Catalog Search Results
Author
Language
English
Description
"A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. It has vulnerabilities; we call them "loopholes." We call exploits "tax avoidance strategies." And there is an entire industry of "black hat" hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys. In A Hacker's Mind, Bruce Schneier takes hacking out of the...
Author
Publisher
No Starch Press, Inc
Language
English
Formats
Description
"Explores common attacks and vulnerabilities that web developers need to look out for. The first half of the book describes security concepts every developer should know ; the second half delves into individual vulnerabilities, such as SQL injection and cross-site scripting, offering real-world examples and code samples"--
Author
Language
English
Formats
Description
Up-to-date strategies for thwarting the latest, most insidious network attacks. This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating...
Author
Pub. Date
2018.
Language
English
Description
"Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones. P. W. Singer...
Author
Series
Publisher
Wiley
Pub. Date
2020
Language
English
Description
Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing...
Author
Language
English
Description
"In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants...
Author
Publisher
mitp Verlag
Pub. Date
2022.
Language
Deutsch
Description
Von der Installation über die Konfiguration bis hin zum Einsatz der wichtigsten Tools Detaillierter Ablauf von Security Assessments und Durchführung von Penetrationstests mit praktischer Checkliste Schwachstellenanalyse mit OpenVAS, Angriffe mit WebScarab und Metasploit, IT-Forensik mit Autopsy, Reporting mit Faraday und viele weitere Tools Die Distribution Kali Linux ist auf Sicherheits- und Penetrationstests spezialisiert. Sie enthält mehrere...
Author
Publisher
MITP Verlags GmbH & Co. KG
Pub. Date
[2020]
Language
Deutsch
Description
Von der Installation über die Konfiguration bis hin zum Einsatz der wichtigsten Tools Detaillierter Ablauf von Security Assessments und Durchführung von Penetrationstests mit praktischer Checkliste Schwachstellenanalyse mit OpenVAS, Angriffe mit WebScarab und Metasploit, IT-Forensik mit Autopsy, Reporting mit Faraday und viele weitere Tools Die Distribution Kali Linux ist auf Sicherheits- und Penetrationstests spezialisiert. Sie enthält mehrere...
10) Beginning ethical hacking with Kali Linux: computational techniques for resolving security issues
Author
Publisher
Apress
Pub. Date
2018.
Language
English
Description
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you'll move on to an introduction to VirtualBox, networking, and common Linux commands, followed by the step-by-step procedure to build your own web server...
Author
Publisher
No Starch Press
Language
English
Formats
Description
Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You'll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation's vulnerabilities are based on real life weaknesses in today's advanced Windows defense systems. You'll experience all the thrills, frustrations, dead-ends, and eureka moments...
12) Hands on hacking
Author
Publisher
Wiley
Pub. Date
2020.
Language
English
Description
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers...
Author
Publisher
Sybex
Pub. Date
2017.
Language
English
Description
IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --
Author
Publisher
Routledge
Pub. Date
2018.
Language
English
Description
Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company's innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals.Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world's most innovative companies proudly...
Author
Publisher
Apress
Pub. Date
[2019]
Language
English
Description
Take a practitioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information...
Author
Publisher
Penguin Business
Pub. Date
2022.
Language
English
Description
"Meet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than"--Publisher's description.
17) Mind games
Author
Publisher
Swoon Reads
Pub. Date
2019.
Language
English
Description
"Arden sells memories. Whether it's becoming homecoming queen or studying for that all important test, Arden can hack into a classmate's memories and upload the experience for you just as if you'd lived it yourself. Business is great, right up until the day Arden whites out, losing fifteen minutes of her life and all her memories of the boy across the school yard. The boy her friends assure her she's had a crush on for years. Arden realizes that...
Author
Publisher
Syngress
Pub. Date
[2017]
Language
English
Description
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such...
Author
Publisher
Wiley
Pub. Date
[2020]
Language
English
Description
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request