Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the...
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox.
Overview
Experience the real world of penetration testing with Backbox Linux using...
Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today's WLANs, introduces high-security wireless protocols new to the marketplace, and offers step-by-step instructions...
2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well...
Mention the word audit to IT professionals and you will probably see their eyes glaze over as
they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run
ning around and pointing out all of the things they have done wrong to their manager. The
purpose of a security audit is not to place blame or pick...
“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to...
Uncover, plug, and ethically disclose security flaws
Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...
A unified treatment of the vulnerabilities that exist in real-world network systems—with tools to identify synergies for mergers and acquisitions
Fragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain World presents a comprehensive study of network systems and the roles these systems play...