-
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
Author Robert Beggs , Vijay Kumar Velu
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers Key FeaturesEmploy advanced pentesting techniques with Kali Linux to build highly secured systems Discover various stealth techniques to remain....
Release Date 2019/01 -
Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition
Author Shakeel Ali , Tedi Heriyanto , Lee Allen , Gerard Johansen , Damian Boodoo , Alex Sam
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth editionKey FeaturesRely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-....
Release Date 2018/10 -
Hands-On Bug Hunting for Penetration Testers
Author Joseph Marshall
Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.Key FeaturesLearn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book Desc....
Release Date 2018/09 -
Learning Python Web Penetration Testing
Author Christian Martorella
Leverage the simplicity of Python and available libraries to build web security testing tools for your applicationAbout This BookUnderstand the web application penetration testing methodology and toolkit using PythonWrite a web crawler/spider with the Scrapy librar....
Release Date 2018/06 -
Author Glen D. Singh
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.2 Gain comprehensive insights into security concepts such as social engineering, wireless netwo....
Release Date 2019/11 -
Kali Linux - An Ethical Hacker's Cookbook - Second Edition
Author Himanshu Sharma
Discover end-to-end penetration testing solutions to enhance your ethical hacking skillsKey FeaturesPractical recipes to conduct effective penetration testing using the latest version of Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and more to detect....
Release Date 2019/03 -
Hands-On Web Penetration Testing with Metasploit
Author Harpreet Singh , Himanshu Sharma
Identify, exploit, and test web application security with easeKey FeaturesGet up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerab....
Release Date 2020/05 -
Windows and Linux Penetration Testing from Scratch - Second Edition
Author Phil Bramwell
Master the art of identifying and exploiting vulnerabilities with Metasploit, Empire, PowerShell, and Python, turning Kali Linux into your fighter cockpitKey FeaturesMap your client's attack surface with Kali LinuxDiscover the craft of shellcode injection and managing multiple compromises in the en....
Release Date 2022/08 -
The Ultimate Kali Linux Book - Second Edition
Author Glen D. Singh
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchPurchase of the print or Kindle book includes a free eBook in the PDF formatKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using a....
Release Date 2022/02 -
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
Author Vijay Kumar Velu
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and devices, and learn the latest phishing and hacking techniquesKey FeaturesExplore red teaming and play the hackers game to proactively defend your inf....
Release Date 2022/02 -
Digital Forensics with Kali Linux - Second Edition
Author Shiva V. N. Parasram
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey FeaturesPerform evidence acquisition, preservation, and analysis using a variety o....
Release Date 2020/04 -
Python Ethical Hacking from Scratch
Explore the world of practical ethical hacking by developing custom network scanning and remote access tools that will help you test the system security of your organizationKey FeaturesGet hands-on with ethical hacking and learn to think like a real-life hackerBuild practical ethical hacking tools f.... -
Mastering Metasploit - Fourth Edition
Author Nipun Jaswal
Discover the next level of network defense and penetration testing with the Metasploit 5.0 frameworkKey FeaturesMake your network robust and resilient with this updated edition covering the latest pentesting techniques Explore a variety of entry points to compromise a sy....
Release Date 2020/06 -
Metasploit 5.0 for Beginners - Second Edition
Author Sagar Rahalkar
A comprehensive guide to Metasploit for beginners that will help you get started with the latest Metasploit 5.0 Framework for exploiting real-world vulnerabilitiesKey FeaturesPerform pentesting in highly secured environments with Metasploit 5.0 Become well-versed with th....
Release Date 2020/04 -
Enhancing Learning and Teaching Through Student Feedback in Social Sciences
Author Patricie Mertova , Chenicheri Sid Nair
This title is the second Chandos Learning and Teaching Series book that explores themes surrounding enhancing learning and teaching through student feedback. It expands on topics covered in the previous publication, and focuses on social science disciplines. The edi....
Release Date 2013/02 -
An Introduction to Hacking and Crimeware
Author Victoria Loewengart
Defend your business, protect your livelihood, safeguard your future.Cybercrime is on the rise. Unchecked, it could destroy the entire global cyber infrastructure and wipe out many businesses. We need to defend ourselves against it, and we must fight back. Toolkits ....
Release Date 2012/01 -
Kali Linux – Assuring Security by Penetration Testing
Author Shakeel Ali , Lee Allen , Tedi Heriyanto
With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals.In DetailKali Linux is a comprehe....
Release Date 2014/04 -
Author LID Editorial
Who you know has always been as important as what you know, and social or business networks (that is, groups of people connecting together with a common interest) have existed since time began. Your connections can help with everything from business deals or career ....
Release Date 2014/06 -
Environmental Protection and the Social Responsibility of Firms
Author Richard Professor Vietor , Robert Professor Stavins , Bruce Professor Hay
Everyone agrees that firms should obey the law. But beyond what the law requires-beyond bare compliance with regulations-do firms have additional social responsibilities to commit resources voluntarily to environmental protection? How should we think about firms sac....
Release Date 2010/09 -
Social Capital, Social Identities
Author Hans Bernhard Schmid , Christoph Henning , Dieter Thomä
Current research on social capital tends to focus on an economic reading of social relations. Whereas economists pride themselves on reaching out to social theory at-large, sociologists criticize the economization of the social fabric. The concept of social capital....
Release Date 2014/08 -
Social dilemmas, institutions, and the evolution of cooperation
Author Wojtek Przepiorka , Ben Jann
The question of how cooperation and social order can evolve from a Hobbesian state of nature of a “war of all against all” has always been at the core of social scientific inquiry. Social dilemmas are the main analytical paradigm used by social scientists to explai....
Release Date 2017/09 -
Author Mark Redmond
Social decentering theory was developed in response to the confusion created by the use of the term empathy and to a lesser extent, perspective-taking, to reflect a wide and varied set of human cognitive processes and behaviors. Theory of Social Decentering: A Theo....
Release Date 2018/05 -
Social Ontology of Whoness, 3rd Edition
Author Michael Eldred
How are core social phenomena to be understood as modes of being? This book offers an alternative approach to social ontology. Recent interest in social ontology on the part of mainstream philosophy and the social sciences presupposes from the outset that the human....
Release Date 2018/10 -
Sociology and Social Anthropology in India
Author Yogesh Atal
The Indian Council of Social Science Research, the premier organization for social science research in India, conducts periodic surveys in the major disciplines of the social sciences to assess disciplinary developments as well as to identify gaps in research in ....
Release Date 2009/02 -
Social Development in Independent India
Author Muchkund Dubey , Rajiv Balakrishnan
Social Development in Independent India: Paths Tread and the Road Ahead provides an overview of social development in India in the past 60 years and also deals with the emerging issues in the 21st century. The book discusses how social development has acquired a glo....
Release Date 2007/10 -
Author M. K. Jabbi , Muchkund Dubey
At the tenth SAARC Summit, it was agreed that an inter-governmental social charter for South Asia under the aegis of SAARC would be prepared. In India, the Council for Social Development formulated the citizens' social charter. The development of the social char....
Release Date 2009/12 -
I'm Not Afraid of GDPI, 2nd Edition
Author Tuhina Anukul Varshney
In today's cut throat competitive world, an enhanced personality, excellent communication and GDPI skills are essential facets of job seeking candidates to land the best jobs. I'm Not Afraid of GDPI, 2e comprehensively deals with every aspect of the hiring proce....
Release Date 2016/01