With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert. Overview
Develops Real World Approaches to Penetration testing using Metasploit
This comprehensive administrator’s reference delivers the details you need to successfully deploy, manage, and support Microsoft Windows Small Business Server 2003. The authors, experts in Microsoft operating systems and server technologies, provide easy-to-follow procedures, practical workarounds, and key troubleshooting tactics for...
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Prepared by the Task Committee on Urban Aerodynamics of the Environmental Wind Engineering Committee of the Technical Council on Wind Engineering of ASCE. Urban Aerodynamics: Wind Engineering for Urban Planners and Designers introduces the basic tools and technology used by engineers to determine the effects of wind on city streets and...
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...
A must-have, hands-on guide for working in the cybersecurity profession
Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This...
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live...
Although open source network security tools come in all shapes and sizes, a company will eventually discover that these tools are lacking in some area—whether it’s additional functionality, a specific feature, or a narrower scope. Written by security expert Mike Schiffman, this comprehensive book will show you how to build your own...
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...