Condition: New.
Condition: New.
Condition: As New. Unread book in perfect condition.
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000.
Condition: As New. Unread book in perfect condition.
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000.
US$ 31.42
Quantity: Over 20 available
Add to basketPAP. Condition: New. New Book. Shipped from UK. Established seller since 2000.
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
US$ 32.03
Quantity: Over 20 available
Add to basketPAP. Condition: New. New Book. Shipped from UK. Established seller since 2000.
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000.
US$ 33.15
Quantity: Over 20 available
Add to basketPAP. Condition: New. New Book. Shipped from UK. Established seller since 2000.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 31.41
Quantity: Over 20 available
Add to basketCondition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 33.14
Quantity: Over 20 available
Add to basketCondition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 34.21
Quantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 36.06
Quantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Condition: New. Print on Demand.
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. Podman Core Rootless Containers and Secure Pods gives you a direct path into container work with clear steps, simple workflows, and secure defaults. The book focuses on rootless operations, daemonless execution, and mapped Docker commands. Each chapter shows you how to build, run, and manage containers without background services. You work with pods, images, registries, networks, logging, and hardening rules in a structured way. The content stays practical, so you follow real tasks from installation to daily operations.You learn how rootless environments reduce the risk of elevated processes. You see how daemonless workflows lower system load. You work with containers that respect user boundaries. You gain strong control over pods with clear separation between services. You also build confidence by mapping Docker commands to Podman, so you keep your existing habits while improving security.The book explains setup on Linux, macOS, and Windows. You learn how to install Podman, prepare the environment, handle storage, and troubleshoot common failures. You run containers with simple commands. You build images with structured files. You manage volumes, ports, and custom networks. You pull and push to registries. You use pod definitions to group related services. You track logs with timestamps. You inspect metrics for performance. You follow hardening rules that lower exposure to attacks. You apply these steps to real project chapters that show full workflows.WHO THE BOOK IS FOR- Engineers who want clear container workflows- Developers moving from Docker to Podman- Sysadmins seeking rootless security- Students who need predictable steps- Teams that want simple container operations with less riskWHY THE BOOK- You reduce attack surface with rootless setups- You lower overhead with daemonless execution- You keep your Docker experience through mapped commands- You follow structured pod design- You gain repeatable workflows that support real systemsWHAT IS INSIDE THE BOOK- Installation across platforms- Rootless environment setup- Daemonless operations- Docker to Podman command mapping- Pod design and secure grouping of services- Networking, images, registries, and volumes- Logging and metrics- Hardening rules for containers and pods- Full workflow chapters based on real tasks This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Condition: New. Print on Demand.
Condition: New. Print on Demand.
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. This book is the definitive guide to modern hardware security testing and embedded system protection. It provides a complete, structured framework for engineers, researchers, penetration testers, and advanced students who need a lawful, reproducible approach to assessing and securing physical devices.It begins with the fundamentals of secure hardware architecture, showing how to analyze printed circuit boards, trace signal paths, identify exposed interfaces, and understand the interaction between hardware, firmware, and communication layers. Readers learn how to evaluate firmware integrity, verify code signing mechanisms, and apply cryptographic validation to firmware updates. The book also covers secure boot implementation, key management, and update integrity to ensure long-term device trust.The radio communication chapters explain how to capture, decode, and analyze Sub-GHz and NFC signals under controlled conditions. You will learn how to isolate and shield test environments, manage interference, and perform lawful radio testing while maintaining compliance with regional regulations. Signal analysis, spectrum observation, and controlled replay methodologies are presented with measurable parameters and operational safety considerations.Beyond testing and experimentation, this book integrates the operational and ethical dimensions of hardware security. It provides guidance on red team engagement planning, scope definition, and lawful testing authorization. It teaches how to document evidence, validate findings, and report results through structured, defensible security reports. The responsible disclosure framework outlines how to coordinate with vendors, protect user safety, and contribute to long-term ecosystem resilience.You will learn how to: Examine embedded architectures and assess system-level attack surfaces.Map PCB traces, locate debugging ports, and test electrical pathways safely.Extract, analyze, and validate firmware using both static and dynamic methods.Capture and interpret Sub-GHz and NFC communication for lawful analysis.Configure isolated and shielded environments for RF testing and fuzzing.Implement and verify secure boot and firmware authentication mechanisms.Detect and mitigate protocol-level weaknesses and signal-layer vulnerabilities.Apply tamper detection and physical hardening techniques to embedded systems.Conduct ethical red team operations and handle vulnerabilities responsibly.Produce verifiable, reproducible, and audit-ready technical reports.Each process is supported by defined objectives, procedural logic, and quantitative validation steps. The book avoids abstract theory, focusing instead on measurable, real-world outcomes that demonstrate security effectiveness.By combining radio testing, firmware analysis, hardware design evaluation, and professional reporting into one cohesive framework, this book creates a complete operational guide for modern hardware security practice. It equips readers to perform precise, compliant, and scientifically sound testing that improves the reliability, safety, and integrity of embedded systems.For professionals seeking technical depth, students building research capability, or organizations aiming to standardize secure testing processes, this book establishes a practical and ethical foundation for advanced hardware security work. