1.

Record Nr.

UNINA9910788660703321

Titolo

Noncommutative geometry and representation theory in mathematical physics : Satellite Conference to the Fourth European Congress of Mathematics, July 5-10, 2004, Karlstad University, Karlstad, Sweden, / / Jürgen Fuchs [and four others], editors

Pubbl/distr/stampa

Providence, Rhode Island : , : American Mathematical Society, , [2005]

©2005

ISBN

0-8218-7981-2

0-8218-5723-1

Descrizione fisica

1 online resource (402 p.)

Collana

Contemporary mathematics, , 0271-4132 ; ; 391

Disciplina

530.15/255

Soggetti

Noncommutative differential geometry

Representations of groups

Mathematical physics

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references.

Nota di contenuto

""Contents""; ""Preface""; ""List of Participants""; ""Construction of graded differential algebra with ternary differential""; ""Calculation of the universal Drinfeld twist for quantum su(2)""; ""Thoughts on membranes, matrices and non-commutativity""; ""Stable quantum relativistic kinematics""; ""Cohomology of crossed algebras""; ""Kac-Moody algebras and the cde-triangle""; ""Discretized Virasoro algebra""; ""Multiplication formulae for the elliptic gamma function""; ""New approach to Hermitian q-differential operators on RNq""; ""Picard groups in rational conformal field theory""

""On a class of representations of quantum groups""""Shapovalov forms for Poisson Lie superalgebras""; ""Triangular Poisson structures on Lie groups and symplectic reduction""; ""Vertex operator algebras, fusion rules and modular transformations""; ""Depth two and the Galois coring""; ""Examples of Peirce decomposition of generalized Jordan triple system of second order � Balanced cases""; ""Graded representations of graded Lie algebras and generalized representations of Jordan algebras""; ""Dynamical Yang-Baxter equation and



quantization of certain Poisson brackets""

""Fortieth anniversary of extremal projector method for Lie symmetries""

2.

Record Nr.

UNINA9910828982703321

Autore

Chebbi Chiheb

Titolo

Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers / / Chiheb Chebbi

Pubbl/distr/stampa

Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018

2018

Edizione

[1st edition]

Descrizione fisica

1 online resource (396 pages)

Disciplina

005.8092

Soggetti

Penetration testing (Computer security)

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Sommario/riassunto

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure About This Book Advanced exploitation techniques to breach modern operating systems and complex network devices Learn about Docker breakouts, Active Directory delegation, and CRON jobs Practical use cases to deliver an intelligent endpoint-protected system Who This Book Is For If you are a system administrator, SOC analyst, penetration tester, or a network engineer and want to take your penetration testing skills and security knowledge to the next level, then this book is for you. Some prior experience with penetration testing tools and knowledge of Linux and Windows command-line syntax is beneficial. What You Will Learn Exposure to advanced infrastructure penetration testing techniques and methodologies Gain hands-on experience of penetration testing in Linux system vulnerabilities and memory exploitation Understand what it takes to break into enterprise networks Learn to secure the configuration management environment and continuous delivery



pipeline Gain an understanding of how to exploit networks and IoT devices Discover real-world, post-exploitation techniques and countermeasures In Detail It has always been difficult to gain hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. This book will be your one-stop solution to compromising complex network devices and modern operating systems. This book provides you with advanced penetration testing techniques that will help you exploit databases, web and application servers, switches or routers, Docker, VLAN, VoIP, and VPN. With this book, you will explore exploitation abilities such as offensive PowerShell tools and techniques, CI servers, database exploitation, Active Directory delegation, kernel exploits, cron jobs, VLAN hopping, and Docker breakouts. Moving on, this book will not only walk you through managing vulnerabilities, but will also teach you how to ensure endpoint protection. Toward the end of this book, you will also discover post-exploitation tips, tools, and methodologies to help your organization build an intelligent security system. By the end of this book, you will have mastered the skills and methodologies needed to breach infrastructures and provide complete endpoint protection for your system. Style and approach Your one-stop...