Narrow your search

Library

LUCA School of Arts (35)

Odisee (35)

Thomas More Kempen (35)

Thomas More Mechelen (35)

UCLL (35)

VIVES (35)

KU Leuven (31)

Vlerick Business School (31)

VUB (28)

UGent (26)

More...

Resource type

book (35)

digital (5)


Language

English (35)


Year
From To Submit

2022 (1)

2018 (1)

2017 (1)

2015 (1)

2014 (2)

More...
Listing 1 - 10 of 35 << page
of 4
>>
Sort by
InfoSec career hacking : sell your skillz, not your soul
Authors: --- --- --- ---
ISBN: 1597490431 9781597490436 0080489036 9780080489032 9781597490115 1597490113 1281020281 9781281020284 9786611020286 6611020284 Year: 2005 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insigh

Stealing the network
Author:
ISBN: 1932266682 9781932266689 9781931836876 1931836876 1281056138 9781281056139 9786611056131 6611056130 0080481116 9780080481111 Year: 2003 Publisher: Rockland, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not


Book
A Hacker's Guide to Project Management.
Author:
ISBN: 1136400257 1281002828 9786611002824 0080472885 9780080472881 9781136400254 9781136400209 1136400206 9781136400247 1136400249 9781138461123 1138461121 0750657464 9780750657464 Year: 2003 Publisher: New York : Florence : Routledge Taylor & Francis Group [distributor]

Loading...
Export citation

Choose an application

Bookmark

Abstract

Managing a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just start and end with designing and building the system. Once you've specified, designed and built (or bought) the system it still needs to be properly tested, documented and settled into the live environment. This can seem like a maze to the inexperienced project manager, or even to the experienced project manager unused to a particular environment.

Game console hacking : have fun while voiding your warranty
Authors: --- ---
ISBN: 1281019917 9786611019914 0080532314 1931836310 1597490016 9781597490016 9780080532318 9781931836319 9781281019912 661101991X Year: 2004 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The worldwide video game console market surpassed 10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed ""retro gaming"" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of ""Hardware Hacking: Have Fun While Voiding Your Warranty"", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do.

How to cheat at IT project management
Author:
ISBN: 9780124046184 0124046185 142375428X 9781423754282 9781597490375 1597490377 0080488978 9780080488974 1281035610 9781281035615 9786611035617 6611035613 1597499935 9781597499934 Year: 2005 Publisher: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor],

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it provides a unique approach to IT project management, combining strategic business concepts (project ROI, strategic alignment, etc.) with the very practical, step-by-step instructions for developing and managing a successful IT project. It's short enough to be easily read and used but long enough to be comprehensive in the right places

Insider threat : protecting the enterprise from sabotage, spying, and theft
Authors: ---
ISBN: 1423754999 9781423754992 9780080489056 0080489052 1597490482 9781597490481 1281035661 9781281035660 9786611035662 6611035664 1597490938 9781597490931 Year: 2006 Publisher: Rockland, Mass. : [S.l.] : Syngress ; Distributed by O'Reilly Media,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats? as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most like

Hardware hacking : have fun while voiding your warranty
Authors: --- ---
ISBN: 9780080478258 0080478255 9781932266832 1932266836 1281056332 9781281056337 9786611056339 6611056335 Year: 2004 Publisher: Rockland, MA : Syngress Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

""If I had this book 10 years ago, the FBI would never have found me!"" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed ""gadget geek."" Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the 99 to replace it! Install a new iPod battery yourself without Apple'

Wireless hacking : projects for Wi-Fi enthusiasts
Author:
ISBN: 1281055956 9786611055950 0080481787 1597490024 193183637X 9781597490023 9780080481784 9781931836371 9781281055958 6611055959 Year: 2004 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes--which include client and network hub devices--up from about 4 million last year. This third book in the ""HACKING"" series from Syngress is written by the SoCalFreeNet Wireless Users Group and will cover 802.11a/b/g ("Wi-Fi?) projects teaching these millions of Wi-Fi users how to ""mod"" and ""hack"" Wi-Fi access points, network cards, and antenn


Book
Professional penetration testing : creating and operating a formal hacking lab
Authors: ---
ISBN: 1282309250 9786612309250 0080960944 1597494259 9780080960944 9781282309258 9781597494250 9781597494663 1597494666 Year: 2009 Publisher: Burlington, MA ; Oxford : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"PART I - Setting Up Chapter 1: Introduction Chapter 2: Ethics and Hacking Chapter 3: Hacking as a Career Chapter 4: Setting up Your Lab Chapter 5: Creating and Using PenTest Targets in Your Lab Chapter 6: Methodologies Chapter 7: PenTest Metrics Chapter 8: Management of a PenTest PART II - Running a PenTest Chapter 9: Information Gathering Chapter 10: Vulnerability Identification Chapter 11: Vulnerability Verification Chapter 12: Compromising a System and Privilege Escalation Chapter 13: Maintaining Access Chapter 14: Covering Your Tracks PART III - Wrapping Everything Up Chapter 15: Reporting Results Chapter 16: Archiving Data Chapter 17: Cleaning Up Your Lab Chapter 18: Planning for Your Next PenTest Appendix A - Acronyms Appendix B - Definitions"--Resource description page.


Book
Hacking with Kali
Authors: ---
ISBN: 0124078834 0124077498 9780124078833 1306195705 9781306195706 9780124077492 Year: 2014 Publisher: Amsterdam Boston Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration

Listing 1 - 10 of 35 << page
of 4
>>
Sort by