Building a BeagleBone Black Super Cluster

Rating: 
Amazon Price: N/A (as of May 22, 2019 11:19 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Build and configure your own parallel computing Beowulf cluster using BeagleBone Black ARM systems

About This BookConfigure your own cluster for high speed parallel computingBenefit from your personally configured super computer which is a power efficient, low-cost, and highly scalable super computerWrite your own cluster software with the help of practical examples using powerful computational libraries specifically designed for distributed memory machines
Continue reading “Building a BeagleBone Black Super Cluster”

Kali Linux Wireless Penetration Testing: Beginner’s Guide

Rating: 
Amazon Price: N/A (as of May 22, 2019 12:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Key FeaturesLearn wireless penetration testing with Kali Linux, the latest iteration of BacktrackDetect hidden wireless networks and discover their namesExplore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffingDevelop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks

Book Description
Continue reading “Kali Linux Wireless Penetration Testing: Beginner’s Guide”

Python Penetration Testing Essentials

Rating: 
Amazon Price: N/A (as of May 22, 2019 19:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Employ the power of Python to get the best out of pentesting

About This BookLearn to detect and avoid various types of attacks that put the privacy of a system at riskEmploy practical approaches to penetration testing using Python to build efficient code and eventually save timeEnhance your concepts about wireless applications and information gathering of a web server
Continue reading “Python Penetration Testing Essentials”

Learning zANTI2 for Android Pentesting

Amazon Price: N/A (as of May 23, 2019 03:33 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2

About This BookUnderstand the basics of wireless penetration testing and its importanceLearn the techniques to perform penetration testing on your wireless networks, such as scanning, detecting vulnerabilities in your victim, and then attackingThis simple and intriguing guide takes a step-by-step approach that will help you get to grips with network pentesting using just your Android device and zANTI2
Continue reading “Learning zANTI2 for Android Pentesting”

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide (Open Source: Community Experience Distilled)

Rating: 
Amazon Price: N/A (as of May 22, 2019 14:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn how to perform an efficient, organized, and effective penetration test from start to finishGain hands-on penetration testing experience by building and testing a virtual lab environment that includes commonly found security measures such as IDS and firewallsTake the challenge and perform a virtual penetration test against a fictional corporation from start to finish and then verify your results by walking through step-by-step solutionsDetailed step-by-step guidance on managing testing results and writing clearly organized and effective penetration testing reportsProperly scope your penetration test to avoid catastropheUnderstand in detail how the testing process works from start to finish, not just how to use specific toolsUse advanced techniques to bypass security controls and remain hidden while testingCreate a segmented virtual network with several targets, IDS and firewallGenerate testing reports and statisticsPerform an efficient, organized, and effective penetration test from start to finish

Although the book is intended for someone that has a solid background in information security the step-by-step instructions make it easy to follow for all skill levels. You will learn Linux skills, how to setup your own labs, and much much more.