Catalog Search Results
Author
Language
English
Description
Neighbors begin to turn on each other after a series of break-ins is followed by a murder --
It's a quiet suburb in upstate New York, until anonymous letters start to arrive. "My son broke into your home recently while you were out." Into their homes, and into their computers as well. Learning their secrets, and maybe sharing some of them, too. When a woman down the street is found murdered, the tension reaches the breaking point. Who killed her?...
2) Hush-hush
Author
Series
Stone Barrington novels volume 56
Language
English
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Pub. Date
[2023]
Language
English
Description
Follow FC as he steals from the world's most secure banks and government facilities--without breaking a single law In How I Rob Banks: And Other Such Places, renowned ethical hacker and social engineer FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. In the book, you'll explore the secretive world of physical...
Author
Pub. Date
2023.
Language
English
Description
In How I Rob Banks: And Other Such Places, renowned ethical hacker FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. In the book, you'll explore the secretive world of physical assessments and follow FC as he breaks into banks and secure government locations to identify security flaws and loopholes. The author...
Author
Series
Pub. Date
2020.
Language
English
Description
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels...
Author
Pub. Date
[2022]
Language
English
Description
Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You'll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation's vulnerabilities are based on real life weaknesses in today's advanced Windows defense systems. You'll experience all the thrills, frustrations, dead-ends, and eureka moments...
10) Beginning ethical hacking with Kali Linux: computational techniques for resolving security issues
Author
Pub. Date
2018.
Language
English
Description
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you'll move on to an introduction to VirtualBox, networking, and common Linux commands, followed by the step-by-step procedure to build your own web server...
12) Attack surface
Author
Pub. Date
2020.
Language
English
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
Author
Pub. Date
2022.
Language
Deutsch
Description
Von der Installation über die Konfiguration bis hin zum Einsatz der wichtigsten Tools Detaillierter Ablauf von Security Assessments und Durchführung von Penetrationstests mit praktischer Checkliste Schwachstellenanalyse mit OpenVAS, Angriffe mit WebScarab und Metasploit, IT-Forensik mit Autopsy, Reporting mit Faraday und viele weitere Tools Die Distribution Kali Linux ist auf Sicherheits- und Penetrationstests spezialisiert. Sie enthält mehrere...
Author
Pub. Date
[2020]
Language
Deutsch
Description
Von der Installation über die Konfiguration bis hin zum Einsatz der wichtigsten Tools Detaillierter Ablauf von Security Assessments und Durchführung von Penetrationstests mit praktischer Checkliste Schwachstellenanalyse mit OpenVAS, Angriffe mit WebScarab und Metasploit, IT-Forensik mit Autopsy, Reporting mit Faraday und viele weitere Tools Die Distribution Kali Linux ist auf Sicherheits- und Penetrationstests spezialisiert. Sie enthält mehrere...
Author
Pub. Date
[2020]
Language
English
Description
"Explores common attacks and vulnerabilities that web developers need to look out for. The first half of the book describes security concepts every developer should know ; the second half delves into individual vulnerabilities, such as SQL injection and cross-site scripting, offering real-world examples and code samples"--
Author
Pub. Date
[2020]
Language
Deutsch
Description
Sicherheitsanalyse und Penetration Testing für IoT-Geräte und Embedded Devices Schwachstellen von IoT-Geräten erkennen und Pentests durchführen Hardware, Software und Protokolle analysieren und Sicherheitslücken aufspüren Mit praktischen Beispielen und Schritt-für-Schritt-Anleitungen »Smarte« Geräte und das Internet-of-Things sind allgegenwärtig - umso mehr sind Reverse Engineers und Penetration Tester gefragt, um die Schwachstellen...
Pub. Date
[2022]
Language
English
Description
Learn to perform professional penetration testing using real-world corporate methodologies and prepare industry-grade reports. About This Video Learn how to use Metasploit framework to ease the process of exploitation Go specifically deep into hacking web technologies, applications, and servers Learn how to beat the security of custom websites having specific vulnerabilities In Detail In this course, you will learn the very basics of installing VMware...
Pub. Date
[2022]
Language
English
Description
Modern web applications are complex and it's all about full-stack nowadays. That's why you need to dive into full-stack exploitation if you want to master web attacks. There is no room for classical web application hacking to exploit modern full-stack web apps and therefore, modern-day exploit methods will be showcased here. In this course, it will be shown to you how hackers can bypass Content Security Policy (CSP) which is the most powerful defensive...
Author
Pub. Date
2018.
Language
English
Description
Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company's innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals.Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world's most innovative companies proudly...
Author
Pub. Date
[2021]
Language
English
Description
The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request