Amazon Price: $29.99 (as of January 23, 2020 19:22 –
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.
Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.
Continue reading “Linux Firewalls: Attack Detection and Response”
Amazon Price: $43.49 (as of January 23, 2020 18:52 –
This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual.s
Overview Conduct realistic and effective security tests on your network Demonstrate how key data systems are stealthily exploited, and learn how to identify attacks against your own systems Use hands-on techniques to take advantage of Kali Linux, the open source framework of security tools
Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security – from selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.
This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack, specific routes to the target will be examined, including bypassing physical security. You will also get to grips with concepts such as social engineering, attacking wireless networks, web services, and remote access connections. Finally, you will focus on the most vulnerable part of the network – directly attacking the end user.
This book will provide all the practical knowledge needed to test your network's security using a proven hacker's methodology.
What you will learn from this book Employ the methods used by real hackers effectively, to ensure the most effective penetration testing of your network Select and configure the most effective tools from Kali Linux to test network security Employ stealth to avoid detection in the network being tested Recognize when stealthy attacks are being used against your network Exploit networks and data systems using wired and wireless networks as well as web services Identify and download valuable data from target systems Maintain access to compromised systems Use social engineering to compromise the weakest part of the network -the end users
This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques.
Amazon Price: $16.38 (as of January 22, 2020 22:51 –
Looking to surf the deep web anonymously? Want to learn about the TOR browser? Then this book is for you.
Be Anonymous, Forever
Your privacy is important, but the government organizations such as the NSA think otherwise. That's why TOR is such an essential tool – it warrants your privacy and leaves you untraceable.
Continue reading “Tor: Exactly How to Remain Invisible on the Anonymous Deep Web”
Amazon Price: $54.95 $46.71 You save: $8.24 (15%) (as of January 23, 2020 16:52 –
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
Continue reading “Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals”
Amazon Price: $24.95 (as of January 23, 2020 00:54 –
An essential guide for anyone who conducts research on the internet—including librarians, teachers, students, business professionals, and writers—this fully revised handbook details what users must know to take full advantage of internet search tools and resources. From the latest online tools to the new and enhanced services offered by standbys such as Google, the major search engines and their myriad of possibilities are thoroughly discussed. This revamped fourth edition also features chapters on fact-checking sites and popular social networking sites as well as a collection of up-to-date screenshots for visual reference. For those with little to moderate searching experience, friendly, easy-to-follow guidelines to the world of Web research are provided, while experienced searchers will discover new perspectives on content and techniques.