-
Kali Linux Intrusion and Exploitation Cookbook
Author Ishan Girdhar , Dhruv Shah
Over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessmentsAbout This BookSet up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploitsImprove your testing efficien....
Release Date 2017/04 -
Author Cameron Buchanan
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali LinuxIn DetailAs attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools ar....
Release Date 2014/07 -
Kali Linux Cookbook - Second Edition
Author Bob Perciaccante , Corey P. Schultz
Over 80 recipes to effectively test your network and boost your career in securityAbout This BookLearn how to scan networks to find vulnerable computers and serversHack into devices to control them, steal their data, and make them yoursTarget wireless networks, dat....
Release Date 2017/09 -
Kali Linux 2: Windows Penetration Testing
Author Bo Weaver , Wolf Halton
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackersAbout This BookConduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate an....
Release Date 2016/06 -
Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition
Author Shakeel Ali , Tedi Heriyanto , Lee Allen , Gerard Johansen , Damian Boodoo , Alex Sam
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth editionKey FeaturesRely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-....
Release Date 2018/10 -
Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition
Author Gerard Johansen
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition!About This BookGet a rock-solid insight into penetration testing techniques and test your corporate network against threats like never beforeFormulate your p....
Release Date 2016/09 -
Kali Linux - An Ethical Hacker's Cookbook - Second Edition
Author Himanshu Sharma
Discover end-to-end penetration testing solutions to enhance your ethical hacking skillsKey FeaturesPractical recipes to conduct effective penetration testing using the latest version of Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and more to detect....
Release Date 2019/03 -
Kali Linux - An Ethical Hacker's Cookbook
Author Himanshu Sharma
Over 120 recipes to perform advanced penetration testing with Kali LinuxAbout This BookPractical recipes to conduct effective penetration testing using the powerful Kali LinuxLeverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities wi....
Release Date 2017/10 -
International Social Entrepreneurship
Author Joseph Mark Munoz
The book is attractive to the target readers for the following reasons : 1) there has been a growing interest in the topic of social entrepreneurship and yet there are limited academic materials, this book will offer a concise, straight-forward compilation of theori....
Release Date 2010/06 -
I'm Not Afraid of GDPI, 2nd Edition
Author Tuhina Anukul Varshney
In today's cut throat competitive world, an enhanced personality, excellent communication and GDPI skills are essential facets of job seeking candidates to land the best jobs. I'm Not Afraid of GDPI, 2e comprehensively deals with every aspect of the hiring proce....
Release Date 2016/01 -
Hands-On Web Penetration Testing with Metasploit
Author Harpreet Singh , Himanshu Sharma
Identify, exploit, and test web application security with easeKey FeaturesGet up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerab....
Release Date 2020/05 -
Hands-On Penetration Testing with Python
Author Furqan Khan
Implement defensive techniques in your ecosystem successfully with PythonKey FeaturesIdentify and expose vulnerabilities in your infrastructure with Python Learn custom exploit development . Make robust and powerful cybersecurity tools with Python W....
Release Date 2019/01 -
Hands-On Penetration Testing on Windows
Author Phil Bramwell
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux.Key FeaturesIdentify the vulnerabilities in your system using Kali Linux 2018.02 Discover the art of exploiting Windows kernel drivers Get ....
Release Date 2018/07 -
Hands-On Bug Hunting for Penetration Testers
Author Joseph Marshall
Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.Key FeaturesLearn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book Desc....
Release Date 2018/09 -
Hands-On Application Penetration Testing with Burp Suite
Author Riyaz Ahemed Walikar , Dhruv Shah , Carlos A. Lozano
Test, fuzz, and break web applications and services using Burp Suite's powerful capabilitiesKey FeaturesMaster the skills to perform various types of security tests on your web applications Get hands-on experience working with components like scanner, proxy, intru....
Release Date 2019/02 -
Author Andrew Bindner , James Broad
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you thr....
Release Date 2013/12 -
Hacking For Dummies, 6th Edition
Author Kevin Beaver
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penet....
Release Date 2018/07 -
Hacking For Dummies, 5th Edition
Author Kevin Beaver
Learn to hack your own system to protect against malicious attacks from outsideIs hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your ne....
Release Date 2015/12 -
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition
Author Allen Harper , Ryan Linn , Stephen Sims , Michael Baucom , Huascar Tejeda , Daniel Fe
Up-to-date strategies for thwarting the latest, most insidious network attacksThis fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at ma....
Release Date 2022/03 -
GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
Author Raymond Nutting , Mirza Ahmed , William MacCormack
This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester exam This effective self-study guide fully prepares you for the Global Information Assurance Certification’s challenging Penetration Tester exam, which validates advanced....
Release Date 2020/11 -
Google Hacking for Penetration Testers, 3rd Edition
Author Justin Brown , Bill Gardner , Johnny Long
Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade sec....
Release Date 2015/11 -
Author Bob Seidensticker
Everyone knows that today's rate of technological change is unprecedented. With technological breakthroughs from the Internet to cell phones to digital music and pictures, everyone knows that the social impact of technology has never been as profound.But every....
Release Date 2006/04 -
From Oz to Kansas: Almost Every Black and White Conversion Technique Known to Man
Author Vincent Versace
The ability to create a stunning black and white image remains one of photography’s greatest and most aspirational skills. Being able to "see" in black and white is an enviable capability, and a well-crafted black and white photograph remains the finest of the fine ....
Release Date 2012/08 -
Ethical Hacking: Techniques, Tools, and Countermeasures, 4th Edition
Author Michael G. Solomon , Sean-Philip Oriyano
Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous....
Release Date 2022/11 -
Ethical Hacking and Penetration Testing Guide
Author Rafay Baloch
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret ....
Release Date 2017/09 -
Environmental Protection and the Social Responsibility of Firms
Author Richard Professor Vietor , Robert Professor Stavins , Bruce Professor Hay
Everyone agrees that firms should obey the law. But beyond what the law requires-beyond bare compliance with regulations-do firms have additional social responsibilities to commit resources voluntarily to environmental protection? How should we think about firms sac....
Release Date 2010/09 -
Enhancing Learning and Teaching Through Student Feedback in Social Sciences
Author Patricie Mertova , Chenicheri Sid Nair
This title is the second Chandos Learning and Teaching Series book that explores themes surrounding enhancing learning and teaching through student feedback. It expands on topics covered in the previous publication, and focuses on social science disciplines. The edi....
Release Date 2013/02 -
Effective Python Penetration Testing
Author Rejah Rehim
Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This BookLearn to utilize your Python scripting skills to pentest a computer system, network, and web-applicationGet proficient at the art of assess....
Release Date 2016/06 -
Educating Social Entrepreneurs, Volume II
Author Maria Aggestam , Paul Miesing
Educating Social Entrepreneurs: From Business Plan Formulation to Implementation appears at a time of unprecedented environmental disasters, natural resources depletion, and significant failure of governments and global businesses to attend to worldwide social prob....
Release Date 2017/07