Metasploit Penetration Testing Cookbook, Second Edition

Rating: 
Amazon Price: $49.99 (as of January 25, 2021 06:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
  • Manufacturer: Packt Publishing

Manufacturer Info

  • PartNumber: black & white illustrations

Product Info

  • IsAdultProduct: no
  • ReleaseDate: 2013-10-25T00:00:01Z
  • NumberOfItems: 1

Global Information Warfare: The New Digital Battlefield, Second Edition

Rating: 
Amazon Price: $57.46 (as of January 25, 2021 06:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how global information warfare is waged and what must be done to counter its attacks.

In light of increased attacks since 2002, Global Information Warfare: The New Digital Battlefield, Second Edition provides a critical update on the nature and approaches to global information warfare. It focuses on threats, vulnerabilities, attacks, and defenses from the perspectives of various players such as governments, corporations, terrorists, and private citizens.
Continue reading “Global Information Warfare: The New Digital Battlefield, Second Edition”

CyberWar, CyberTerror, CyberCrime and CyberActivism, Second Edition

Rating: 
Amazon Price: $37.99 (as of January 24, 2021 16:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Develop better cybersecurity by taking a wider view of the threats

Many books on cybersecurity focus on technical responses to the cybercriminal, the cyberactivist and the state-sponsored hacker. As important as this is, relatively inexperienced hackers can still break into systems that have not taken account of human fallibility and other known vulnerabilities.
Continue reading “CyberWar, CyberTerror, CyberCrime and CyberActivism, Second Edition”

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

Rating: 
Amazon Price: $50.00 $30.79 You save: $19.21 (38%) (as of January 24, 2021 08:39 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The latest techniques for averting UC disaster

“This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure.” ―Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast
Continue reading “Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition”

Metasploit Penetration Testing Cookbook, Second Edition

Rating: 
Amazon Price: $29.99 (as of January 25, 2021 06:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In Detail

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.
Continue reading “Metasploit Penetration Testing Cookbook, Second Edition”