 |
|
|
 Nmap 6: Network exploration and security auditing Cookbook
Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it's a comprehensive guide to penetration testing and network monitoring. Security in depth.
Overview
-
Master the power of Nmap 6
-
Learn how the...
|  |  Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will... |  |  Kali Linux Wireless Penetration Testing Essentials
Plan and execute penetration tests on wireless networks with the Kali Linux distribution
About This Book
-
Learn the fundamentals of wireless LAN security and penetration testing
-
Discover and attack wireless networks using specialized Kali Linux tools
-
A step-by-step,...
|
|
 SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award
"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog
SQL injection represents... |  |  |  |  Penetration Testing with BackBox
This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox.
Overview
-
Experience the real world of penetration testing with Backbox Linux using...
|
|
 Security for Multihop Wireless Networks
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area... |  |  Learning Metasploit Exploitation and Development
Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security... |  |  Data-Driven Security: Analysis, Visualization and Dashboards
Uncover hidden patterns of data and respond with countermeasures
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to... |
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |