-
Kali Linux Cookbook - Second Edition
Author Bob Perciaccante , Corey P. Schultz
Over 80 recipes to effectively test your network and boost your career in securityAbout This BookLearn how to scan networks to find vulnerable computers and serversHack into devices to control them, steal their data, and make them yoursTarget wireless networks, dat....
Release Date 2017/09 -
Social dilemmas, institutions, and the evolution of cooperation
Author Wojtek Przepiorka , Ben Jann
The question of how cooperation and social order can evolve from a Hobbesian state of nature of a “war of all against all” has always been at the core of social scientific inquiry. Social dilemmas are the main analytical paradigm used by social scientists to explai....
Release Date 2017/09 -
Educating Social Entrepreneurs, Volume I
Author Maria Aggestam , Paul Miesing
Educating Social Entrepreneurs: From Idea Generation to Business Plan Formulation appears at a time of unprecedented environmental disasters, natural resources depletion, and significant failure of governments and global businesses to attend to worldwide social pro....
Release Date 2017/07 -
Educating Social Entrepreneurs, Volume II
Author Maria Aggestam , Paul Miesing
Educating Social Entrepreneurs: From Business Plan Formulation to Implementation appears at a time of unprecedented environmental disasters, natural resources depletion, and significant failure of governments and global businesses to attend to worldwide social prob....
Release Date 2017/07 -
Author Sagar Rahalkar
An easy to digest practical guide to Metasploit covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics.About This BookCarry out penetration testing in highly-secured envir....
Release Date 2017/07 -
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
Author Vijay Kumar Velu
A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers.About This BookEmploy advanced pentesting techniques with Kali Linux to build highly-secured systemsGet to grips with various stealth techn....
Release Date 2017/06 -
Author Jason Beltrame
Sharpen your pentesting skill in a bootcampAbout This BookGet practical demonstrations with in-depth explanations of complex security-related problemsFamiliarize yourself with the most common web vulnerabilitiesGet step-by-step guidance on managing testing results ....
Release Date 2017/06 -
Author Joan C. Williams
"I recommend a book by Professor Williams, it is really worth a read, it's called White Working Class." -- Vice President Joe Biden on Pod Save AmericaAn Amazon Best Business and Leadership book of 2017Around the world, populist movements are gaining traction amon....
Release Date 2017/05 -
Kali Linux Network Scanning Cookbook - Second Edition
Author Justin Hutchens , Michael Hixon
Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanningAbout This BookLearn the fundamentals behind commonly used scanning techniquesDeploy powerful scanning tools that are integrate....
Release Date 2017/05 -
Kali Linux Intrusion and Exploitation Cookbook
Author Ishan Girdhar , Dhruv Shah
Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessmentsAbout This BookSet up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploitsImprove your testing efficien....
Release Date 2017/04 -
Author Wil Allsopp
Build a better defense against motivated, organized, professional attacksAdvanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not....
Release Date 2017/03 -
White Space Is Not Your Enemy, 3rd Edition
Author Rebecca Hagen , Kim Golombisky
White Space Is Not Your Enemy is a practical graphic design and layout guide that introduces concepts and practices necessary for producing effective visual communication across a variety of formats—from web to print. Sections on Gestalt theory, color theory, and W....
Release Date 2017/02 -
Mastering Modern Web Penetration Testing
Author Prakhar Prasad
Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!About This BookThis book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Se....
Release Date 2016/10 -
Python: Penetration Testing for Developers
Author Dave Mound , Benjamin May , Andrew Mabbitt , Terry Ip , Cameron Buchanan , Mohit , Chr
Unleash the power of Python scripting to execute effective and efficient penetration testsAbout This BookSharpen your pentesting skills with PythonDevelop your fluency with Python to write sharper scripts for rigorous security testingGet stuck into some of the most....
Release Date 2016/10 -
Coding for Penetration Testers, 2nd Edition
Author Ryan Linn , Jason Andress
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool....
Release Date 2016/09 -
Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition
Author Gerard Johansen
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition!About This BookGet a rock-solid insight into penetration testing techniques and test your corporate network against threats like never beforeFormulate your p....
Release Date 2016/09 -
Author Nipun Jaswal
Take your penetration testing and IT security skills to a whole new level with the secrets of MetasploitAbout This BookGain the skills to carry out penetration testing in complex and highly-secured environmentsBecome a master using the Metasploit framework, develop....
Release Date 2016/09 -
Kali Linux 2: Windows Penetration Testing
Author Bo Weaver , Wolf Halton
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackersAbout This BookConduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate an....
Release Date 2016/06 -
Effective Python Penetration Testing
Author Rejah Rehim
Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This BookLearn to utilize your Python scripting skills to pentest a computer system, network, and web-applicationGet proficient at the art of assess....
Release Date 2016/06 -
Author Mehmet Sahinoglu
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats.This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of....
Release Date 2016/05 -
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Author Kevin Cardwell , Lee Allen
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environmentsAbout This BookLearn how to build your own pentesting lab environment to practice advanced techniquesCustomize your own scripts, and learn methods to exploit 32....
Release Date 2016/03 -
Building a Pentesting Lab for Wireless Networks
Author Andrey Popov , Vyacheslav Fadyushin
Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniquesAbout This BookDesign and build an extendable penetration testing lab with wireless access suitable for home and enterprise useFill the lab with various compo....
Release Date 2016/03 -
Mobile Application Penetration Testing
Author Vijay Kumar Velu
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter themAbout This BookGain insights into the current threat landscape of mobile applications in particularExplore the different options that are available on mobile platforms and ....
Release Date 2016/03 -
Social Movements for Good: How Companies and Causes Create Viral Change
Author Derrick Feldmann
Create real change in the new social movement paradigmSocial Movements for Good is a guidebook for driving change, by taking advantage of the social "currency" that makes movements go viral. Author Derrick Feldmann has spent a career showing organizations how to be....
Release Date 2016/02 -
Kali Linux Web Penetration Testing Cookbook
Author Gilberto Nájera-Gutiérrez
Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2About This BookFamiliarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of themSet up a penetra....
Release Date 2016/02 -
Mastering Kali Linux Wireless Pentesting
Author Brian Sak , Jilumudi Raghu Ram
Test your wireless network's security and master advanced wireless penetration techniques using Kali LinuxAbout This BookDevelop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive in....
Release Date 2016/02 -
Boundary Element Techniques in Engineering
Author S. Walker , C. A. Brebbia
Boundary Element Techniques in Engineering deals with solutions of two- and three-dimensional problems in elasticity and the potential theory where finite elements are inefficient. The book discusses approximate methods, higher-order elements, elastostatics, time-de....
Release Date 2016/01 -
I'm Not Afraid of GDPI, 2nd Edition
Author Tuhina Anukul Varshney
In today's cut throat competitive world, an enhanced personality, excellent communication and GDPI skills are essential facets of job seeking candidates to land the best jobs. I'm Not Afraid of GDPI, 2e comprehensively deals with every aspect of the hiring proce....
Release Date 2016/01 -
Hacking For Dummies, 5th Edition
Author Kevin Beaver
Learn to hack your own system to protect against malicious attacks from outsideIs hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your ne....
Release Date 2015/12 -
Google Hacking for Penetration Testers, 3rd Edition
Author Justin Brown , Bill Gardner , Johnny Long
Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade sec....
Release Date 2015/11