammenhängenden Bereichen Programmierung, Vernetzung und Kryptografie. Mit der beiliegenden Live-CD und den darauf enthaltenen Beispielen können Sie die neu erworbenen Kenntnisse auch gleich praktisch anwenden. Nach der Lektüre werden Sie u.a. verstehen: - wie man in C, Assembler und mit Shell-Skripten programmiert, - wie manden Hauptspeicher durch Buffer Overflows und Format-String-Angriffe korrumpiert, - wie man Prozessor-Register und Hauptspeicher mit einem Debugger untersucht und so die Programmabläufe nachvollzieht, - wie man gängige Sicherheitsbarrieren - z.B. Intrusion-Detection-Systeme - überlistet, - wie man sich mit Port-Binding Zugang zu fremden Servern verschafft, - wie man Netzwerkverkehr umleitet und TCP-Verbindungen übernimmt. Mit der beiliegenden Live-CD und den darauf enthaltenen Beispielen können Sie die neu erworbenen Kenntnisse gleich praktisch anwenden. In der zweiten Auflage wurden alle Kapitel aktualisiert und erweitert, insbesondere die Einführung in die grundlegenden Funktionsweise eines Computers.
This modern treatment of computer vision focuses on learning and inference in probabilistic models as a unifying theme. It shows how to use training data to learn the relationships between the observed image data and the aspects of the world that we wish to estimate, such as the 3D structure or the object class, and how to exploit these relationships to make new inferences about the world from new image data. With minimal prerequisites, the book starts from the basics of probability and model fitting and works up to real examples that the reader can implement and modify to build useful vision systems. Primarily meant for advanced undergraduate and graduate students, the detailed methodological presentation will also be useful for practitioners of computer vision. Covers cutting-edge techniques, including graph cuts, machine learning and multiple view geometry A unified approach shows the common basis for solutions of important computer vision problems, such as camera calibration, face recognition and object tracking More than 70 algorithms are described in sufficient detail to implement More than 350 full-color illustrations amplify the text The treatment is self-contained, including all of the background mathematics Additional resources at www.computervisionmodels.com
Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system. A Bug Hunter´s Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world´s most popular software, like Apple´s iOS, the VLC media player, web browsers, and even the Mac OS X kernel. In this one-of-a-kind account, you´ll see how the developers responsible for these flaws patched the bugs or failed to respond at all. As you follow Klein on his journey, you´ll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting. Along the way you´ll learn how to: Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that v
´´We´re all safer when the systems we depend upon are inspectable, auditable, and documented - and this definitely includes cars.´´ - Chris Evans, hacker and founder of Project Zero Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven´t kept pace with today´s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker´s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle´s communication network, you´ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker´s Handbook will show you how to: - Build an accurate threat model for your vehicle - Reverse engineer the CAN bus to fake engine signals - Exploit vulnerabilities in diagnostic and data-logging systems - Hack the ECU and other firmware and embedded systems - Feed exploits through infotainment and vehicle-to-vehicle communication systems - Override factory settings with performance-tuning techniques - Build physical and virtual test benches to try out exploits safely If you´re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker´s Handbook your first stop.
This book constitutes the proceedings of the 15th International Workshop on Algorithms and Models for the Web Graph, WAW 2018, held in Moscow, Russia in May 2018. The 11 full papers presented in this volume were carefully reviewed and selected from various submissions. The papers focus on topics like the information retrieval and data mining on the Web; Web as a text repository and as a graph, induced in various ways by link among pages, hosts and users; the understanding of graphs that arise from the Web and various user activities on the Web; stimulation of the development of high-performance algorithms and applications that exploit these graphs.
Delve into your data for the key to success Data mining is quickly becoming integral to creating value and business momentum. The ability to detect unseen patterns hidden in the numbers exhaustively generated by day-to-day operations allows savvy decision-makers to exploit every tool at their disposal in the pursuit of better business. By creating models and testing whether patterns hold up, it is possible to discover new intelligence that could change your business´s entire paradigm for a more successful outcome. Data Mining for Dummies shows you why it doesn´t take a data scientist to gain this advantage, and empowers average business people to start shaping a process relevant to their business´s needs. In this book, you´ll learn the hows and whys of mining to the depths of your data, and how to make the case for heavier investment into data mining capabilities. The book explains the details of the knowledge discovery process including: * Model creation, validity testing, and interpretation * Effective communication of findings * Available tools, both paid and open-source * Data selection, transformation, and evaluation Data Mining for Dummies takes you step-by-step through a real-world data-mining project using open-source tools that allow you to get immediate hands-on experience working with large amounts of data. You´ll gain the confidence you need to start making data mining practices a routine part of your successful business. If you´re serious about doing everything you can to push your company to the top, Data Mining for Dummies is your ticket to effective data mining.
Multi-agent systems are claimed to be especially suited to the development of software systems that are decentralized, can deal flexibly with dynamic conditions, and are open to system components that come and go. This is why they are used in domains such as manufacturing control, automated vehicles, and e-commerce markets. Danny Weyns´ book is organized according to the postulate that ´´developing multi-agent systems is 95% software engineering and 5% multi-agent systems theory.´´ He presents a software engineering approach for multi-agent systems that is heavily based on software architecture - with, for example, tailored patterns such as ´´situated agent´´, ´´virtual environment´´, and ´´selective perception´´ - and on middleware for distributed coordination - with programming abstractions such as ´´views´´ and ´´roles.´´ Next he shows the feasibility and applicability of this approach with the development of an automated transportation system consisting of a number of automatic guided vehicles transporting loads in an industrial setting. Weyns puts the development of multi-agent systems into a larger perspective with traditional software engineering approaches. With this, he opens up opportunities to exploit the body of knowledge developed in the multi-agent systems community to tackle some of the difficult challenges of modern-day software systems, such as decentralized control, location-awareness, self-adaption, and large-scale. Thus his book is of interest for both researchers and industrial software engineers who develop applications in areas such as distributed control systems and mobile applications where such requirements are of crucial importance.
Now in its third edition, this best-selling book continues to bring you some of the best thinking on how to apply Oracle Database to produce scalable applications that perform well and deliver correct results. Tom Kyte and Darl Kuhn share a simple philosophy: ´´you can treat Oracle as a black box and just stick data into it, or you can understand how it works and exploit it as a powerful computing environment.´´ If you choose the latter, then you´ll find that there are few information management problems that you cannot solve quickly and elegantly. This fully revised third edition covers the developments up to Oracle Database 12 c . Significant new content is included surrounding Oracle´s new cloud feature set, and especially the use of pluggable databases. Each feature is taught in a proof-by-example manner, not only discussing what it is, but also how it works, how to implement software using it, and the common pitfalls associated with it. Don´t treat Oracle Database as a black-box. Get this book. Get under the hood. Turbo-charge your career. Revised to cover Oracle Database 12 c Proof-by-example approach: Let the evidence be your guide Dives deeply into Oracle Database´s most powerful features