Trojan Horse: A Jeff Aiken Novel (Jeff Aiken Series Book 2)

Rating: 
Amazon Price: N/A (as of June 24, 2017 05:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

It's two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida's assault on the computer infrastructure of the Western world. His company is flourishing, and his relationship with former government agent Daryl Haugen has intensified since she became a part of his team.

But the West is under its greatest threat yet. A revolutionary, invisible trojan that alters data without leaving a trace—more sophisticated than any virus seen before—has been identified, roiling international politics. Jeff and Daryl are summoned to root it out and discover its source. As the trojan penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance.
Continue reading “Trojan Horse: A Jeff Aiken Novel (Jeff Aiken Series Book 2)”

Git Pocket Guide

Rating: 
Amazon Price: N/A (as of June 24, 2017 12:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This pocket guide is the perfect on-the-job companion to Git, the distributed version control system. It provides a compact, readable introduction to Git for new users, as well as a reference to common commands and procedures for those of you with Git experience.

Written for Git version 1.8.2, this handy task-oriented guide is organized around the basic version control functions you need, such as making commits, fixing mistakes, merging, and searching history.Examine the state of your project at earlier points in timeLearn the basics of creating and making changes to a repositoryCreate branches so many people can work on a project simultaneouslyMerge branches and reconcile the changes among themClone an existing repository and share changes with push/pull commandsExamine and change your repository’s commit historyAccess remote repositories, using different network protocolsGet recipes for accomplishing a variety of common tasks

E-mail Hacking for IT Security Professionals (HackerStorm Penetration Testing Guides Book 2)

Rating: 
Amazon Price: N/A (as of June 24, 2017 02:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

E-Mail Hacking for IT Security Professionals enables both penetration testers and security professionals to plan and execute better testing of e-mail solutions.

Unlike most 'hacking' books, this guide covers all aspects of testing e-mail covering the scope of testing, expectations, policy and process reviews, design, strategy, implementation, operational support, third party managed services and more.
Continue reading “E-mail Hacking for IT Security Professionals (HackerStorm Penetration Testing Guides Book 2)”

Metasploit Penetration Testing Cookbook, Second Edition

Rating: 
Amazon Price: N/A (as of June 24, 2017 10:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In Detail

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.
Continue reading “Metasploit Penetration Testing Cookbook, Second Edition”

Hacking: The Essential Guide To Hacking For Beginners (Hacking How to Hack Hacking for Dummies Computer Hacking) (hacking, how to hack, penetration testing, basic security, arduino, python Book 1)

Rating: 
Amazon Price: N/A (as of March 29, 2016 22:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

THE ESSENTIAL GUIDE TO HACKING FOR BEGINNERS! – INCLUDES FREE GIFT WORTH $13.90