Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.

...

Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...

Securing the Internet of Things
Securing the Internet of Things

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.

You will learn the basics of...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

This book is designed to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints of what many are calling cyber warfare today. One comes from a commercial background and the other brings the military viewpoint. The book is designed to help...

Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit: Database Implementation and Maintenance
The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit: Database Implementation and Maintenance
SQL Server 2008 is the latest update to Microsoft's flagship database management system. This is the largest update since SQL Server 2005. SQL Server 2008 is a much more significant update than SQL Server 2005, because it brings increased ability to deliver data across more platforms, and thus many different types of devices. New functionality also...
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)
Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover...

Result Page: 31 30 29 28 27 26 25 24 23 22 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy