Narrow your search

Library

VIVES (49)

Odisee (48)

Thomas More Kempen (48)

Thomas More Mechelen (48)

UCLL (48)

KU Leuven (42)

LUCA School of Arts (40)

Vlerick Business School (33)

UGent (31)

VUB (30)

More...

Resource type

book (49)

digital (5)


Language

English (49)


Year
From To Submit

2022 (1)

2021 (1)

2020 (1)

2019 (2)

2018 (2)

More...
Listing 1 - 10 of 49 << page
of 5
>>
Sort by

Book
Becoming the hacker : the playbook for getting inside the mind of the attacker
Author:
Year: 2019 Publisher: Birmingham ; Mumbai : Packt,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key Features Builds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Examines which tool to deploy to suit different applications and situations Book Description Becoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a clear guide to web application security from an attacker's point of view, from which both sides can benefit. What you will learn Study the mindset of an attacker Adopt defensive strategies Classify and plan for standard web application security threats Prepare to combat standard system security problems Defend WordPress and mobile applications Use security tools and plan for defense against remote execution Who this book is for The reader should have basic security experience, for example, through running a network or encountering security issues during application development. Formal education in security is useful, but not required. This title is suitable for people with at least two years of experience in development, network management, or DevOps, or with an established interest in security.

Keywords

Hackers.


Book
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing
Author:
ISBN: 1484272587 1484272579 Year: 2021 Publisher: Berkeley, CA : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

InfoSec career hacking : sell your skillz, not your soul
Authors: --- --- --- ---
ISBN: 1597490431 9781597490436 0080489036 9780080489032 9781597490115 1597490113 1281020281 9781281020284 9786611020286 6611020284 Year: 2005 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insigh

Stealing the network
Author:
ISBN: 1932266682 9781932266689 9781931836876 1931836876 1281056138 9781281056139 9786611056131 6611056130 0080481116 9780080481111 Year: 2003 Publisher: Rockland, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

""Stealing the Network: How to Own the Box"" is NOT intended to be a ""install, configure, update, troubleshoot, and defend book."" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the ""street fighting"" tactics used to attack networks and systems.Not


Book
A Hacker's Guide to Project Management.
Author:
ISBN: 1136400257 1281002828 9786611002824 0080472885 9780080472881 9781136400254 9781136400209 1136400206 9781136400247 1136400249 9781138461123 1138461121 0750657464 9780750657464 Year: 2003 Publisher: New York : Florence : Routledge Taylor & Francis Group [distributor]

Loading...
Export citation

Choose an application

Bookmark

Abstract

Managing a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just start and end with designing and building the system. Once you've specified, designed and built (or bought) the system it still needs to be properly tested, documented and settled into the live environment. This can seem like a maze to the inexperienced project manager, or even to the experienced project manager unused to a particular environment.

Game console hacking : have fun while voiding your warranty
Authors: --- ---
ISBN: 1281019917 9786611019914 0080532314 1931836310 1597490016 9781597490016 9780080532318 9781931836319 9781281019912 661101991X Year: 2004 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The worldwide video game console market surpassed 10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed ""retro gaming"" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of ""Hardware Hacking: Have Fun While Voiding Your Warranty"", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do.


Book
Respawn : gamers, hackers, and technogenic life
Author:
ISBN: 9781478002789 1478002786 1478001348 1478090367 Year: 2018 Publisher: Durham Duke University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

In Respawn Colin Milburn examines the connections between video games, hacking, and science fiction that galvanize technological activism and technological communities. Discussing a wide range of games, from Portal and Final Fantasy VII to Super Mario Sunshine and Shadow of the Colossus, Milburn illustrates how they impact the lives of gamers and non-gamers alike. They also serve as resources for critique, resistance, and insurgency, offering a space for players and hacktivist groups such as Anonymous to challenge obstinate systems and experiment with alternative futures. Providing an essential walkthrough guide to our digital culture and its high-tech controversies, Milburn shows how games and playable media spawn new modes of engagement in a computerized world.

Professional penetration testing.
Authors: ---
ISBN: 9780124046184 0124046185 142375428X 9781423754282 9781597490375 1597490377 0080488978 9780080488974 1281035610 9781281035615 9786611035617 6611035613 1597499935 9781597499934 Year: 2013 Publisher: Amsterdam : Syngress, an imprint of Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. All disc-based content for this title is now available on the Web. Find out how to turn hacking and pen testing skills into a professional career Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester

Insider threat : protecting the enterprise from sabotage, spying, and theft
Authors: ---
ISBN: 1423754999 9781423754992 9780080489056 0080489052 1597490482 9781597490481 1281035661 9781281035660 9786611035662 6611035664 1597490938 9781597490931 Year: 2006 Publisher: Rockland, Mass. : [S.l.] : Syngress ; Distributed by O'Reilly Media,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats? as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most like

Hardware hacking : have fun while voiding your warranty
Authors: --- ---
ISBN: 9780080478258 0080478255 9781932266832 1932266836 1281056332 9781281056337 9786611056339 6611056335 Year: 2004 Publisher: Rockland, MA : Syngress Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

""If I had this book 10 years ago, the FBI would never have found me!"" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed ""gadget geek."" Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the 99 to replace it! Install a new iPod battery yourself without Apple'

Listing 1 - 10 of 49 << page
of 5
>>
Sort by