Narrow your search
Listing 1 - 10 of 138 << page
of 14
>>
Sort by

Book
Tribe of hackers red team : tribal knowledge from the best in offensive cybersecurity
Authors: ---
ISBN: 1119643333 111964335X 1119643368 Year: 2019 Publisher: Indianapolis, Indiana : Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking.  This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security Whether you’re new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.

Keywords

Hackers.


Book
Becoming the hacker : the playbook for getting inside the mind of the attacker
Author:
Year: 2019 Publisher: Birmingham ; Mumbai : Packt,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key Features Builds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Examines which tool to deploy to suit different applications and situations Book Description Becoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a clear guide to web application security from an attacker's point of view, from which both sides can benefit. What you will learn Study the mindset of an attacker Adopt defensive strategies Classify and plan for standard web application security threats Prepare to combat standard system security problems Defend WordPress and mobile applications Use security tools and plan for defense against remote execution Who this book is for The reader should have basic security experience, for example, through running a network or encountering security issues during application development. Formal education in security is useful, but not required. This title is suitable for people with at least two years of experience in development, network management, or DevOps, or with an established interest in security.

Keywords

Hackers.


Book
Hacked
Author:
ISBN: 1645982459 1645982017 Year: 2021 Publisher: [Place of publication not identified] : Saddleback Educational Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Hackers

InfoSec career hacking
Authors: --- --- --- ---
ISBN: 1597490431 9781597490436 0080489036 9780080489032 9781597490115 1597490113 1281020281 9781281020284 9786611020286 6611020284 Year: 2005 Publisher: Rockland, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insigh


Book
A hacker's guide to project management
Author:
ISBN: 1136400257 1281002828 9786611002824 0080472885 9780080472881 9781136400254 9781136400209 1136400206 9781136400247 1136400249 9781138461123 1138461121 0750657464 9780750657464 Year: 2003 Publisher: Oxford Butterworth-Heinemann

Loading...
Export citation

Choose an application

Bookmark

Abstract

Managing a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just start and end with designing and building the system. Once you've specified, designed and built (or bought) the system it still needs to be properly tested, documented and settled into the live environment. This can seem like a maze to the inexperienced project manager, or even to the experienced project manager unused to a particular environment.


Book
Chinese state-sponsored actors exploit publicly known vulnerabilities.
Author:
Year: 2020 Publisher: [Fort Meade, Md.] : National Security Agency,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Social engineering : the science of human hacking
Authors: ---
ISBN: 1119433754 111943372X 1119433738 Year: 2018 Publisher: Indianapolis, IN : Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don’t work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer’s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.


Book
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing
Author:
ISBN: 1484272587 1484272579 Year: 2021 Publisher: Berkeley, CA : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The art of information warfare : insight into the knowledge warrior philosophy
Authors: ---
ISBN: 9781581128574 1581128576 Year: 1999 Publisher: Parkland: Universal publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
Cybernotes
Authors: ---
Year: 1999 Publisher: Washington, D.C. : National Infrastructure Protection Center

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 138 << page
of 14
>>
Sort by