Kali Linux: Wireless Penetration Testing Beginner's Guide
Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
Detect hidden wireless networks and discover their names
Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
Develop your encryption
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the
dynamics of the computer software industry for the next long while, just as it has for the
last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers
to software in which the source code is freely available to...
Hardening Windows, Second Edition
Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...
CCIE Security Exam Certification Guide (CCIE Self-Study)
Official self-study test preparation guide for the CCIE Security written exam
Review all CCIE Security written exam topics, including:
- Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
- DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
Implementing 802.1X Security Solutions for Wired and Wireless Networks When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
|Result Page: 3 2 1 |