Amazon Price: N/A (as of June 24, 2017 05:06 –
It's two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida's assault on the computer infrastructure of the Western world. His company is flourishing, and his relationship with former government agent Daryl Haugen has intensified since she became a part of his team.
But the West is under its greatest threat yet. A revolutionary, invisible trojan that alters data without leaving a trace—more sophisticated than any virus seen before—has been identified, roiling international politics. Jeff and Daryl are summoned to root it out and discover its source. As the trojan penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance.
Continue reading “Trojan Horse: A Jeff Aiken Novel (Jeff Aiken Series Book 2)”
Amazon Price: N/A (as of June 24, 2017 12:06 –
This pocket guide is the perfect on-the-job companion to Git, the distributed version control system. It provides a compact, readable introduction to Git for new users, as well as a reference to common commands and procedures for those of you with Git experience.
Written for Git version 1.8.2, this handy task-oriented guide is organized around the basic version control functions you need, such as making commits, fixing mistakes, merging, and searching history.Examine the state of your project at earlier points in timeLearn the basics of creating and making changes to a repositoryCreate branches so many people can work on a project simultaneouslyMerge branches and reconcile the changes among themClone an existing repository and share changes with push/pull commandsExamine and change your repository’s commit historyAccess remote repositories, using different network protocolsGet recipes for accomplishing a variety of common tasks
Amazon Price: N/A (as of June 24, 2017 02:05 –
E-Mail Hacking for IT Security Professionals enables both penetration testers and security professionals to plan and execute better testing of e-mail solutions.
Unlike most 'hacking' books, this guide covers all aspects of testing e-mail covering the scope of testing, expectations, policy and process reviews, design, strategy, implementation, operational support, third party managed services and more.
Continue reading “E-mail Hacking for IT Security Professionals (HackerStorm Penetration Testing Guides Book 2)”
Amazon Price: N/A (as of June 24, 2017 10:53 –
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.
Continue reading “Metasploit Penetration Testing Cookbook, Second Edition”
Amazon Price: N/A (as of March 29, 2016 22:01 –
THE ESSENTIAL GUIDE TO HACKING FOR BEGINNERS! – INCLUDES FREE GIFT WORTH $13.90