Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the...
Learning Metasploit Exploitation and Development
Learning Metasploit Exploitation and Development

Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security...

MAKE: Electronics: Learning Through Discovery
MAKE: Electronics: Learning Through Discovery
Want to learn the fundamentals of electronics in a fun, hands-on way? With Make: Electronics, you'll start working on real projects as soon as you crack open the book. Explore all of the key components and essential principles through a series of fascinating experiments. You'll build the circuits first, then learn the...
Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
Everyday Scripting with Ruby: For Teams, Testers, and You
Everyday Scripting with Ruby: For Teams, Testers, and You
Are you a tester who spends more time manually creating complex test data than using it? A business analyst who seemingly went to college all those years so you can spend your days copying data from reports into spreadsheets? A programmer who can't finish each day's task without having to scan through version control system output, looking for the...
The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

The Software Vulnerability Guide (Programming Series)
The Software Vulnerability Guide (Programming Series)
In today’s market, secure software is a must for consumers. Many developers, however, are not familiar with the techniques needed to produce secure code or detect existing vulnerabilities. The Software Vulnerability Guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT...
Practical Lock Picking: A Physical Penetration Tester's Training Guide
Practical Lock Picking: A Physical Penetration Tester's Training Guide
I feel somewhat like an old man remarking in this fashion, but this book is a great example of the wonderful time in which you currently find yourself. To be alive and learning right now—when there are accessible resources such as this about lockpicking, with beautiful illustrations and lessons written with passion visible on...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy