Friday, February 20, 2009

Digital Nature and Landscape Photography or Hacking Exposed VoIP

Digital Nature and Landscape Photography

Author: Mark Lucock

Landscape photography is one of the last bastions of traditional film, but this is slowly changing, as more and more leading photographers adopt digital technology. This beautifully produced and illustrated reference outlines simple techniques for assuring that your nature images achieve both technical and creative excellence. Covering everything from using a digital camera in the field to image-editing methods in the digital darkroom, it elaborates on the best methods for working with tripods and flashes outside, the implications of using different exposure meters in certain lighting conditions, and a whole host of tips dedicated to gaining a proper understanding of the craft. With breathtaking images featured throughout, this resource is sure to inspire every amateur photographer eager to go digital outdoors.
 

Daniel Lombardo - Library Journal

These two volumes use completely different methods for inspiring photographers of the natural world. The unique format of Developing Vision and Style contains a dialog among three admired British landscape photographers (Charlie Waite, David Ward, and Joe Cornish) moderated by editor Eddie Ephraums. The answers to his thought-provoking questions are illustrated with each photographer's work. The same questions are then presented to several amateur and professional photographers for their insights, again accompanied by examples of their work. The result is a stunning landscape photography tutorial full of a broad range of insights. Highly recommended for all collections.

Lucock's splendid volume covers the new technical possibilities of digital nature and landscape photography. The coverage encompasses advice on the digital workflow from hardware to software, understanding the rich, creative potential of the medium, the use of digital cameras in the field, and basic and advanced image-editing techniques. As a biologist, professional photographer, and experienced author, Lucock is uniquely qualified to have produced this highly recommended book.



Table of Contents:
Introduction     6
Early Considerations     20
Digital Nuts and Bolts     40
The Digital Darkroom     74
The Photographic Basics     100
Understanding Field Craft     116
Professionalizing Your Photography     152
Glossary     168
Useful websites     173
About the author     174
Index     175

See also: Apples or Recipes for the Loaf Pan

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Author: David Endler

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way

"This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.

  • Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware
  • Fortify Cisco, Avaya, and Asterisk systems
  • Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation
  • Thwart number harvesting, call pattern tracking, and conversation eavesdropping
  • Measure and maintain VoIP network quality of service and VoIP conversation quality
  • Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones
  • Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks
  • Avoid insertion/mixing of malicious audio
  • Learn about voice SPAM/SPIT andhow to prevent it
  • Defend against voice phishing and identity theft scams

David Endler is the Director of Security Research for TippingPoint, a division of 3Com. Previously, he performed security research for Xerox Corporation, the NSA, and MIT.  Endler is also the chairman and founder of the Voice over IP Security Alliance.

Mark Collier is CTO for SecureLogix Corporation.  He is an expert author and frequent presenter on the topic of VoIP security. Collier is also a founding member of the Voice over IP Security Alliance.



1 comment:

  1. Avaya digital phone system. They have so many options and features that they are able to do almost anything you. Avaya Digital Phone System system is the ultimate VoIP PBX for small to mid-sized organizations (up to 272 users).

    ReplyDelete