Social Engineering in IT Security: Tools, Tactics, and Techniques: Testing Tools, Tactics & Techniques

Rating: 
Amazon Price: N/A (as of April 25, 2018 20:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cutting-edge social engineering testing techniques
"Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."–Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering. Explore the evolution of social engineering, from the classic con artist to the modern social engineer Understand the legal and ethical aspects of performing a social engineering test Find out why social engineering works from a victim's point of view Plan a social engineering test–perform a threat assessment, scope the test, set goals, implement project planning, and define the rules of engagement Gather information through research and reconnaissance Create a credible social engineering scenario Execute both on-site and remote social engineering tests Write an effective social engineering report Learn about various tools, including software, hardware, and on-site tools Defend your organization against social engineering attacks

CompTIA IT Fundamentals All-in-One Exam Guide (Exam FC0-U51)

Rating: 
Amazon Price: $50.00 $30.50 You save: $19.50 (39%). (as of April 26, 2018 05:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This effective study guide delivers 100% coverage of all topics on the CompTIA IT Fundamentals exam

Take the CompTIA IT Fundamentals exam with complete confidence using the detailed information contained in this comprehensive self-study resource. Written by two of the industry’s leading CompTIA A+ authorities, the book serves as both a powerful exam preparation tool and an ideal on-the-job reference.
Continue reading “CompTIA IT Fundamentals All-in-One Exam Guide (Exam FC0-U51)”

Computer Forensics and Digital Investigation with EnCase Forensic v7

Rating: 
Amazon Price: $50.00 $35.79 You save: $14.21 (28%). (as of April 26, 2018 03:16 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic v7 reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample procedures are included throughout this practical guide. Install EnCase Forensic v7 and customize the user interface Prepare your investigation and set up a new case Collect and verify evidence from suspect computers and networks Use the EnCase Evidence Processor and Case Analyzer Uncover clues using keyword searches and filter results through GREP Work with bookmarks, timelines, hash sets, and libraries Handle case closure, final disposition, and evidence destruction Carry out field investigations using EnCase Portable Learn to program in EnCase EnScript

Practical Hacking Techniques and Countermeasures

Rating: 
Amazon Price: $109.95 $99.38 You save: $10.57 (10%). (as of April 25, 2018 12:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws.

Written in a lab manual style, the book begins with the installation of the VMware® Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks.
Continue reading “Practical Hacking Techniques and Countermeasures”

Web Application Obfuscation: ‘-/WAFs..Evasion..Filters//alert(/Obfuscation/)-‘

Rating: 
Amazon Price: N/A (as of April 25, 2018 21:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses.

Named a 2011 Best Hacking and Pen Testing Book by InfoSec ReviewsLooks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assetsEvaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilitiesTeaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more