Professional Penetration Testing: Creating and Operating a Formal Hacking Lab

Professional Penetration Testing: Creating and Operating a Formal Hacking LabThomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios.

Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers, digital piracy groups, and countless other organized or individual malicious hackers. The material presented will be useful to beginners all the way through to advanced practitioners.

  • Find out how to turn hacking and pen testing skills into a professional career
  • Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers
  • Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business
  • Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester
  • Learn through video – the DVD includes instructional videos that replicate classroom instruction and live, real-world vulnerability simulations of complete servers with known and unknown vulnerabilities to practice hacking skills in a controlled lab environment

Price: $79.95

Click here to buy from Amazon

The Ethical Hack: A Framework for Business Value Penetration Testing

The EthACical Hack: A Framework for Business Value Penetration TestingThe Ethical Hack: A Framework for Business Value Penetration Testing lays out the underlying methodologies and concepts required for performing successful and valuable penetration testing. The author discusses the process of penetration testing from a consultative point of view to ensure that the true value of the test is realized. He supplies a technical perspective of the common tools and exploits used by attackers along with the rational for why they are used and the information they provide the attacker. Finally, the text brings it all together in the form of attack scenarios to show the complete cycle of the attack from the hacker's perspective to the client's.




Price: $79.95

Click here to buy from Amazon

The Oracle Hacker’s Handbook: Hacking and Defending Oracle

The Oracle Hacker's Handbook: Hacking and Defending OracleDavid Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle and then it shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.

 

 

 

Price: $44.99

Click here to buy from Amazon

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

Rating: 
Amazon Price: $19.95 $14.03 You save: $5.92 (30%). (as of November 22, 2017 11:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says “knows all of Anonymous’ deepest, darkest secrets.”

Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
Continue reading “Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous”

Cyberwar and Cyber-attack: How is our strongest network at risk of becoming our weakest link?

Cyberwar and Cyber-attack: How is our strongest network at risk of becoming our weakest link?Cyber war and cyber-attack is an engaging review of the basic knowledge all up to date readers should have about cyber war and cyber-attacks before diving into more complex texts, as well as extra information for those already familiar with the topic. This work takes a look at general issues involving cyber vulnerability and our growing dependency on computers systems and networks. It goes beyond simple concepts such as hackers, hacktivism and espionage without neglecting them. It exposes the relevance of cyberdefence to both companies and ordinary users, giving especial attention to e-commerce platforms. At a time that many countries are employing strategies and money to prevent or minimize attacks as well as defend themselves against cyber threats this work pinpoints the key factors around the intentions behind attacks without minimizing their scale and variety. The jargon-free language and the current examples included help to set the discussion in the present day, while stressing important historical connections and pointing to how our strong network is at risk of becoming our weakest link.

Price: $2.99

Click here to buy from Amazon