Home | Amazing | Today | Tags | Publishers | Years | Search 
The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and...

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

CEH Certified Ethical Hacker All-in-One Exam Guide
CEH Certified Ethical Hacker All-in-One Exam Guide

Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice...

Certified Ethical Hacker (CEH) Foundation Guide
Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Hacking: How to Hack Computers, Basic Security and Penetration Testing
Hacking: How to Hack Computers, Basic Security and Penetration Testing

Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught?

Download Hacking to discover everything you need to know about hacking.

Step by step to increase your hacking skill set. Learn how to penetrate computer...

Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

Get hands-on experience of using Burp Suite to execute attacks and perform web assessments

Key Features

  • Use tools in Burp Suite to meet your web infrastructure security demands
  • Configure Burp to fine-tune the suite of tools specific to the target
  • Use Burp...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
The Politics of Operations: Excavating Contemporary Capitalism
The Politics of Operations: Excavating Contemporary Capitalism
In The Politics of Operations Sandro Mezzadra and Brett Neilson investigate how capital reshapes its relation with politics through operations that enable the extraction and exploitation of mineral resources, labor, data, and cultures. They show how capital—which they theorize as a direct political actor—operates...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy