Advanced Penetration Testing: Hacking the World's Most Secure Networks
Build a better defense against motivated, organized, professional attacks
Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...
Applied Network Security
Master the art of detecting and averting advanced network security attacks and techniques
About This Book
Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
Become an expert in cracking WiFi...
The Art of Deception: Controlling the Human Element of Security
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...
Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...
Penetration Testing Bootcamp
Get practical demonstrations with in-depth explanations of complex security-related problems
Familiarize yourself with the most common web vulnerabilities
Get step-by-step guidance on managing testing results and reporting
CSS Cookbook, 3rd Edition (Animal Guide)
What people are saying about CSS Cookbook
"Christopher's fantastic cookbook will give you solutions to pretty much all of the CSS problems you'll come up against in your day-to-day web design work, saving you bags of time and frustration. This guy is one of the industry's brightest minds --...
Data-Driven Security: Analysis, Visualization and Dashboards
Uncover hidden patterns of data and respond with countermeasures
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...
Salesforce CRM Admin Cookbook
Over 40 recipes to make effective use of Salesforce CRM with the use of hidden features, advanced user interface techniques, and real-world solutions
Implement advanced user interface techniques to improve the look and feel of Salesforce CRM
Discover hidden features and hacks that...
|Result Page: 21 20 19 18 17 16 15 14 13 12 |