Amazon Price: N/A (as of February 20, 2018 02:18 –
A cluster is a type of parallel/distributed processing system which consists of a collection of interconnected stand-alone computers cooperatively working together. Using Raspberry Pi computers, you can build a two-node parallel computing cluster which enhances performance and availability.
Continue reading “Raspberry Pi Super Cluster”
Amazon Price: N/A (as of February 20, 2018 05:19 –
A Huffington Post Definitive Tech Book of 2013
Artificial Intelligence helps choose what books you buy, what movies you see, and even who you date. It puts the "smart" in your smartphone and soon it will drive your car. It makes most of the trades on Wall Street, and controls vital energy, water, and transportation infrastructure. But Artificial Intelligence can also threaten our existence.
Continue reading “Our Final Invention: Artificial Intelligence and the End of the Human Era”
Amazon Price: $45.49 $45.49 (as of February 20, 2018 03:33 –
Build intricate virtual architecture to practice any penetration testing technique virtually
Overview Build and enhance your existing pentesting methods and skills Get a solid methodology and approach to testing Step-by-step tutorial helping you build complex virtual architecture
A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or network from the outside world and internal threats. With the increase of advanced hackers and threats to our virtual world, pentesting is an absolute necessity.
Building Virtual Pentesting Labs for Advanced Penetration Testing will teach you how to build your own labs and give you a proven process to test these labs; a process that is currently used in industry by global pentesting teams. You will also learn a systematic approach to professional security testing, building routers, firewalls, and web servers to hone your pentesting skills.
What you will learn from this book Build routers, firewalls, and web servers to hone your pentesting skills Deploy and then find the weaknesses in a firewall architecture Construct a layered architecture and perform a systematic process and methodology to use for conducting an external test Get introduced to several of the different security testing methodologies Design monitored environments and evade them Create complex architecture Bypass antivirus and other protection Practice methods of evasion against today's top defenses Leverage the client configuration
Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include firewalls, IDS/IPS, web application firewalls, and endpoint protection, which is essential in the penetration testing world.
Who this book is written for
If you are a penetration tester, security consultant, security test engineer, or analyst who wants to practice and perfect penetration testing skills by building virtual pentesting labs in varying industry scenarios, this is the book for you. This book is ideal if you want to build and enhance your existing pentesting methods and skills. Basic knowledge of network security features is expected along with web application testing experience.
Amazon Price: N/A (as of February 19, 2018 17:00 –
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.
Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim’s machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.
Continue reading “Buffer Overflow Attacks: Detect, Exploit, Prevent”
Amazon Price: $24.49 $24.49 (as of February 19, 2018 08:56 –
Master the art of penetration testing with Kali Linux
About This Book Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution Explore the insights and importance of testing your corporate network systems before the hackers strike Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits
Continue reading “Kali Linux: Assuring Security By Penetration Testing”