Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Transport 612
- Transportation 522
- Transporte 430
- Business & Economics 369
- Transportation Economics 287
- Transportes 246
- Transporte acuático 230
- Historia 213
- Economic conditions 143
- Engineering & Applied Sciences 139
- Computer networks 126
- History 123
- Environmental aspects 116
- Economics 115
- Ferrocarriles 114
- Economic policy 112
- Technology: general issues 109
- History of engineering & technology 108
- Innovaciones tecnológicas 108
- European Conference of Ministers of Transport 106
- Research & information: general 104
- Investigación científica 102
- Management 99
- Derecho marítimo 98
- aspectos económicos 93
- Environment 91
- Transporte ferroviario 89
- Urbanismo 88
- Història 87
- Transportes urbanos 87
-
9121Publicado 2017Tabla de Contenidos: “…2.3.5 Mobile Device Classes -- 2.3.6 Network Mode of Operation -- 2.3.7 GPRS Logical Channels on the Air Interface -- 2.4 The GPRS State Model -- 2.5 GPRS Network Elements -- 2.5.1 The Packet Control Unit (PCU) -- 2.5.2 The Serving GPRS Support Node (SGSN) -- 2.5.3 The Gateway GPRS Support Node (GGSN) -- 2.6 GPRS Radio Resource Management -- 2.7 GPRS Interfaces -- 2.8 GPRS Mobility Management and Session Management (GMM/SM) -- 2.8.1 Mobility Management Tasks -- 2.8.2 GPRS Session Management -- Questions -- References -- Chapter 3 Universal Mobile Telecommunications System (UMTS) and High-Speed Packet Access (HSPA) -- 3.1 Overview, History and Future -- 3.1.1 3GPP Release 99: The First UMTS Access Network Implementation -- 3.1.2 3GPP Release 4: Enhancements for the Circuit-Switched Core Network -- 3.1.3 3GPP Release 5: High-Speed Downlink Packet Access -- 3.1.4 3GPP Release 6: High-Speed Uplink Packet Access (HSUPA) -- 3.1.5 3GPP Release 7: Even Faster HSPA and Continued Packet Connectivity -- 3.1.6 3GPP Release 8: LTE, Further HSPA Enhancements and Femtocells -- 3.1.7 3GPP Release 9: Digital Dividend and Dual-Cell Improvements -- 3.1.8 3GPP Releases 10 and Beyond -- 3.2 Important New Concepts of UMTS -- 3.2.1 The Radio Access Bearer (RAB) -- 3.2.2 The Access Stratum and Non-Access Stratum -- 3.2.3 Common Transport Protocols for CS and PS -- 3.3 Code Division Multiple Access (CDMA) -- 3.3.1 Spreading Factor, Chip Rate and Process Gain -- 3.3.2 The OVSF Code Tree -- 3.3.3 Scrambling in Uplink and Downlink Direction -- 3.3.4 UMTS Frequency and Cell Planning -- 3.3.5 The Near-Far Effect and Cell Breathing -- 3.3.6 Advantages of the UMTS Radio Network Compared to GSM -- 3.4 UMTS Channel Structure on the Air Interface -- 3.4.1 User Plane and Control Plane -- 3.4.2 Common and Dedicated Channels -- 3.4.3 Logical, Transport and Physical Channels…”
Libro electrónico -
9122Publicado 2017Tabla de Contenidos: “…2.8.4 Instrument Engineering -- 2.8.5 Software Engineering -- 2.8.6 Civil/Structural Engineering and Architects -- 2.8.7 Installation, Commissioning, and Validation -- 2.8.8 Procurement and Inspection -- 2.8.9 Process Engineering -- 2.9 Liaison Outside the Design Team -- 2.9.1 Regulatory Authorities -- 2.9.1.1 Planning -- 2.9.1.2 Health and Safety -- 2.9.1.3 Pollution -- 2.9.2 Emergency Services -- 2.9.3 Transport -- 2.9.4 Quality Assurance -- 2.9.5 Publicity and the Press -- 2.9.6 Insurance -- 2.9.7 Equipment Suppliers -- 2.9.8 Raw Material Suppliers and Product End Users -- 2.9.9 Utility