Key FeaturesLearn wireless penetration testing with Kali Linux, the latest iteration of BacktrackDetect hidden wireless networks and discover their namesExplore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffingDevelop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks
As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.
Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.Understand the challenges of securing distributed systems, particularly HadoopUse best practices for preparing Hadoop cluster hardware as securely as possibleGet an overview of the Kerberos network authentication protocolDelve into authorization and accounting principles as they apply to HadoopLearn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at restIntegrate Hadoop data ingest into enterprise-wide security architectureEnsure that security architecture reaches all the way to end-user access
Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With this book, you’ll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that’s just the beginning. You’ll find more than 100 standalone hacks on performance, multimedia, networking, the cloud, security, email, hardware, and more. Not only will you learn how to use each hack, you’ll also discover why it works.Add folders and other objects to the Start screenRun other Windows versions inside Windows 8Juice up performance and track down bottlenecksUse the SkyDrive cloud service to sync your files everywhereSpeed up web browsing and use other PCs on your home networkSecure portable storage and set up a virtual private networkHack Windows 8 Mail and services such as OutlookCombine storage from different devices into one big virtual diskTake control of Window 8 setting with the Registry
Learn how to use AccessData’s Forensic Toolkit (FTK) while mastering the fundamentals of digital forensics
Digital Forensics with the AccessData Forensic Toolkit (FTK) provides a comprehensive review of essential digital forensics concepts and builds on this information to teach you how to conduct digital investigations with AccessData’s FTK—the industry-standard, court-accepted digital investigations platform.
Part I covers the technology all digital forensics investigators need to understand, specifically data, storage media, file systems, and registry files. Part II explains how best to use FTK 5 tools, including FTK imager, FTK registry viewer, and the Password Recovery Toolkit (PRTK), to conduct legally defensible investigations. Written by a digital forensics expert and AccessData instructor Perfect self-study guide for the AccessData Certified Examiner (ACE) exam "Kit Trick" notes highlight best practices for using FTK "Case File" sidebars feature insights from actual digital forensic investigators
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G’s hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.
Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more! This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system.
* Never before seen and documented hacks, including wireless spectrum analysis
* Most comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platform
* Full coverage on embedded device development using the WRT54G and OpenWRT