Similar authors to follow
Manage your follows
About Ahmed Sheikh
Ahmed Sheikh is doing a Ph.D. in Electrical Engineering (Power Systems). He is currently working at Energy Systems Research Laboratory, Florida, USA where he is responsible for performing advanced studies associated with the power system stability and micro-grid control including devising technical strategies for integrating renewable energy sources with existing power infrastructure. He is a Fulbright Alumnus, earned a Master's Degree in Electrical Engineering (Power Systems) from Kansas State University, USA.
Customers Also Bought Items By
Titles By Ahmed Sheikh
Module 4 focuses on using RLC circuits as passive filters. Content that is traditionally associated with AC Circuits material ends in Module 4, but additional content is included in Modules 5 to 7 to provide more practical knowledge that builds upon the theory learned in AC circuits. Topics in these final three modules include transformers, diodes, and operational amplifiers. These topics in Modules 5 to 7 are the foundation of the field of electronics. Only an overview is provided in this eBook.
You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation.
This book uses a unique “lesson” format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more.
What You Will learn
- Understand the concepts associated with Footprinting
- Perform active and passive reconnaissance
- Identify enumeration countermeasures
- Be familiar with virus types, virus detection methods, and virus countermeasures
- Know the proper order of steps used to conduct a session hijacking attack
- Identify defensive strategies against SQL injection attacks
- Analyze internal and external network traffic using an intrusion detection system
Who This Book Is For
Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants, security engineers, and more
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.
Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues.Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more.
What You Will Learn
- Identify the concepts of confidentiality, integrity, and availability
- Implement secure network administration principles
- Apply appropriate risk mitigation strategies
- Explain the impact of physical security on computer and network security
- Use assessment tools to discover security threats and vulnerabilities
- Implement appropriate security controls when performing account management
Who This Book Is For
Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and more
The key function of an underground cable is to transfer power between locations including generation sources, substations, load centers, within substations, and as integration into an existing overhead line.
Underground cable circuits are made up of various components, namely power cables, joints, terminations, associated structures, temperature & condition monitoring systems, and earthing systems. These components are described in more detail in this document.
In this book, we summarize the common characteristics of microservices, talk about the main challenges of building microservices, and describe how product teams can leverage Amazon Web Services (AWS) to overcome those challenges.
Although the calculations in this book are referred to as ‘basic’, they form the foundation of all calculations carried out in the electrical industry.
Please leave your valued feedback so we can further improve the content. Thanks
In this book, you'll have a comprehensive overview of C lanaguage.