Narrow your search
Listing 1 - 10 of 51 << page
of 6
>>
Sort by

Book
Becoming the hacker : the playbook for getting inside the mind of the attacker
Author:
Year: 2019 Publisher: Birmingham ; Mumbai : Packt,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key Features Builds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Examines which tool to deploy to suit different applications and situations Book Description Becoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a clear guide to web application security from an attacker's point of view, from which both sides can benefit. What you will learn Study the mindset of an attacker Adopt defensive strategies Classify and plan for standard web application security threats Prepare to combat standard system security problems Defend WordPress and mobile applications Use security tools and plan for defense against remote execution Who this book is for The reader should have basic security experience, for example, through running a network or encountering security issues during application development. Formal education in security is useful, but not required. This title is suitable for people with at least two years of experience in development, network management, or DevOps, or with an established interest in security.

Keywords

Hackers.

InfoSec career hacking
Authors: --- --- --- ---
ISBN: 1597490431 9781597490436 0080489036 9780080489032 9781597490115 1597490113 1281020281 9781281020284 9786611020286 6611020284 Year: 2005 Publisher: Rockland, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insigh

Stealing the network
Author:
ISBN: 1932266682 9781932266689 9781931836876 1931836876 1281056138 9781281056139 9786611056131 6611056130 0080481116 9780080481111 Year: 2003 Publisher: Rockland, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not


Book
A hacker's guide to project management
Author:
ISBN: 1136400257 1281002828 9786611002824 0080472885 9780080472881 9781136400254 9781136400209 1136400206 9781136400247 1136400249 9781138461123 1138461121 0750657464 9780750657464 Year: 2003 Publisher: Oxford Butterworth-Heinemann

Loading...
Export citation

Choose an application

Bookmark

Abstract

Managing a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just start and end with designing and building the system. Once you've specified, designed and built (or bought) the system it still needs to be properly tested, documented and settled into the live environment. This can seem like a maze to the inexperienced project manager, or even to the experienced project manager unused to a particular environment.


Book
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing
Author:
ISBN: 1484272587 1484272579 Year: 2021 Publisher: Berkeley, CA : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hardware hacking
Authors: --- ---
ISBN: 9780080478258 0080478255 9781932266832 1932266836 1281056332 9781281056337 9786611056339 6611056335 Year: 2004 Publisher: Rockland, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

""If I had this book 10 years ago, the FBI would never have found me!"" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed ""gadget geek."" Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the 99 to replace it! Install a new iPod battery yourself without Apple'

Zero day exploit
Authors: ---
ISBN: 1932266763 9781932266764 1931836094 9781931836098 9780080543925 0080543928 1281078506 9786611078508 Year: 2004 Publisher: Rockland, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious ""Zero-Day"" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the ""inside"" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them.* The realistic portrayals of researching, developing, and ultimat

Game console hacking
Authors: --- ---
ISBN: 1281019917 9786611019914 0080532314 1931836310 1597490016 9781597490016 9780080532318 9781931836319 9781281019912 661101991X Year: 2004 Publisher: Rockland, Mass. Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

The worldwide video game console market surpassed 10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed ""retro gaming"" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of ""Hardware Hacking: Have Fun While Voiding Your Warranty"", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do.

Stealing the network
Authors: --- ---
ISBN: 1423754190 9781423754190 0080517749 9780080517742 1597490067 9781597490061 1281019909 1299149308 9786611019907 9781299149304 9781281019905 Year: 2005 Publisher: Rockland, MA [Sebastopol, CA] Syngress Distributed by O'Reilly Media

Loading...
Export citation

Choose an application

Bookmark

Abstract

The first two books in this series "Stealing the Network: How to Own the Box? and "Stealing the Network: How to Own a Continent? have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... ""Stealing the Network: How to Own an Identity"" is the 3rd book in the ""Ste

Insider threat
Authors: ---
ISBN: 1423754999 9781423754992 9780080489056 0080489052 1597490482 9781597490481 1281035661 9781281035660 9786611035662 6611035664 1597490938 9781597490931 Year: 2006 Publisher: Rockland, Mass. Oxford Syngress Elsevier Science [distributor]

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats? as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most like

Listing 1 - 10 of 51 << page
of 6
>>
Sort by