Listing 1 - 10 of 10 |
Sort by
|
Choose an application
"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insigh
Computer. Automation --- Computer hackers. --- Computer security.
Choose an application
""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not
Computer. Automation --- Computer hackers --- Short stories.
Choose an application
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. All disc-based content for this title is now available on the Web. Find out how to turn hacking and pen testing skills into a professional career Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester
Computer networks --- Penetration testing (Computer security) --- Computer hackers. --- Security measures. --- Testing. --- Information technology --- Project management. --- Management.
Choose an application
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats? as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most like
Computer. Automation --- Commercial crimes. --- Computer hackers. --- Computer networks --- Computer security. --- Security measures.
Choose an application
""If I had this book 10 years ago, the FBI would never have found me!"" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed ""gadget geek."" Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the 99 to replace it! Install a new iPod battery yourself without Apple'
Microcomputers --- Computer input-output equipment. --- Computer hackers. --- Reverse engineering. --- Maintenance and repair. --- Upgrading.
Choose an application
Computer. Automation --- Professional ethics. Deontology --- Computer programming --- Computer hackers. --- Open source software --- Pirates informatiques --- Logiciels libres --- Moral and ethical aspects. --- -Computer hackers --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Free software (Open source software) --- Open code software --- Opensource software --- Computer software --- Computer hackers --- Computer programmers --- Computer users --- Moral and ethical aspects --- Programming --- Hackers.
Choose an application
Explores fundamental changes occurring in the circulation and ownership of scientific information.
Industrial and intellectual property --- Hackers. --- Computer networks --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer hackers --- Computer programmers --- Computer users --- Security measures. --- Protection --- Security measures --- Computer hackers.
Choose an application
'A Hacker Manifesto' deftly defines the fraught territory between the ever more strident demands by drug and media companies for protection of their patents and copyrights and the pervasive popular culture of file sharing and pirating.
Industrial and intellectual property --- Philosophy and psychology of culture --- Computer architecture. Operating systems --- Digital divide. --- Computer hackers. --- Social conflict. --- Intellectual property. --- Information technology --- Computers and civilization. --- Media Studies. --- Digital divide --- Hackers --- Social conflict --- Intellectual property --- Computers and civilization --- Business & Economics --- Economic History --- Social aspects. --- Social aspects --- Civilization and computers --- IP (Intellectual property) --- Proprietary rights --- Rights, Proprietary --- Class conflict --- Class struggle --- Conflict, Social --- Social tensions --- Computer hackers --- Divide, Digital --- GDD (Global digital divide) --- Global digital divide --- Law and legislation --- Civilization --- Intangible property --- Interpersonal conflict --- Social psychology --- Sociology --- Computer programmers --- Computer users --- Information society
Choose an application
Programming --- Penetration testing (Computer security) --- Computer security. --- Hackers. --- Computer hackers --- Computer programmers --- Computer users --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Ethical hacking (Computer security) --- Computer security --- Security measures --- Cybersecurity --- Cyber security --- Protection of computer systems --- Protection --- Hackers
Choose an application
All-new Windows footprinting and scanning tools and techniques NetBIOS, MSRPC, SMB, DNS, SNMP, and Active Directory enumeration protection Updated exploits of Windows-specific services, including the MSRPC interface vulnerability that led to the Blaster worm, SQL, Slammer, and eavesdropping attacks on Kerberos Details on the new ISS6 security architecture, URLScan, Microsoft Web services source code disclosures exploits, and HTR chunked encoding exploits All-new terminal services information including new password guessing, privellege escalation, and eavesdropping countermeasures New client-side exploits using popular multimedia file formats, and strong new countermeasures using Internet Explorer Enhanced Security Configuration The latest countermeasures for Denial of Services (DOS) attacks including bogon filtering and sink holes New security features such as Internet Connection Firewall, software restriction policies, and updates to IPSec
netwerkbeheer --- SQL (structured query language) --- Criminology. Victimology --- Computer architecture. Operating systems --- computerbeveiliging --- Computer networks --- Computer security. --- Computer hackers --- Réseaux d'ordinateurs --- Sécurité informatique --- Pirates informatiques --- Security measures --- Sécurité --- Mesures --- Hackers. --- Réseaux d'ordinateurs --- Sécurité informatique --- Sécurité --- wachtwoorden (informatica) --- criminologie
Listing 1 - 10 of 10 |
Sort by
|