| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910452440403321 |
|
|
Autore |
Sanderson Christopher Carter <1965-, > |
|
|
Titolo |
Gorilla theatre : a practical guide to performing the new outdoor theatre anytime, anywhere / / Christopher Carter Sanderson |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York : , : Routledge, , 2003 |
|
|
|
|
|
|
|
ISBN |
|
0-87830-171-2 |
1-315-05995-9 |
1-135-87066-7 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (209 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Acting |
Theater - Production and direction |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (pages 181-182) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover ; Half-title; Title Page; Copyright Page; Dedication ; Table of Contents; Foreword ; Acknowledgments; Introduction: About Gorilla Repertory Theatre Company, Inc; 1. Concept and Location; Inspiration; Read Plays, Shakespeare First; List Plays; Tour Sites; List Sites with Pros and Cons; 2. Scouting; Organizations That Can Help; Rights of Free Speech and Assembly; Working Conditions for the Actors and Personnel; Mapping the Site; 3. Establishing Corporate Culture; Observations; Responding to Conflicts; Running Effective Meetings; 4. Casting; Ideas and Ideals |
Respect for Actors and Demands of the FormEnthusiasm for the Form; Character Basics and Physical Motion; Working in Further Detail; Techniques and Scheduling; Callback Practices and Forms; 5. Rehearsal Techniques; Introduction: Use What You Know; How Do You See?; Respect for the Audience; Respect for the Text; The Character Meeting: Establishing Individual Communication; Scheduling Rehearsal; The Three-Phase Technique: Improvisation, Work-Through, and Staging; Run-Throughs; Adapting Indoor Techniques to Outdoor Uses; A Note; 6. The Paratheatric Rehearsal Technique; Brief Description |
Early ExperimentsScouting and Booking; Logistic; Schedule; Blazing and |
|
|
|
|
|
|
|
|
|
|
|
Establishing Safe Practices; Improvisation Suggestions for Day One and Day Two; The Bonfire: Metaphor and Practice; Night Exercises; The Paratheatric Run; Examples of Staging Brought Back; Integrating Paratheatric Discoveries; Variations and How to Invent New Paratheatric Rehearsal Procedures; 7. On-Site Directing and Operational Practices; Practicing Nonconfrontational Conflict Resolution; Cut Procedure; The Role of the Director in Performance; 8. Organizational Approaches; Mission Statement and Incorporation |
Working with VolunteersInterns; Publicity: Homemade and Professional; Sponsorship; Permits, Contracts, and Letters of Agreement; Working with Designers; Working with an Assistant; Working with Crews; Trucks and Trucking; Notes for the Producer; 9. Documentation Practices; Documentarian; Photo Strategies; Video Strategies; Archiving: Print, Video, and Mailing Lists; 10. Design Issues and Aesthetic Practice; Lighting; Props; Sets; Stage Fighting; 11. Indoor Environmental or Action Theatre; Design Issues; Audience Changes and Pressures; Examples; 12. Moving a Show; Feel of the Show |
Moving A Midsummer Night's Dream: "Get Puck!" and Other Stories13. Notes and Observations; Dialogue with Criticism; Relationship to Academia; Sibling Institutions; 14. Spirituality; Bibliography; Index |
|
|
|
|
|
|
Sommario/riassunto |
|
First Published in 2003. Routledge is an imprint of Taylor & Francis, an informa company. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910786642603321 |
|
|
Autore |
Cardwell Kevin |
|
|
Titolo |
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually / / Kevin Cardwell ; cover image by Tony Shi |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Birmingham, [England] : , : Packt Publishing, , 2014 |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (430 p.) |
|
|
|
|
|
|
Collana |
|
Community Experience Distilled |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
Computer security - Testing |
Computers - Access control |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Penetration Testing; Security testing; Authentication; Authorization; Confidentiality; Integrity; Availability; Non-repudiation; Abstract testing methodology; Planning; Nonintrusive target search; Intrusive target search; Data analysis; Reporting; Myths and misconceptions of pen testing; Summary; Chapter 2: Choosing the Virtual Environment; Open source and free environments; VMware Player; VirtualBox; Xen; Hyper-V; vSphere Hypervisor; Commercial environments |
vSphereVMware Player Plus; XenServer; VMware Workstation; Image conversion; Converting from a physical to virtual environment; Summary; Chapter 3: Planning a Range; Planning; What are we trying to accomplish?; By when do we have to accomplish it?; Identifying vulnerabilities; Vulnerability sites; Vendor sites; Summary; Chapter 4: Identifying Range Architecture; Building the machines; Building new machines; Conversion; Cloning a virtual machine; Selecting network connections; The bridged setting; Network Address Translation; The host-only switch; The custom settings; Choosing range components |
The attacker machineRouter; Firewall; Web server; Summary; Chapter 5: Identifying a Methodology; The OSSTMM; The Posture Review; Logistics; |
|
|
|
|
|
|
|
|
|
|
|
Active detection verification; Visibility Audit; Access verification; Trust verification; Control verification; Process verification; Configuration verification; Property validation; Segregation review; Exposure verification; Competitive intelligence scouting; Quarantine verification; Privileges audit; Survivability validation; Alert and log review; CHECK; NIST SP-800-115; The information security assessment methodology; Technical assessment techniques |
Comparing tests and examinationsTesting viewpoints; Overt and covert; Offensive Security; Other methodologies; Customization; Summary; Chapter 6: Creating an External Attack Architecture; Establishing layered architectures; Configuring firewall architectures; iptables; Deploying IDS/IPS and load balancers; Intrusion Detection System (IDS); Intrusion Prevention System (IPS); Load balancers; Integrating web application firewalls; Summary; Chapter 7: Assessment of Devices; Assessing routers; Evaluating switches; MAC attacks; VLAN hopping attacks; GARP attacks; Attacking the firewall |
Identifying the firewall rulesTricks to penetrate filters; Summary; Chapter 8: Architecting an IDS/IPS Range; Deploying a network-based IDS; Implementing the host-based IDS and endpoint security; Working with virtual switches; Evasion; Determining thresholds; Stress testing; Shell code obfuscation; Summary; Chapter 9: Assessment of Web Servers and Web Applications; Analyzing the OWASP Top Ten attacks; Injection flaws; Broken authentication and session management; Cross-Site Scripting; Insecure direct object references; Security misconfiguration; Sensitive data exposure |
Missing function-level access control |
|
|
|
|
|
|
Sommario/riassunto |
|
Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include firewalls, IDS/IPS, web application firewalls, and endpoint protection, which is essential in the penetration testing world. If you are a penetration tester, security consultant, security test engineer, or analyst who wants to practice and perfect penetration testing skills by building virtual pen testing labs in varying industry scenarios, this is the book for you. This book is ideal if yo |
|
|
|
|
|
|
|
| |