|
|
|
|
Linksys WRT54G Ultimate HackingThis book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the... | | Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." — HD Moore, Founder of the Metasploit Project
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for... | | Nokia Firewall, VPN, and IPSO Configuration GuideThe Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.
"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its... |
|
|
SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award
"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog
SQL injection represents... | | How to Cheat at Configuring Open Source Security ToolsThe Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and... | | The Light Fantastic: A Modern Introduction to Classical and Quantum Optics"Provides a nice mix of elementary physical optics with practical and exciting applications."--Stephen Barnett, University of Strathclyde This book presents a thorough and self-contained introduction to modern optics, covering in full the three components ray optics, wave optics, and quantum optics. The text covers all... |
|
Metasploit Penetration Testing Cookbook, Second Edition
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in... | | Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open... | | Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences ... |
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |