Raspberry Pi for Secret Agents – Second Edition

Rating: 
Amazon Price: N/A (as of September 21, 2019 12:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects

About This BookTurn your Raspberry Pi into a multipurpose secret agent gadget for audio/video surveillance, Wi-Fi exploration, or playing pranks on your friendsDetect an intruder on camera and set off an alarm and also find out what the other computers on your network are up toFull of fun, practical examples and easy-to-follow recipes, guaranteeing maximum mischief for all skill levels
Continue reading “Raspberry Pi for Secret Agents – Second Edition”

Windows Malware Analysis Essentials

Rating: 
Amazon Price: N/A (as of September 20, 2019 18:48 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set

About This BookSet the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malwareUnderstand how to decipher x86 assembly code from source code inside your favourite development environmentA step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process
Continue reading “Windows Malware Analysis Essentials”

Building a BeagleBone Black Super Cluster

Rating: 
Amazon Price: N/A (as of September 20, 2019 12:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Build and configure your own parallel computing Beowulf cluster using BeagleBone Black ARM systems

About This BookConfigure your own cluster for high speed parallel computingBenefit from your personally configured super computer which is a power efficient, low-cost, and highly scalable super computerWrite your own cluster software with the help of practical examples using powerful computational libraries specifically designed for distributed memory machines
Continue reading “Building a BeagleBone Black Super Cluster”

Mastering Metasploit – Second Edition

Rating: 
Amazon Price: N/A (as of September 21, 2019 03:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Key FeaturesGain the skills to carry out penetration testing in complex and highly-secured environmentsBecome a master using the Metasploit framework, develop exploits, and generate modules for a variety of real-world scenariosGet this completely updated edition with new useful methods and techniques to make your network robust and resilient

Book Description
Continue reading “Mastering Metasploit – Second Edition”

Kali Linux Wireless Penetration Testing: Beginner’s Guide

Rating: 
Amazon Price: N/A (as of September 20, 2019 14:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Key FeaturesLearn wireless penetration testing with Kali Linux, the latest iteration of BacktrackDetect hidden wireless networks and discover their namesExplore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffingDevelop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks

Book Description
Continue reading “Kali Linux Wireless Penetration Testing: Beginner’s Guide”