Amazon Price: N/A (as of August 17, 2017 16:33 –
Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security—from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.
Continue reading “Mastering Kali Linux for Advanced Penetration Testing”
Amazon Price: N/A (as of August 18, 2017 00:05 –
This pocket guide is the perfect on-the-job companion to Git, the distributed version control system. It provides a compact, readable introduction to Git for new users, as well as a reference to common commands and procedures for those of you with Git experience.
Written for Git version 1.8.2, this handy task-oriented guide is organized around the basic version control functions you need, such as making commits, fixing mistakes, merging, and searching history.Examine the state of your project at earlier points in timeLearn the basics of creating and making changes to a repositoryCreate branches so many people can work on a project simultaneouslyMerge branches and reconcile the changes among themClone an existing repository and share changes with push/pull commandsExamine and change your repository’s commit historyAccess remote repositories, using different network protocolsGet recipes for accomplishing a variety of common tasks
Amazon Price: $19.95 $19.95 (as of August 18, 2017 12:10 –
Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job and improves security.
This book saves you from sifting a decade of obsolete online tutorials and quickly gets you running:SSH with the OpenSSH server and the PuTTY and OpenSSH clients. You will:
Continue reading “SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys”
Amazon Price: $9.99 $9.99 (as of August 17, 2017 17:54 –
Hacking is something that many people fall victim to at some point in their life. You may only experience an amateur hacker breaking into your information ‘just because they can’ and leaving again without taking anything. On the other hand, you may experience hacking where your information is stolen and someone uses it to take money or even your identity. Any type of hacking can leave you feeling vulnerable, even if they don’t take anything while they are there. That’s a feeling that you never want to have and the idea that someone could take anything you own just that easily is terrifying as well. This book is an introduction to protecting yourself from hacking. Find out more about what hackers do to get into your information and your system and what you can do to keep them out. Make sure that you understand different skills and techniques from how to create a proper password and choose a good virus software to how you should be storing your information for the most security. All of this and more are included in this book. Don’t miss out on it!
Amazon Price: $49.95 $32.68 You save: $17.27 (35%). (as of August 18, 2017 07:46 –
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.
The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.Contains practical and cost-effective recommendations for proactive and reactive protective measuresTeaches users how to establish a viable threat intelligence programFocuses on how social networks present a double-edged sword against security programs