Suppliers -- 2.9.10 Waste Disposal Facility Suppliers -- 2.9.11 Construction Companies -- 2.9.12 Commissioning Team -- 2.9.13 Operating and Maintenance Personnel -- 2.10 Relation of Layout to Other Activities -- 2.11 Layout and Project Planning Control -- 3 Site Layout Principles -- 3.1 General -- 3.2 Abbreviations/Legislation, Standards and Codes of Practice/Terminology -- 3.2.1 Abbreviations -- 3.2.2 Standards and Codes -- 3.2.2.1 International Standards -- 3.2.2.2 European Legislation and Standards -- 3.2.2.3 British Legislation and Standards -- 3.2.2.4 US Standards -- 3.2.2.5 Terminology -- 3.3 Design Considerations -- 3.4 Segregation -- 3.5 Emergencies -- 3.5.1 Access -- 3.5.2 Control -- 3.5.3 Water -- 3.6 Central Facilities -- 3.7 Pollution Abatement -- 3.7.1 Solids -- 3.7.2 Liquid -- 3.7.3 Gas -- 3.8 Transportation -- 3.9 Security -- 3.10 Environmental Aspects -- 3.11 Geographical Factors -- 3.12 Site Selection -- Further Reading -- 4 Plot Layout Principles -- 4.1 General -- 4.2 Abbreviations/Standards and Codes/Terminology -- 4.2.1 Abbreviations -- 4.2.2 Standards and Codes -- 4.2.2.1 International Standards -- 4.2.2.2 European Legislation and Standards -- 4.2.2.3 British Legislation and Standards -- 4.2.2.4 US Standards -- 4.2.3 Terminology…”
Libro electrónico -
9123Publicado 2023Tabla de Contenidos: “…2.6.1 IT Support -- 2.7 I4.0 in Functional Field -- 2.7.1 I4.0 Logistics -- 2.7.2 Resource Planning -- 2.7.3 Systems for Warehouse Management -- 2.7.4 Transportation Management Systems -- 2.7.5 Transportation Systems with Intelligence -- 2.7.6 Information Security -- 2.8 Existing Technology in I4.0 -- 2.8.1 Applications of I4.0 in Existing Industries -- 2.8.2 Additive Manufacturing (AM) -- 2.8.3 Intelligent Machines -- 2.8.4 Robots that are Self-Aware -- 2.8.5 Materials that are Smart -- 2.8.6 IoT -- 2.8.7 The Internet of Things in Industry (IIoT) -- 2.8.8 Sensors that are Smart -- 2.8.9 System Using a Smart Programmable Logic Controller (PLC) -- 2.8.10 Software -- 2.8.11 Augmented Reality (AR)/Virtual Reality (VR) -- 2.8.12 Gateway for the Internet of Things -- 2.8.13 Cloud -- 2.8.14 Applications of Additive Manufacturing in I4.0 -- 2.8.15 Artificial Intelligence (AI) -- 2.9 Applications in Current Industries -- 2.9.1 I4.0 in Logistics -- 2.9.2 I4.0 in Manufacturing Operation -- 2.10 Future Scope of Research -- 2.10.1 Theoretical Framework of I4.0 -- 2.11 Discussion and Implications -- 2.11.1 Hosting: Microsoft -- 2.11.2 Platform for the Internet of Things (IoT): Microsoft, GE, PTC, and Siemens -- 2.11.3 A Systematic Computational Analysis -- 2.11.4 Festo Proximity Sensor -- 2.11.5 Connectivity Hardware: HMS -- 2.11.6 IT Security: Claroty -- 2.11.7 Accenture Is a Systems Integrator -- 2.11.8 Additive Manufacturing: General Electric -- 2.11.9 Augmented and Virtual Reality: Upskill -- 2.11.10 ABB Collaborative Robots -- 2.11.11 Connected Vision System: Cognex -- 2.11.12 Drones/UAVs: PINC -- 2.11.13 Self-Driving in Vehicles: Clear Path Robotics -- 2.12 Conclusion -- References -- Chapter 3 Interaction of Internet of Things and Sensors for Machining -- 3.1 Introduction -- 3.2 Various Sensors Involved in Machining Process -- 3.2.1 Direct Method Sensors…”
Libro electrónico -