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. Mastering Java 25 is a complete, hands-on guide that teaches you how to design, build, and deploy modern Java applications using the latest tools, syntax, and performance enhancements in JDK 25. This book takes you beyond basic syntax, showing you how to apply Java's object-oriented principles, concurrency APIs, and architectural patterns to real-world projects.Every example in this book compiles and runs correctly in IntelliJ IDEA or Eclipse, following modern development standards. You will write clear, efficient, and scalable code using Java 25 features such as records, pattern matching, virtual threads, and string templates. Each chapter focuses on practical applications-reinforced with code walkthroughs, inline comments, and professional coding techniques that reflect how Java is used in production systems today.What You Will Learn- Understand Java 25 syntax, type inference, and text processing improvements like string templates and text blocks.- Apply object-oriented design with classes, constructors, records, inheritance, and encapsulation.- Build modular, maintainable applications using packages and the Java Platform Module System (JPMS).- Write concurrent and parallel programs with virtual threads, the Executor framework, and atomic operations.- Manage and optimize memory using garbage collection tuning and JVM profiling tools.- Test and isolate code with JUnit 5, Mockito, and coverage tools like JaCoCo.- Build and deploy RESTful APIs using Spring Boot 3.x, containers, and cloud platforms such as AWS, GCP, and Azure.- Structure enterprise systems with layered and modular architecture for performance and maintainability.- Explore advanced design patterns including DAO, Strategy, Observer, Command, and Dependency Injection.- Prepare for the future of Java through upcoming projects like Loom, Valhalla, and Panama.Inside the Book- Real-world code examples explained line by line.- Full coverage of JVM internals, garbage collection, and memory profiling.- Practical testing and debugging workflows for stable software.- Modern deployment examples using Docker, Kubernetes, and CI/CD pipelines.- Guidance on building scalable microservices and enterprise architectures.Who This Book Is For- Beginners transitioning to intermediate Java developers.- Developers upgrading from older Java versions to Java 25.- Professionals building enterprise or cloud-based applications.- Engineers preparing for Java certification or software architecture roles.Why This Book Is DifferentUnlike generic Java guides, Mastering Java 25 focuses on clarity, practicality, and modern coding standards. Each concept is tied directly to performance, readability, and scalability in real systems. The examples use realistic data models and workflows that mirror production environments-from API design to concurrent processing and deployment automation.This book builds from fundamentals like classes and inheritance to advanced topics like concurrency, profiling, and modular architecture. Each section ends with key takeaways that connect technical concepts to professional software development goals. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Seller: CitiRetail, Stevenage, United Kingdom
US$ 36.57
Quantity: 1 available
Add to basketPaperback. Condition: new. Paperback. This book is the definitive guide to modern hardware security testing and embedded system protection. It provides a complete, structured framework for engineers, researchers, penetration testers, and advanced students who need a lawful, reproducible approach to assessing and securing physical devices.It begins with the fundamentals of secure hardware architecture, showing how to analyze printed circuit boards, trace signal paths, identify exposed interfaces, and understand the interaction between hardware, firmware, and communication layers. Readers learn how to evaluate firmware integrity, verify code signing mechanisms, and apply cryptographic validation to firmware updates. The book also covers secure boot implementation, key management, and update integrity to ensure long-term device trust.The radio communication chapters explain how to capture, decode, and analyze Sub-GHz and NFC signals under controlled conditions. You will learn how to isolate and shield test environments, manage interference, and perform lawful radio testing while maintaining compliance with regional regulations. Signal analysis, spectrum observation, and controlled replay methodologies are presented with measurable parameters and operational safety considerations.Beyond testing and experimentation, this book integrates the operational and ethical dimensions of hardware security. It provides guidance on red team engagement planning, scope definition, and lawful testing authorization. It teaches how to document evidence, validate findings, and report results through structured, defensible security reports. The responsible disclosure framework outlines how to coordinate with vendors, protect user safety, and contribute to long-term ecosystem resilience.You will learn how to: Examine embedded architectures and assess system-level attack surfaces.Map PCB traces, locate debugging ports, and test electrical pathways safely.Extract, analyze, and validate firmware using both static and dynamic methods.Capture and interpret Sub-GHz and NFC communication for lawful analysis.Configure isolated and shielded environments for RF testing and fuzzing.Implement and verify secure boot and firmware authentication mechanisms.Detect and mitigate protocol-level weaknesses and signal-layer vulnerabilities.Apply tamper detection and physical hardening techniques to embedded systems.Conduct ethical red team operations and handle vulnerabilities responsibly.Produce verifiable, reproducible, and audit-ready technical reports.Each process is supported by defined objectives, procedural logic, and quantitative validation steps. The book avoids abstract theory, focusing instead on measurable, real-world outcomes that demonstrate security effectiveness.By combining radio testing, firmware analysis, hardware design evaluation, and professional reporting into one cohesive framework, this book creates a complete operational guide for modern hardware security practice. It equips readers to perform precise, compliant, and scientifically sound testing that improves the reliability, safety, and integrity of embedded systems.For professionals seeking technical depth, students building research capability, or organizations aiming to standardize secure testing processes, this book establishes a practical and ethical foundation for advanced hardware security work. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Seller: CitiRetail, Stevenage, United Kingdom
