Listing 1 - 5 of 5 |
Sort by
|
Choose an application
"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insigh
Computer. Automation --- Computer hackers. --- Computer security.
Choose an application
""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not
Computer. Automation --- Computer hackers --- Short stories.
Choose an application
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. All disc-based content for this title is now available on the Web. Find out how to turn hacking and pen testing skills into a professional career Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester
Computer networks --- Penetration testing (Computer security) --- Computer hackers. --- Security measures. --- Testing. --- Information technology --- Project management. --- Management.
Choose an application
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats? as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most like
Computer. Automation --- Commercial crimes. --- Computer hackers. --- Computer networks --- Computer security. --- Security measures.
Choose an application
""If I had this book 10 years ago, the FBI would never have found me!"" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed ""gadget geek."" Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the 99 to replace it! Install a new iPod battery yourself without Apple'
Microcomputers --- Computer input-output equipment. --- Computer hackers. --- Reverse engineering. --- Maintenance and repair. --- Upgrading.
Listing 1 - 5 of 5 |
Sort by
|