Build Your Own Security Lab: A Field Guide for Network Testing

Rating: 
Amazon Price: $50.00 (as of September 20, 2019 21:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

If your job is to design or implement IT security solutions or if you’re studying for any security certification, this is the how-to guide you’ve been looking for. Here’s how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Hiding from the Internet: Eliminating Personal Online Information

Rating: 
Amazon Price: $49.99 (as of September 21, 2019 16:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

2015 Revision!

Take control of your privacy by removing your personal information from the internet with this second edition.
Continue reading “Hiding from the Internet: Eliminating Personal Online Information”

Learning Pentesting for Android Devices

Rating: 
Amazon Price: N/A (as of September 21, 2019 20:09 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A practical guide to learning penetration testing for Android devices and applications

About This Book
Explore the security vulnerabilities in Android applications and exploit them
Venture into the world of Android forensics and get control of devices using exploits
Hands-on approach covers security vulnerabilities in Android using methods such as Traffic Analysis, SQLite vulnerabilities, and Content Providers Leakage
Continue reading “Learning Pentesting for Android Devices”

Hackers Beware: The Ultimate Guide to Network Security

Rating: 
Amazon Price: $45.00 (as of September 21, 2019 01:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" – the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.

Mastering Kali Linux for Advanced Penetration Testing

Rating: 
Amazon Price: N/A (as of September 21, 2019 13:30 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In Detail

Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security—from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.
Continue reading “Mastering Kali Linux for Advanced Penetration Testing”