The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

Rating: 
Amazon Price: N/A (as of April 26, 2018 05:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.

Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.

Gray Hat C#: Creating and Automating Security Tools

Rating: 
Amazon Price: $39.95 $27.16 You save: $12.79 (32%). (as of April 25, 2018 14:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.

Following a crash course in C# and some of its advanced features, you'll learn how to:Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injectionGenerate shellcode in Metasploit to create cross-platform and cross-architecture payloadsAutomate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injectionsWrite a .NET decompiler for Mac and LinuxParse and read offline registry hives to dump system informationAutomate the security tools Arachni and Metasploit using their MSGPACK RPCs
Continue reading “Gray Hat C#: Creating and Automating Security Tools”

ELECTRONIC COMMERCE & CYBERLAW – SOME FACETS

Amazon Price: N/A (as of April 26, 2018 00:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

ELECTRONIC COMMERCE & CYBERLAW – SOME LEGAL FACETS

We are all living in the age of the Internet. It is only thanks to the Internet that electronic commerce as a phenomenon has come to become an integral part of our day-to-day lives. We would like to shop online and also would like to shop through mobile phones, as also laptops and smart devices. However, the advent of electronic commerce has brought forward the various legal issues which have been appropriately addressed in different jurisdictions in different manners.
Continue reading “ELECTRONIC COMMERCE & CYBERLAW – SOME FACETS”

The Quick Guide to Cloud Computing and Cyber Security

Rating: 
Amazon Price: N/A (as of April 25, 2018 06:43 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This is a Quick Guide to Cloud Computing and Cyber Security – For Beginners.

Cloud computing has appeared in many small forms and now it is emerging as a huge solution to the problem of the fast changing and increasingly cyber world in which we live and work.
Continue reading “The Quick Guide to Cloud Computing and Cyber Security”

The Silent Intelligence – The Internet of Things

Rating: 
Amazon Price: N/A (as of April 26, 2018 04:52 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Silent Intelligence is a book about the Internet of Things phenomenon. In it we talk about the history, trends, technology ecosystem and the future of the Internet of Things, Connected Cities, Connected Homes, Connected Health and Connected Cars. We also discuss the most promising areas for entrepreneurs and venture investors. We share exciting stories and unique opinions of over 30 industry veterans, experts and visionaries from Google, Ericcson, AT&T, Qualcomm, Accenture, SAP, MIT, EcoLife Foundation and many others.

We called this book The Silent Intelligence because most of the activity and growth in the space has so far been happening outside of mainstream visibility. We hope that our book will help executives, entrepreneurs, investors and everybody else better understand the opportunities and challenges of the Internet of Things and will get them as excited about the upcoming possibilities as we are.