I am not an expert. I have never claimed to be an expert at anything (at least not
seriously done so), least of all an expert in digital forensic analysis of Windows
systems. I am simply someone who has found an interest in my chosen field of
employment, and a passion to dig deeper. I enjoy delving into and extending the...
Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...
On behalf of the Program Committee, it is our pleasure to present to you the
proceedings of the 8th Conference on Detection of Intrusions and Malware &
Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international
experts from academia, industry and government to present and discuss
novel security research....
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security...
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. The Multimedia Security Handbook addresses issues related to protecting digital media. It begins by introducing security fundamentals and discussing the vulnerabilities of individual protection...
Uncertainties and risks have always been, and will remain, present; both in everybody’s life and in policy making. This presence is not always recognized because humans tend to perceive the world in a deterministic way, and in most cases succeed in somehow dealing with uncertainties. However, ignoring uncertainties often results in serious...
Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment
Overview
Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and...