 |
|
|
|
|
 Metasploit Penetration Testing Cookbook
Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes... |  |  Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... |  |  Biophotonics: Optical Science and Engineering for the 21st Century
It is now well established that all living systems emit a weak but permanent photon flux in the visible and ultraviolet range. This biophoton emission is correlated with many, if not all, biological and physiological functions. There are indications of a hitherto-overlooked information channel within the living system. Biophotons may trigger... |
|
 Python Web Penetration Testing Cookbook
Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
About This Book
-
Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
-
Find the script you need to deal with any...
|  |  S-BPM ONE: Setting the Stage for Subject-Oriented Business Process Management
This book constitutes the refereed proceedings of the First Workshop on Subject-Oriented Business Process Management, S-BPM ONE 2009, held in Karlsruhe, Germany, in October 2009. The papers are organized in topical sections on visionary engagements; essential capabilities; and penetration perspectives.
This volume contains a... |  |  Penetration Tester's Open Source Toolkit, Third Edition
Penetration testing is often considered an art as much as it is a science, but even an
artist needs the right brushes to do the job well. Many commercial and open source
tools exist for performing penetration testing, but it’s often hard to ensure that you
know what tools are available and which ones to use for a certain task.... |
|
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 |