Kali Linux Wireless Penetration Testing: Beginner’s Guide

Rating: 
Amazon Price: N/A (as of October 22, 2017 23:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Key FeaturesLearn wireless penetration testing with Kali Linux, the latest iteration of BacktrackDetect hidden wireless networks and discover their namesExplore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffingDevelop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks

Book Description
Continue reading “Kali Linux Wireless Penetration Testing: Beginner's Guide”

Mastering Metasploit – Second Edition

Rating: 
Amazon Price: N/A (as of October 23, 2017 00:09 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Key FeaturesGain the skills to carry out penetration testing in complex and highly-secured environmentsBecome a master using the Metasploit framework, develop exploits, and generate modules for a variety of real-world scenariosGet this completely updated edition with new useful methods and techniques to make your network robust and resilient

Book Description
Continue reading “Mastering Metasploit – Second Edition”

Mastering Wireless Penetration Testing for Highly Secured Environments

Rating: 
Amazon Price: N/A (as of October 23, 2017 04:42 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This BookConduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systemsCrack WEP, WPA, and even WPA2 wireless networksA hands-on guide teaching how to expose wireless security threats through the eyes of an attacker
Continue reading “Mastering Wireless Penetration Testing for Highly Secured Environments”

Practical Internet of Things Security

Rating: 
Amazon Price: N/A (as of October 22, 2017 19:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world

About This BookLearn to design and implement cyber security strategies for your organizationLearn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystemLearn best practices to secure your data from device to the cloudGain insight into privacy-enhancing techniques and technologies
Continue reading “Practical Internet of Things Security”

Mastering Kali Linux for Advanced Penetration Testing

Rating: 
Amazon Price: N/A (as of October 23, 2017 04:42 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In Detail

Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security—from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.
Continue reading “Mastering Kali Linux for Advanced Penetration Testing”