9124Publicado 2019Tabla de Contenidos: “…1 Introduction 1 -- 1.1 The Telecommunications/ICT Sector in the Twenty-First Century 2 -- 1.2 Convergence of the Telecom and Internet Worlds and QoS 4 -- 1.3 Introduction to QoS, QoE, and Network Performance 9 -- 1.3.1 Quality of Service (QoS) Definition 10 -- 1.3.2 Quality of Experience (QoE) 11 -- 1.3.3 Network Performance (NP) 12 -- 1.3.4 QoS, QoE, and NP Relations 13 -- 1.4 ITU’s QoS Framework 14 -- 1.4.1 Universal Model 14 -- 1.4.2 Performance Model 15 -- 1.4.3 Four-Market Model 17 -- 1.5 QoE Concepts and Standards 18 -- 1.5.1 QoE and QoS Comparison 18 -- 1.5.2 QoS and QoE Standards 19 -- 1.6 General QoS Terminology 20 -- 1.7 Discussion 21 -- References 23 -- 2 Internet QoS 25 -- 2.1 Overview of Internet Technology Protocols 25 -- 2.1.1 Internet Network Layer Protocols: IPv4 and IPv6 26 -- 2.1.2 Main Internet Transport Layer Protocols: TCP and UDP 28 -- 2.1.3 Dynamic Host Configuration Protocol - DHCP 32 -- 2.1.4 Domain Name System - DNS 32 -- 2.1.5 Internet Fundamental Applications 34 -- 2.1.5.1 Web Technology 34 -- 2.1.5.2 File Transfer Protocol (FTP) 34 -- 2.1.5.3 Email Protocols 35 -- 2.2 Fundamental Internet Network Architectures 35 -- 2.2.1 Client-Server Internet Networking 35 -- 2.2.2 Peer-to-Peer Internet Networking 36 -- 2.2.3 Basic Internet Network Architectures 36 -- 2.2.4 Autonomous Systems on the Internet 38 -- 2.3 Internet Traffic Characterization 39 -- 2.3.1 Audio Traffic Characterization 40 -- 2.3.2 Video Traffic Characterization 40 -- 2.3.3 Non-Real-Time Traffic Characterization 42 -- 2.4 QoS on Different Protocols Layers 44 -- 2.5 Traffic Management Techniques 45 -- 2.5.1 Classification of IP Packets 46 -- 2.5.2 Packet Classification From the Technical Side 46 -- 2.5.3 Packet Scheduling 47 -- 2.5.4 Admission Control 47 -- 2.5.5 Traffic Management Versus Network Capacity 49 -- 2.6 Internet QoS Frameworks: the IETF and the ITU 50 -- 2.7 Integrated Services (IntServ) and Differentiated Services (DiffServ) 51 -- 2.8 QoS with Multi-Protocol Label Switching (MPLS) 54.…”
Libro electrónico -
9125Publicado 2023Tabla de Contenidos: “…2.6.1 IT Support -- 2.7 I4.0 in Functional Field -- 2.7.1 I4.0 Logistics -- 2.7.2 Resource Planning -- 2.7.3 Systems for Warehouse Management -- 2.7.4 Transportation Management Systems -- 2.7.5 Transportation Systems with Intelligence -- 2.7.6 Information Security -- 2.8 Existing Technology in I4.0 -- 2.8.1 Applications of I4.0 in Existing Industries -- 2.8.2 Additive Manufacturing (AM) -- 2.8.3 Intelligent Machines -- 2.8.4 Robots that are Self-Aware -- 2.8.5 Materials that are Smart -- 2.8.6 IoT -- 2.8.7 The Internet of Things in Industry (IIoT) -- 2.8.8 Sensors that are Smart -- 2.8.9 System Using a Smart Programmable Logic Controller (PLC) -- 2.8.10 Software -- 2.8.11 Augmented Reality (AR)/Virtual Reality (VR) -- 2.8.12 Gateway for the Internet of Things -- 2.8.13 Cloud -- 2.8.14 Applications of Additive Manufacturing in I4.0 -- 2.8.15 Artificial Intelligence (AI) -- 2.9 Applications in Current Industries -- 2.9.1 I4.0 in Logistics -- 2.9.2 I4.0 in Manufacturing Operation -- 2.10 Future Scope of Research -- 2.10.1 Theoretical Framework of I4.0 -- 2.11 Discussion and Implications -- 2.11.1 Hosting: Microsoft -- 2.11.2 Platform for the Internet of Things (IoT): Microsoft, GE, PTC, and Siemens -- 2.11.3 A Systematic Computational Analysis -- 2.11.4 Festo Proximity Sensor -- 2.11.5 Connectivity Hardware: HMS -- 2.11.6 IT Security: Claroty -- 2.11.7 Accenture Is a Systems Integrator -- 2.11.8 Additive Manufacturing: General Electric -- 2.11.9 Augmented and Virtual Reality: Upskill -- 2.11.10 ABB Collaborative Robots -- 2.11.11 Connected Vision System: Cognex -- 2.11.12 Drones/UAVs: PINC -- 2.11.13 Self-Driving in Vehicles: Clear Path Robotics -- 2.12 Conclusion -- References -- Chapter 3 Interaction of Internet of Things and Sensors for Machining -- 3.1 Introduction -- 3.2 Various Sensors Involved in Machining Process -- 3.2.1 Direct Method Sensors…”
