-
Social Development Through Benevolent Business
Author Kalyan Sankar Mandal
This book points out that apart from usual “profit- maximizing business,”, there are some other types of business models which that serve social causes with profit. The author discusses some such business models, namely, social business, compassionate b....
Release Date 2018/01 -
Kali Linux 2: Windows Penetration Testing
Author Bo Weaver , Wolf Halton
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackersAbout This BookConduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate an....
Release Date 2016/06 -
Web Penetration Testing with Kali Linux - Second Edition
Author Juned Ahmed Ansari
Build your defense against web attacks with Kali Linux 2.0About This BookGain a deep understanding of the flaws in web applications and exploit them in a practical mannerGet hands-on web application hacking experience with a range of tools in Kali Linux 2.0Develop ....
Release Date 2015/11 -
Profit + Purpose: How Social Innovation Is Transforming Business for Good
Author Kyle Westaway
World-changing ideas become reality with practical, effective planningProfit + Purpose: Tools to Structure, Fund, and Run a Social Enterprise is a practical step-by step guide to creating a successful socially-oriented business venture. With practical, actionable gu....
Release Date 2014/09 -
Hands-On Penetration Testing on Windows
Author Phil Bramwell
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux.Key FeaturesIdentify the vulnerabilities in your system using Kali Linux 2018.02 Discover the art of exploiting Windows kernel drivers Get ....
Release Date 2018/07 -
Where Does Social Security Fit Into Your Retirement?
Author Paul B. Brown , Frank Armstrong
This Element is an excerpt from Save Your Retirement: What to Do If You Haven’t Saved Enough or If Your Investments Were Devastated by the Market Meltdown (9780137029006) by Frank Armstrong, III and Paul B. Brown. Available in print and digital formats.A clear-eyed ....
Release Date 2010/09 -
Author Dr. Erdal Ozkaya
Improve information security by learning Social Engineering.About This BookLearn to implement information security using social engineeringGet hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so onPractical approac....
Release Date 2018/04 -
Author Lance Kaplan , Tarek Abdelzaher , Dong Wang
Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field ....
Release Date 2015/04 -
White Space Is Not Your Enemy, 3rd Edition
Author Rebecca Hagen , Kim Golombisky
White Space Is Not Your Enemy is a practical graphic design and layout guide that introduces concepts and practices necessary for producing effective visual communication across a variety of formats—from web to print. Sections on Gestalt theory, color theory, and W....
Release Date 2017/02 -
Tissue Engineering Using Ceramics and Polymers, 2nd Edition
Author P.X. Ma , Aldo R Boccaccini
The second edition of Tissue Engineering Using Ceramics and Polymers comprehensively reviews the latest advances in this area rapidly evolving area of biomaterials science. Part one considers the biomaterials used for tissue engineering. It introduces the properties....
Release Date 2014/06 -
Mastering Modern Web Penetration Testing
Author Prakhar Prasad
Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!About This BookThis book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Se....
Release Date 2016/10 -
Digital Forensics with Kali Linux - Second Edition
Author Shiva V. N. Parasram
Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reportingKey FeaturesPerform evidence acquisition, preservation, and analysis using a variety o....
Release Date 2020/04 -
Web Penetration Testing with Kali Linux
Author Aamir Lakhani , Joseph Muniz
Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit.Learn key reconnaissance concepts needed as a penetrati....
Release Date 2013/09 -
Author Frank Wander
Practical, proven guidance for transforming the culture of any IT departmentAs more and more jobs are outsourced, and the economy continues to struggle, people are looking for an alternative to the greed-driven, selfish leadership that has resulted in corporations w....
Release Date 2013/02 -
Author Steve Winterfeld , Jason Andress
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The ....
Release Date 2011/07 -
Kali Linux – Assuring Security by Penetration Testing
Author Shakeel Ali , Lee Allen , Tedi Heriyanto
With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals.In DetailKali Linux is a comprehe....
Release Date 2014/04 -
Kali Linux Wireless Penetration Testing Essentials
Author Marco Alamanni
Plan and execute penetration tests on wireless networks with the Kali Linux distributionIn DetailKali Linux is the most popular distribution dedicated to penetration testing that includes a set of free, open source tools.This book introduces you to wireless penetrat....
Release Date 2015/07 -
Author Soren Kenner , Imran Rashid
Authors Imran Rashid and Soren Kenner have sparked an international debate by revealing the “mind hacks” Facebook, Apple, Google, and Instagram use to get you and your children hooked on their products. In Offline, they deliver an eye-opening research-based journey....
Release Date 2019/02 -
Social Engineering, 2nd Edition
Author Christopher Hadnagy
Harden the human firewall against the most current threatsSocial Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus softw....
Release Date 2018/07 -
The Social Leader: Redefining Leadership for the Complex Social Age
Author Sudhanshu Palsule , Frank Guglielmo
Technology, global economics, and demographics are colluding to create workspaces that thrive on communities rather than hierarchies. Our industrial paradigm with its roots in the military is swiftly being replaced by a paradigm based on networks that are held toget....
Release Date 2014/09 -
A Brief Look at Some Businesses Based on Shared Social Experience
Author Rawn Shah
This Element is an excerpt from Social Networking for Business: Choosing the Right Tools and Resources to Fit Your Needs (9780132357791) by Rawn Shah. Available in print and digital formats.¿Lessons from some of today’s most innovative social businesses: last.fm, Li....
Release Date 2010/04 -
Python Penetration Testing Essentials
Author Mohit
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.About This BookDetect and avoid various attack types that put the privacy of a ....
Release Date 2018/05 -
Social dilemmas, institutions, and the evolution of cooperation
Author Wojtek Przepiorka , Ben Jann
The question of how cooperation and social order can evolve from a Hobbesian state of nature of a “war of all against all” has always been at the core of social scientific inquiry. Social dilemmas are the main analytical paradigm used by social scientists to explai....
Release Date 2017/09 -
Chaos Engineering Observability
Author Russ Miles
Chaos engineering is a highly collaborative activity. When applied well, virtually everyone is responsible for exploring, surfacing, overcoming, and validating weaknesses in their systems. That can lead to a lot of chaos engineering activity across a collection of ....
Release Date 2019/04 -
Metasploit Revealed: Secrets of the Expert Pentester
Author Nipun Jaswal , Sagar Rahalkar
Exploit the secrets of Metasploit to master the art of penetration testing.About This BookDiscover techniques to integrate Metasploit with the industry's leading toolsCarry out penetration testing in highly-secured environments with Metasploit and acquire skills t....
Release Date 2017/12 -
Author J. Stuart Bunderson , Bret Sanner
Research on social species shows that hierarchies are important for group functioning. Human beings also have a tendency to think and act hierarchically. In fact, hierarchies — distinct differences in group members' power and status — can be found in v....
Release Date 2018/01 -
Google Hacking for Penetration Testers, 3rd Edition
Author Justin Brown , Bill Gardner , Johnny Long
Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade sec....
Release Date 2015/11 -
Author Amy Sample Ward , Afua Bruce
Changing the way we use, develop, and fund technology for social change is possible, and it starts with you. The Tech That Comes Next: How Changemakers, Philanthropists, and Technologists Can Build an Equitable World outlines a vision of a more equitable and just world along with practical steps to ....
Release Date 2022/03 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Brad Hibbert , Morey J. Haber
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breache....
Release Date 2017/12