Amazon Price: $24.49 $24.49 (as of September 23, 2017 04:01 –
Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
About This BookLearn the fundamentals behind commonly used scanning techniquesDeploy powerful scanning tools that are integrated into the Kali Linux testing platformA step-by-step guide, full of recipes that will help you use integrated scanning tools in Kali Linux, and develop custom scripts for making new and unique tools of your own
Who This Book Is For
Continue reading “Kali Linux Network Scanning Cookbook”
Amazon Price: $69.95 $58.63 You save: $11.32 (16%). (as of September 23, 2017 03:44 –
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.
This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment.
Continue reading “FISMA Compliance Handbook: Second Edition”
Amazon Price: N/A (as of September 23, 2017 07:29 –
Master the tactics and tools of the advanced persistent threat hacker
In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks. Review empirical data from actual attacks conducted by unsophisticated and elite APT hackers alike Learn the APT Hacker Methodology–a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caught Perform in-depth reconnaissance to build a comprehensive understanding of the target Obtain non-technical data about the target, including open source, human, financial, and geographical intelligence Use social engineering to compromise a specific system, application, or workstation Identify and attack wireless networks and wireless client devices Spearphish with hardware-based Trojan devices Physically infiltrate target facilities to obtain access to assets and compromise digital lily pads
Amazon Price: $130.00 $130.00 (as of September 23, 2017 19:39 –
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect new developments in network security Introduces a chapter on Cloud security, a very popular and essential topic Uses everyday examples that most computer users experience to illustrate important principles and mechanisms Features a companion website with Powerpoint slides for lectures and solution manuals to selected exercise problems, available at http://www.cs.uml.edu/~wang/NetSec
Amazon Price: $49.99 $35.58 You save: $14.41 (29%). (as of September 23, 2017 21:16 –
Get in-depth guidance—and inside insights—for using the Windows Sysinternals tools available from Microsoft TechNet. Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.
Diagnose. Troubleshoot. Optimize.
Continue reading “Windows Sysinternals Administrator's Reference”