-
Penetration Tester's Open Source Toolkit, 3rd Edition
Author Jeremy Faircloth
Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes ha....
Release Date 2011/08 -
Penetration Testing and Network Defense
Author Daniel P. Newman , Andrew Whitaker
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plansLearn to perform social engineering and host reconnaissanceEvaluate session hijacking methodsExploit web server vulnerabilitiesDetect attempts to breach ....
Release Date 2005/10 -
Author Jason Beltrame
Sharpen your pentesting skill in a bootcampAbout This BookGet practical demonstrations with in-depth explanations of complex security-related problemsFamiliarize yourself with the most common web vulnerabilitiesGet step-by-step guidance on managing testing results ....
Release Date 2017/06 -
Penetration Testing For Dummies
Author Robert Shimonski
Target, test, analyze, and report on security vulnerabilities with pen testingPen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It ....
Release Date 2020/05 -
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits, First edition
Author William Easttom
The perfect introduction to pen testing for all IT professionals and studentsClearly explains key concepts, terminology, challenges, tools, and skillsCovers the latest penetration testing standards from NSA, PCI, and NISTWelcome to today’s most useful and practical....
Release Date 2018/03 -
Penetration Testing Services Procurement Guide
Author CREST
Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities.It presents a useful over....
Release Date 2014/05 -
Penetration Testing with Shellcode
Author Hamza Megahed
Master Shellcode to leverage the buffer overflow conceptAbout This BookUnderstand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and MetasploitLearn to write and modify 64-bit shellcode along with kernel-level s....
Release Date 2018/02 -
Penetration Testing: A guide for business and IT managers
Author Peter Taylor , Felix Ryan , Tylor Robinson , Gemma Moore , Moinuddin Zaki , Jims Marc
Penetration testing is the attempt to professionally break in to an organisation's systems by exploiting any vulnerabilities, with the goal of determining whether an organisation's IT systems and resources are secure. As hackers and would-be cyber attackers becom....
Release Date 2019/08 -
Penetration Testing: A Survival Guide
Author Mohammed A. Imran , Srinivasa Rao Kotipalli , Juned Ahmed Ansari , Bo Weaver , Wolf
A complete pentesting guide facilitating smooth backtracking for working hackersAbout This BookConduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxGain a deep understanding of the flaws in web applications and exploit them ....
Release Date 2017/01 -
Penetration Testing: Protecting Networks and Systems
Author Kevin M. Henry
Preparation for the Certified Penetration Testing Engineer (CPTE) examination Penetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack. The Certifie....
Release Date 2012/06 -
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work
Author Anthony David Giordano
Make Information GovernanceWork: Best Practices, Step-by-Step Tasks, and Detailed DeliverablesMost enterprises recognize the crucial importance of effective information governance. However, few are satisfied with the value of their efforts to date. Information gover....
Release Date 2014/09 -
Author Matt Williamson
This book is unique in its coverage of all the features of pfSense, empowering you to exploit the firewall's full potential. With clear instructions and detailed screenshots, it helps you configure even the most advanced features.Harness the power of pfSense's cor....
Release Date 2011/03 -
Photographing Yosemite: Digital Field Guide
Author Lewis Kemper
The ideal companion guide for capturing awe-inspiring photos of Yosemite!Whether using a compact camera or a high-end dSLR, this companion guide provides you with detailed information for taking spectacular shots of some of the most recognizable landmarks in the wor....
Release Date 2010/03 -
Photonic Sensing: Principles and Applications for Safety and Security Monitoring
Author Wojtek J. Bock , Gaozhi Xiao
A cutting-edge look at safety and security applications of photonic sensorsWith its many superior qualities, photonic sensing technology is increasingly used in early-detection and early-warning systems for biological hazards, structural flaws, and security threats.....
Release Date 2012/10 -
Author Stoyan Stefanov , Jeremy Rogers
Secure your Linux server and protect it from intruders, malware attacks, and other external threatsAbout This BookLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such as ....
Release Date 2006/02 -
Placing the Suspect Behind the Keyboard
Author Brett Shavers
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work ....
Release Date 2013/02 -
Porting to the Symbian Platform: Open Mobile Development in C/C++
Author Mark Wilcox
If you want to write mobile applications without the idioms of Symbian C++, have existing software assets that you'd like to re-use on Symbian devices, or are an open source developer still waiting for an open Linux-based device to gain significant market penetrati....
Release Date 2009/11 -
Power Plant Instrumentation and Control Handbook
Author Ajay Kumar Debnath , Swapan Basu
The book discusses instrumentation and control in modern fossil fuel power plants, with an emphasis on selecting the most appropriate systems subject to constraints engineers have for their projects. It provides all the plant process and design details, includ....
Release Date 2014/11 -
Power System Operation and Control
Author N. V. Ramana
Power System Operation and Control is a comprehensive text designed for an undergraduate course in electrical engineering. Written in a simple and easy-to-understand manner, the book introduces the reader to economic operation of power system and reactive power cont....
Release Date 2010/09 -
Author Al-Sakib Khan Pathan , Saiful Azad
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted ele....
Release Date 2014/11 -
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Author Niranjan Reddy
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you ....
Release Date 2019/07 -
Author Wilson Bautista Jr.
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.About This BookIntelligence processes and procedures for response mechanismsMaster F3EAD to drive processes based on intelligenceThreat modeling and intelligent framewo....
Release Date 2018/03 -
Author Mohammed Moreb
Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investi....
Release Date 2022/04 -
Practical Linux Security Cookbook - Second Edition
Author Tajinder Kalsi
Enhance file system security and learn about network attack, security tools and different versions of Linux build.Key FeaturesHands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use v....
Release Date 2018/08 -
Author Andrew Honig , Michael Sikorski
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software t....
Release Date 2012/02 -
Author Russ Hepworth-Sawyer , Mark Cousins
Guiding you through the history and emergence of modern mastering techniques, then providing practical hints and tips on how to use them in your set up, Practical Mastering is the book for anyone interested in tackling this elusive art form. Providing you with sold ....
Release Date 2013/08 -
Author Svetlana Ostrovskaya , Oleg Skulkin
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey FeaturesExplore memory forensics, one of the vital branches of digital investigationLearn the art of user activities reconstruction and malware detection using volatile memoryGet acquainted wi....
Release Date 2022/03 -
Practical Mobile Forensics - Fourth Edition
Author Rohit Tamma , Oleg Skulkin , Heather Mahalik
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenariosKey FeaturesApply advanced forensic techniques to recover deleted data from mobile devices Retrieve and analyze data ....
Release Date 2020/04