 |
|
 The Hacker Playbook: Practical Guide To Penetration Testing
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the... |  |  Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,... |  |  Faith (The Art of Living)
In "Faith", the theologian Theo Hobson explores the notion of faith and the role it plays in our lives. He unpacks the concept to ask whether faith is dependent on religion or whether it is also a general secular phenomenon. In exploring this question Hobson ranges widely over theology, philosophy, politics and psychology and... |
|
 Advanced Penetration Testing: Hacking the World's Most Secure Networks
Build a better defense against motivated, organized, professional attacks
Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by... |  |  Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be... |  |  Honeypots and Routers: Collecting Internet Attacks
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to... |
|
|
 Protected: Internet, Intranet, & Virtual Private NetworksA systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web... |  |  Kali Linux: Wireless Penetration Testing Beginner's Guide
Key Features
-
Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
-
Detect hidden wireless networks and discover their names
-
Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
-
Develop your encryption
... |  |  Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.
You'll learn how to configure your network from the ground up, starting by setting up your... |
|
| Result Page: 6 5 4 3 2 1 |