Libro electrónico -
9126
-
9127Publicado 2005Tabla de Contenidos: “…B2B technologies and standards -- 2.1 Requirements for a B2B solution -- 2.2 Some terminology -- 2.2.1 Messaging and queuing -- 2.2.2 Electronic data interchange -- 2.2.3 Transport protocols -- 2.2.4 Security -- 2.2.5 Java -- 2.2.6 Extensible Markup Language -- 2.2.7 Web services -- Chapter 3. …”
Libro electrónico -
9128por Gavin, LeeTabla de Contenidos: “…Trading Partner Interchange overview -- 5.1 How the system works -- 5.2 Company profile -- 5.3 Partner profile -- 5.4 The relationship between the company and partner profile -- 5.5 Document sizes -- 5.6 Transports -- Chapter 6. WebSphere Data Interchange overview…”
Publicado 2003
Libro electrónico -
9129por Williams, H. P.Tabla de Contenidos: “…3.5.8.3 VARIABLES -- 3.5.8.4 OBJECTIVE -- 3.5.8.5 CONSTRAINTS -- Chapter 4 Structured linear programming models -- 4.1 Multiple plant, product and period models -- 4.2 Stochastic programmes -- 4.3 Decomposing a large model -- 4.3.1 The submodels -- 4.3.2 The restricted master model -- Chapter 5 Applications and special types of mathematical programming model -- 5.1 Typical applications -- 5.1.1 The petroleum industry -- 5.1.2 The chemical industry -- 5.1.3 Manufacturing industry -- 5.1.4 Transport and distribution -- 5.1.5 Finance -- 5.1.6 Agriculture -- 5.1.7 Health -- 5.1.8 Mining -- 5.1.9 Manpower planning -- 5.1.10 Food -- 5.1.11 Energy -- 5.1.12 Pulp and paper -- 5.1.13 Advertising -- 5.1.14 Defence -- 5.1.15 The supply chain -- 5.1.16 Other applications -- 5.2 Economic models -- 5.2.1 The static model -- 5.2.2 The dynamic model -- 5.2.3 Aggregation -- 5.3 Network models -- 5.3.1 The transportation problem -- 5.3.2 The assignment problem -- 5.3.3 The transhipment problem -- 5.3.4 The minimum cost flow problem -- 5.3.5 The shortest path problem -- 5.3.6 Maximum flow through a network -- 5.3.7 Critical path analysis -- 5.4 Converting linear programs to networks -- Chapter 6 Interpreting and using the solution of a linear programming model -- 6.1 Validating a model -- 6.1.1 Infeasible models -- 6.1.2 Unbounded models -- 6.1.3 Solvable models -- 6.2 Economic interpretations -- 6.2.1 The dual model -- 6.2.2 Shadow prices -- 6.2.3 Productive capacity constraints -- 6.2.4 Raw material availabilities -- 6.2.5 Marketing demands and limitations -- 6.2.6 Material balance (continuity) constraints -- 6.2.7 Quality stipulations -- 6.2.8 Reduced costs -- 6.3 Sensitivity analysis and the stability of a model -- 6.3.1 Right-hand side ranges -- 6.3.2 Objective ranges -- 6.3.3 Ranges on interior coefficients -- 6.3.4 Marginal rates of substitution…”
Publicado 2013
Libro electrónico -
