Security continues to be the predominant concern for any organization that is either on the Internet now or considering it. Nary a week passes where there isn't some new report of hackers breaking into computer systems at some government agency, or trashing some Fortune 500 company's Web site, or even stealing user passwords and credit card...
HackNotes Windows Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques used by criminals to break into computer networks. Understand how the attacks work, then learn how to access and strengthen your Windows systems through a series of tested and trusted anti-hacking methods,...
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
Updated for Windows 8 and the latest version of Linux
The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully...
Master the tactics and tools of the advanced persistent threat hacker
In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...
Defending your web applications against hackers and attackers
The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you...
The term WarDriving originates from WarDialing, a term introduced to the public by Matthew Broderick's character, David Lightman, in the 1983 movie "WarGames." WarDialing is the practice of using a modem attached to a computer to dial an entire exchange of telephone numbers to locate any computers with modems attached to them....
What’s most important when deciding what to include in a new release? Is it bug fixes? Or programming productivity features? Or end-user functionality that will help the developer sell upgrades to applications to their customer and user base? Visual FoxPro 8.0 combines the best of all worlds. So what’s new in Visual...
Here are some sure things: you can't get a virus by simply reading an email. Malicious code can't harm hardware. A virus can't hide from a booted, write-protected diskette. Your computer can't get infected from a picture file. I have given this advice hundreds of times and could repeat it in my sleep. It was the mantra of every...
"James Bach and Robert Werner’s How to Secure Your H-1B Visa is written for both employers and the workers they hire." Andrew Hacker, "The Frenzy about High-Tech Talent", The New York Review of Books, July 9, 2015
The H-1B visa is the gateway for the world’s best and...
This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices....