Narrow your search

Library

UAntwerpen (10)

LUCA School of Arts (7)

Odisee (7)

Thomas More Kempen (7)

Thomas More Mechelen (7)

UCLL (7)

VIVES (7)

VUB (7)

KU Leuven (6)

Vlerick Business School (6)

More...

Resource type

book (10)

digital (5)


Language

English (10)


Year
From To Submit

2022 (1)

2013 (3)

2006 (1)

2005 (1)

2004 (1)

More...
Listing 1 - 10 of 10
Sort by
InfoSec career hacking : sell your skillz, not your soul
Authors: --- --- --- ---
ISBN: 1597490431 9781597490436 0080489036 9780080489032 9781597490115 1597490113 1281020281 9781281020284 9786611020286 6611020284 Year: 2005 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insigh

Stealing the network
Author:
ISBN: 1932266682 9781932266689 9781931836876 1931836876 1281056138 9781281056139 9786611056131 6611056130 0080481116 9780080481111 Year: 2003 Publisher: Rockland, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not

Professional penetration testing.
Authors: ---
ISBN: 9780124046184 0124046185 142375428X 9781423754282 9781597490375 1597490377 0080488978 9780080488974 1281035610 9781281035615 9786611035617 6611035613 1597499935 9781597499934 Year: 2013 Publisher: Amsterdam : Syngress, an imprint of Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. All disc-based content for this title is now available on the Web. Find out how to turn hacking and pen testing skills into a professional career Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester

Insider threat : protecting the enterprise from sabotage, spying, and theft
Authors: ---
ISBN: 1423754999 9781423754992 9780080489056 0080489052 1597490482 9781597490481 1281035661 9781281035660 9786611035662 6611035664 1597490938 9781597490931 Year: 2006 Publisher: Rockland, Mass. : [S.l.] : Syngress ; Distributed by O'Reilly Media,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats? as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most like

Hardware hacking : have fun while voiding your warranty
Authors: --- ---
ISBN: 9780080478258 0080478255 9781932266832 1932266836 1281056332 9781281056337 9786611056339 6611056335 Year: 2004 Publisher: Rockland, MA : Syngress Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

""If I had this book 10 years ago, the FBI would never have found me!"" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed ""gadget geek."" Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the 99 to replace it! Install a new iPod battery yourself without Apple'


Book
Biohackers : the politics of open science
Author:
ISBN: 9780745332802 9780745332819 9781849649063 9781849649087 9781849649070 1849649065 1849649073 1849649081 Year: 2013 Publisher: London : Pluto Press,

A Hacker Manifesto
Author:
ISBN: 0674015436 0674044843 9780674044845 067425743X 9780674257436 Year: 2022 Publisher: Cambridge, MA


Book
RTFM : Red Team field manual
Author:
ISBN: 9781494295509 1494295504 Year: 2013 Publisher: [Place of publication not identified] [publisher not identified]

Hacking exposed : network security secrets & solutions
Authors: --- ---
ISBN: 0072127481 Year: 2001 Publisher: Berkeley, Calif. : Osborne/McGraw-Hill,

Loading...
Export citation

Choose an application

Bookmark

Abstract

All-new Windows footprinting and scanning tools and techniques

NetBIOS, MSRPC, SMB, DNS, SNMP, and Active Directory enumeration protection

Updated exploits of Windows-specific services, including the MSRPC interface vulnerability that led to the Blaster worm, SQL, Slammer, and eavesdropping attacks on Kerberos

Details on the new ISS6 security architecture, URLScan, Microsoft Web services source code disclosures exploits, and HTR chunked encoding exploits

All-new terminal services information including new password guessing, privellege escalation, and eavesdropping countermeasures

New client-side exploits using popular multimedia file formats, and strong new countermeasures using Internet Explorer Enhanced Security Configuration

The latest countermeasures for Denial of Services (DOS) attacks including bogon filtering and sink holes

New security features such as Internet Connection Firewall, software restriction policies, and updates to IPSec


Listing 1 - 10 of 10
Sort by