Book Description:
The Basics of Hacking and
Penetration Testing, 2nd Ed. serves as an introduction to the steps
required to complete a penetration test or perform an ethical hack from
beginning to end. No prior hacking experience is needed. You will learn
how to properly utilize and interpret the results of modern day hacking
tools, which are required to complete a penetration test.
Book Description:
Professional Penetration
Testing walks you through the entire process of setting up and running a
pen test lab. Penetration testing-the act of testing a computer network
to find security vulnerabilities before they are maliciously
exploited-is a crucial component of information security in any
organization. With this book, you will find out how to turn hacking
skills into a professional career.
Book Description:
Cutting-edge techniques for
finding and fixing critical security flaws Fortify your network and
avert digital catastrophe with proven strategies from a team of security
experts. Completely updated and featuring 12 new chapters, Gray Hat
Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the
enemy's current weapons, skills, and tactics and offers field-tested
remedies, case studies, and ready-to-deploy testing labs.
Book Description:
Examining computer security
from the hacker's perspective, Practical Hacking Techniques and
Countermeasures employs virtual computers to illustrate how an attack is
executed, including the script, compilation, and results. It provides
detailed screen shots in each lab for the reader to follow along in a
step-by-step process in order to duplicate and understand how the attack
works.
Book Description:
With the advent of rich
Internet applications, the explosion of social media, and the increased
use of powerful cloud computing infrastructures, a new generation of
attackers has added cunning new techniques to its arsenal. For anyone
involved in defending an application or a network of systems, Hacking:
The Next Generation is one of the few books to identify a variety of
emerging attack vectors.
No comments:
Post a Comment