Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman... | | OS X Exploits and DefenseLong believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.
Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an... | | Using Windows 8.1: Return of the Start Button
Using Windows 8.1 is the essential step by step guide to using a computer running Windows 8, providing a complete resource for both the beginner and the enthusiast.
Techniques are illustrated in step-by-step using photography and screen prints throughout, together with concise, easy to follow text from an established expert... |