9130por Navas Cuenca, EstefaníaTabla de Contenidos: “….) -- EL LUGAR DE TRABAJO -- LAS HERRAMIENTAS Y LAS MÁQUINAS -- LA ELECTRICIDAD -- LOS INCENDIOS -- ALMACENAMIENTO, MANIPULACIÓN Y TRANSPORTE -- LO QUE HEMOS APRENDIDO -- TEMA 2. RIESGOS LIGADOS AL MEDIO AMBIENTE (...) -- LA EXPOSICIÓN LABORAL A AGENTES QUÍMICOS -- LA EXPOSICIÓN LABORAL A AGENTES FÍSICOS -- LA EXPOSICIÓN LABORAL A AGENTES BIOLÓGICOS -- EL CONTROL DEL RIESGO -- LO QUE HEMOS APRENDIDO…”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
9131por Zygmunt, KarolinaTabla de Contenidos: “…ADENTRÁNDOSE EN LA COMPLEJIDAD POLÍTICA, GEOGRÁFICA Y SOCIAL -- 4. LOS MEDIOS DE TRANSPORTE: BUSCANDO SU PROPIA RELACIÓN CON EL TIEMPO -- 5. …”
Publicado 2021
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
9132Publicado 2014Tabla de Contenidos: “…5.2.2 Tensiones en un circuito en serie -- 5.2.3 Resistencia equivalente en serie -- 5.3 CIRCUITOS EN PARALELO -- 5.3.1 Tensiones en un circuito en paralelo -- 5.3.2 Corriente en un circuito en paralelo -- 5.3.3 Resistencia equivalente en paralelo -- 5.4 CIRCUITOS MIXTOS CON RESISTENCIAS -- 5.4.1 Resistencia equivalente de un circuito mixto -- 5.5 POTENCIA EN UN CIRCUITO -- 5.6 CONEXIÓN DE BATERÍAS -- 5.7 CONEXIÓN DE CONDENSADORES -- 5.8 CONEXIÓN DE BOBINAS -- 6 CORRIENTE ALTERNA -- 6.1 TIPOS DE CORRIENTE ELÉCTRICA -- 6.2 CORRIENTE ALTERNA -- 6.2.1 Concepto de ciclo, período y frecuencia -- 6.2.2 Concepto de valores pico, pico a pico, promedio y efectivo -- 6.3 GENERADORES DE CORRIENTE ALTERNA -- 6.4 TRANSPORTE Y DISTRIBUCIÓN DE LA ENERGÍA -- 6.5 INSTALACIONES ELÉCTRICAS EN VIVIENDAS -- 6.5.1 Acometida, caja general de protección y línea repartidora -- 6.5.2 Contador y centralizaciones -- 6.5.3 Derivación individual -- 6.5.4 Cuadro de mando y protección -- 6.5.5 Conductores interiores -- 6.5.6 Grados de electrificación en viviendas -- 6.5.7 Características de los distintos niveles -- 7 CORRIENTE CONTINUA -- 7.1 DEFINICIÓN -- 7.2 PRODUCCIÓN DE CORRIENTE CONTINUA -- 7.2.1 Generador electromagnético -- 7.2.2 Pilas y baterías -- 7.2.3 Celdas de combustible -- 8 MEDICIONES ELÉCTRICAS -- 8.1 INTRODUCCIÓN -- 8.2 INSTRUMENTO BÁSICO DE MEDIDA -- 8.3 CLASIFICACIÓN DE LOS APARATOS -- 8.4 EL AMPERÍMETRO -- 8.4.1 Partes de un amperímetro analógico -- 8.4.2 Medición de la intensidad -- 8.4.3 El amperímetro de corriente alterna -- 8.5 EL VOLTÍMETRO -- 8.5.1 El voltímetro de corriente continua -- 8.5.2 El voltímetro de escalas múltiples -- 8.5.3 Medición de la tensión -- 8.5.4 El voltímetro de corriente alterna -- 8.6 EL ÓHMETRO -- 9 EL POLÍMETRO -- 9.1 INTRODUCCIÓN -- 9.2 EL MULTÍMETRO DIGITAL -- 9.3 PRECAUCIONES CON LOS POLÍMETROS -- 9.4 EL POLÍMETRO COMO ÓHMETRO…”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Universitat Ramon Llull)Acceso restringido con credenciales UPSA
Libro electrónico -
9133por Pascual Cortés, Juan MiguelTabla de Contenidos: “…Introducción -- 2. Transporte de materiales sin procesar y procesados: finalidad. …”
Publicado 2023
Libro electrónico -
9134Publicado 2020Tabla de Contenidos: “…From scooter to boat: innovations in electric transport in cities of Southeast Asia / Pippo Ranci -- 35. …”
Libro electrónico -
9135Publicado 2017Tabla de Contenidos: “…Interaction design within the context of culture, acculturation and globalization -- Aesthetics and experience design -- Transportation design -- Summary of future research directions, relevant for prospective ergonomics -- Bibliography -- Index -- Other titles from iSTE in Information Systems, Web and Pervasive Computing -- EULA…”