US$ 37.27
Quantity: 1 available
Add to basketPaperback. Condition: new. Paperback. Podman Core Rootless Containers and Secure Pods gives you a direct path into container work with clear steps, simple workflows, and secure defaults. The book focuses on rootless operations, daemonless execution, and mapped Docker commands. Each chapter shows you how to build, run, and manage containers without background services. You work with pods, images, registries, networks, logging, and hardening rules in a structured way. The content stays practical, so you follow real tasks from installation to daily operations.You learn how rootless environments reduce the risk of elevated processes. You see how daemonless workflows lower system load. You work with containers that respect user boundaries. You gain strong control over pods with clear separation between services. You also build confidence by mapping Docker commands to Podman, so you keep your existing habits while improving security.The book explains setup on Linux, macOS, and Windows. You learn how to install Podman, prepare the environment, handle storage, and troubleshoot common failures. You run containers with simple commands. You build images with structured files. You manage volumes, ports, and custom networks. You pull and push to registries. You use pod definitions to group related services. You track logs with timestamps. You inspect metrics for performance. You follow hardening rules that lower exposure to attacks. You apply these steps to real project chapters that show full workflows.WHO THE BOOK IS FOR- Engineers who want clear container workflows- Developers moving from Docker to Podman- Sysadmins seeking rootless security- Students who need predictable steps- Teams that want simple container operations with less riskWHY THE BOOK- You reduce attack surface with rootless setups- You lower overhead with daemonless execution- You keep your Docker experience through mapped commands- You follow structured pod design- You gain repeatable workflows that support real systemsWHAT IS INSIDE THE BOOK- Installation across platforms- Rootless environment setup- Daemonless operations- Docker to Podman command mapping- Pod design and secure grouping of services- Networking, images, registries, and volumes- Logging and metrics- Hardening rules for containers and pods- Full workflow chapters based on real tasks This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Seller: CitiRetail, Stevenage, United Kingdom
US$ 38.65
Quantity: 1 available
Add to basketPaperback. Condition: new. Paperback. Mastering Java 25 is a complete, hands-on guide that teaches you how to design, build, and deploy modern Java applications using the latest tools, syntax, and performance enhancements in JDK 25. This book takes you beyond basic syntax, showing you how to apply Java's object-oriented principles, concurrency APIs, and architectural patterns to real-world projects.Every example in this book compiles and runs correctly in IntelliJ IDEA or Eclipse, following modern development standards. You will write clear, efficient, and scalable code using Java 25 features such as records, pattern matching, virtual threads, and string templates. Each chapter focuses on practical applications-reinforced with code walkthroughs, inline comments, and professional coding techniques that reflect how Java is used in production systems today.What You Will Learn- Understand Java 25 syntax, type inference, and text processing improvements like string templates and text blocks.- Apply object-oriented design with classes, constructors, records, inheritance, and encapsulation.- Build modular, maintainable applications using packages and the Java Platform Module System (JPMS).- Write concurrent and parallel programs with virtual threads, the Executor framework, and atomic operations.- Manage and optimize memory using garbage collection tuning and JVM profiling tools.- Test and isolate code with JUnit 5, Mockito, and coverage tools like JaCoCo.- Build and deploy RESTful APIs using Spring Boot 3.x, containers, and cloud platforms such as AWS, GCP, and Azure.- Structure enterprise systems with layered and modular architecture for performance and maintainability.- Explore advanced design patterns including DAO, Strategy, Observer, Command, and Dependency Injection.- Prepare for the future of Java through upcoming projects like Loom, Valhalla, and Panama.Inside the Book- Real-world code examples explained line by line.- Full coverage of JVM internals, garbage collection, and memory profiling.- Practical testing and debugging workflows for stable software.- Modern deployment examples using Docker, Kubernetes, and CI/CD pipelines.- Guidance on building scalable microservices and enterprise architectures.Who This Book Is For- Beginners transitioning to intermediate Java developers.- Developers upgrading from older Java versions to Java 25.- Professionals building enterprise or cloud-based applications.- Engineers preparing for Java certification or software architecture roles.Why This Book Is DifferentUnlike generic Java guides, Mastering Java 25 focuses on clarity, practicality, and modern coding standards. Each concept is tied directly to performance, readability, and scalability in real systems. The examples use realistic data models and workflows that mirror production environments-from API design to concurrent processing and deployment automation.This book builds from fundamentals like classes and inheritance to advanced topics like concurrency, profiling, and modular architecture. Each section ends with key takeaways that connect technical concepts to professional software development goals. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.