Amazon Price: $41.95 $35.85 You save: $6.10 (15%). (as of April 29, 2017 01:58 –
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.
Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more! This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system.
*Never before seen and documented hacks, including wireless spectrum analysis
*Most comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platform
*Full coverage on embedded device development using the WRT54G and OpenWRT
Amazon Price: N/A (as of April 28, 2017 10:49 –
***For a limited time, you can get the prequel novella, Social Engineer, for free – click here to find out more > bit.ly/SocEngSignUp (just copy and paste into your browser)***
Jack the Ripper is now online . . .
SCADA – Supervisory Control and Data Acquisition – Systems don’t necessarily mesh well with standard IT security, although combined the two can create deepened levels of protection. This book demonstrates how to develop a SCADA cyber security program and how to work with internal and external IT resources in order to implement it. The technical level of this text ensures that it does not provide a detailed ‘cookbook’ that can be used to attack SCADA systems, but the text still provides sufficient technical detail to address areas of concern.
Click here to buy from Amazon
Amazon Price: N/A (as of April 28, 2017 19:49 –
DNS is one of the oldest protocols on the Internet, and was designed for a network without hostile users. Anyone who wants to break into a network starts by investigating the target's Domain Name Service. DNS Security Extensions, or DNSSEC, hardens DNS and brings it into the 21st century. But learning DNSSEC requires wading through years of obsolete tutorials, dead ends, and inscrutable standards.
Amazon Price: $60.00 $52.98 You save: $7.02 (12%). (as of April 28, 2017 04:29 –
This practical guide to penetration testing teaches would-be ethical hackers to scan for, identify, and analyze security vulnerabilities―readying readers for the Certified Ethical Hacker (CEH) exam
The Penetration Tester's Handbook: The First Steps to CEH Certification is designed to advance the knowledge, skills, and techniques of the ethical hacker. The book begins with a review of information security theory and goes on to fully cover the tools and techniques of penetration and vulnerability testing. Hands-on exercises are included throughout the handbook to reinforce the information presented and to develop your skills.
Upon finishing this handbook, you will be ready to practice independently to hone your penetration testing skills―and to work toward obtaining the Certified Ethical Hacker designation. The personal penetration testing lab, for which set-up instructions are included, will aid you beyond the book and serve as a resource for additional practice and study. Bridges the knowledge and experience gap that exists between the CompTIA Security+ certification and the more advanced CEH certification Features more than 30 realistic step-by-step practice exercises