Libro electrónico -
9136Publicado 2016Tabla de Contenidos: “…Hop Behavior 5 -- 1.3 Traffic Characterization 8 -- 1.4 A Router without QOS 11 -- 1.5 Conclusion 12 -- References 12 -- Further Reading 12 -- 2 The QOS Tools 13 -- 2.1 Classifiers and Classes of Service 13 -- 2.2 Metering and Coloring - CIR/PIR Model 15 -- 2.3 The Policer Tool 16 -- 2.4 The Shaper Function 17 -- 2.5 Comparing Policing and Shaping 18 -- 2.6 Queue 19 -- 2.7 The Scheduler 21 -- 2.8 The Rewrite Tool 21 -- 2.9 Example of Combining Tools 23 -- 2.10 Delay and Jitter Insertion 27 -- 2.11 Packet Loss 31 -- 2.12 Conclusion 32 -- Reference 33 -- 3 Challenges 34 -- 3.1 Defining the Classes of Service 35 -- 3.2 Classes of Service and Queues Mapping 37 -- 3.3 Inherent Delay Factors 40 -- 3.4 Congestion Points 46 -- 3.5 Trust Borders 49 -- 3.6 Granularity Levels 51 -- 3.7 Control Traffic 53 -- 3.8 Trust, Granularity, and Control Traffic 54 -- 3.9 Conclusion 56 -- Further Reading 56 -- 4 Special Traffic Types and Networks 57 -- 4.1 Layer 4 Transport Protocols: UDP and TCP 58 -- 4.1.1 The TCP Session 61 -- 4.1.2 TCP Congestion Mechanism 64 -- 4.1.3 TCP Congestion Scenario 65 -- 4.1.4 TCP and QOS 66 -- 4.2 Data Center 67 -- 4.2.1 SAN Traffic 68 -- 4.2.2 Lossless Ethernet Networks 69 -- 4.2.3 Virtualization 71 -- 4.2.4 Software Defined Networks 73 -- 4.2.5 DC and QOS 74 -- 4.3 Real?]…”
Libro electrónico -
9137Publicado 2018Tabla de Contenidos: “…XOR Encryption -- Random Number Generators -- Symmetric Key Cryptography -- Block Ciphers -- Block Cipher Modes -- Block Cipher Padding -- Padding Oracle Attack -- Stream Ciphers -- Asymmetric Key Cryptography -- RSA Algorithm -- RSA Padding -- Diffie-Hellman Key Exchange -- Signature Algorithms -- Cryptographic Hashing Algorithms -- Asymmetric Signature Algorithms -- Message Authentication Codes -- Public Key Infrastructure -- X.509 Certificates -- Verifying a Certificate Chain -- Case Study: Transport Layer Security -- The TLS Handshake -- Initial Negotiation -- Endpoint Authentication -- Establishing Encryption -- Meeting Security Requirements -- Final Words -- Chapter 8: Implementing the Network Protocol -- Replaying Existing Captured Network Traffic -- Capturing Traffic with Netcat -- Using Python to Resend Captured UDP Traffic -- Repurposing Our Analysis Proxy -- Repurposing Existing Executable Code -- Repurposing Code in .NET Applications -- Repurposing Code in Java Applications -- Unmanaged Executables -- Encryption and Dealing with TLS -- Learning About the Encryption In Use -- Decrypting the TLS Traffic -- Final Words -- Chapter 9: The Root Causes of Vulnerabilities -- Vulnerability Classes -- Remote Code Execution -- Denial-of-Service -- Information Disclosure -- Authentication Bypass -- Authorization Bypass -- Memory Corruption Vulnerabilities -- Memory-Safe vs. …”
Libro electrónico -
9138Publicado 2023Tabla de Contenidos: “…. -- Testing for Credentials Transported over an Encrypted Channel -- Getting ready -- How to do it... -- How it works... -- Testing for Default Credentials -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Testing Directory Traversal File Include -- Getting ready -- How to do it... -- How it works... -- See also -- Testing for Privilege Escalation and Bypassing Authorization Schema -- Getting ready -- How to do it... -- How it works... -- Testing for Insecure Direct Object References -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 5: Testing of Session Management -- Technical requirements -- Mutillidae setup -- Testing for cookie attributes -- Getting ready -- How to do it... -- How it works... -- Testing for cross-site request forgery (CSRF) -- Getting ready -- How to do it... -- How it works... -- Testing for logout functionality -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Testing for session hijacking -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 6: Validating (Data) Inputs - Part 1 -- Technical requirements -- Testing for reflected XSS -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Testing for HTTP verb tampering -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Testing for HTTP Parameter Pollution (HPP) -- Getting ready -- How to do it... -- How it works... -- See also -- Testing for SQL Injection -- Getting ready -- How to do it... -- How it works...…”
Libro electrónico -
9139Publicado 2024Tabla de Contenidos: “…-- Why API security is important -- The growth of the API economy -- APIs are popular with developers -- APIs are increasingly popular with attackers -- Your existing tools do not work well for APIs -- Developers often lack an understanding of API security -- Exploring API building blocks -- Rate limiting -- Cryptography -- Hashes, HMACs, and signatures -- Transport security -- Encoding -- Examining API data formats -- Understanding the elements of API security -- DevOps -- SAST, DAST, SCA, and WAFs -- API management and gateways -- API security platforms -- Setting API security goals -- The three pillars of security -- Abuse and misuse cases -- Data governance -- A positive security model -- Risk-based methodology -- Summary -- Further reading -- Chapter 2: Understanding APIs -- Understanding HTTP fundamentals -- Uniform Resource Locator -- Requests -- Responses -- Methods -- Status codes -- Sessions -- Exploring the types of APIs -- REST -- GraphQL -- RPC -- SOAP -- WebSockets -- Access control -- No authentication -- HTTP authentication -- AWS keyed-HMAC authentication -- Session cookies -- API keys -- OAuth 2.0 -- Access control best practices and methods -- Using JWTs for claims and identity -- Summary -- Further reading -- Chapter 3: Understanding Common API Vulnerabilities -- The importance of vulnerability classification -- Exploring the Open Worldwide Application Security Project API Security Top 10 -- Object-level vulnerabilities -- Authentication vulnerabilities -- Function-level vulnerabilities -- Data vulnerabilities -- Configuration vulnerabilities -- Implementation vulnerabilities -- Vulnerabilities versus abuse cases -- Exploring abuse cases…”
Libro electrónico -
9140Publicado 2017Tabla de Contenidos: “…Chapter 8: Securing the Web Application -- Network security versus application security -- The web application stack -- Application - security alternatives in the platform -- Transport protocol -- Application protocol -- Application - security threats in application logic -- Web application security alternatives -- A word on developing security-enabled web applications -- Summary -- Chapter 9: Continuous Delivery -- Evolution of continuous integration and continuous delivery -- Understanding SDLC -- The Agile software development process -- How does the Agile software development process work? …”
Libro electrónico