Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Cертификаты | Хиты | | |
 

The Basics of Hacking and Penetration Testing,, Patrick Engebretson



Варианты приобретения
Цена: 2888р.
Кол-во:
Наличие: Ожидается поступление.
 Заказывайте скорее, чем раньше закажете, тем раньше получите заказ.
Ожидаемая дата поступления на склад: 3 окт 2022

Добавить в корзину
в Мои желания

Автор: Patrick Engebretson
Название:  The Basics of Hacking and Penetration Testing,
Перевод названия: Патрик Энгелбретсон: Основы хакерской науки
ISBN: 9780124116443
Издательство: Elsevier Science
Классификация:
ISBN-10: 0124116442
Обложка/Формат: Paperback
Страницы: 225
Вес: 0.426 кг.
Дата издания: 12.09.2013
Серия: Syngress
Язык: English
Издание: 2 rev ed
Иллюстрации: Illustrated; illustrations, unspecified
Размер: 230 x 189 x 14
Читательская аудитория: Professional & vocational
Подзаголовок: Ethical hacking and penetration testing made easy
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии



      Старое издание

Low Tech Hacking,

Автор: Jack Wiles
Название: Low Tech Hacking,
ISBN: 1597496650 ISBN-13(EAN): 9781597496650
Издательство: Elsevier Science
Рейтинг:
Цена: 4499 р.
Наличие на складе: Поставка под заказ.

Описание: Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.

Ethical Hacking and Penetration Testing Guide

Автор: Baloch
Название: Ethical Hacking and Penetration Testing Guide
ISBN: 1482231611 ISBN-13(EAN): 9781482231618
Издательство: Taylor&Francis
Рейтинг:
Цена: 7836 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don?t know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

Hacking google maps and google earth

Автор: Brown, Martin C.
Название: Hacking google maps and google earth
ISBN: 0471790095 ISBN-13(EAN): 9780471790099
Издательство: Wiley
Рейтинг:
Цена: 2749 р.
Наличие на складе: Поставка под заказ.

Описание: This one-of-a-kind resource contains 500 pages of jaw-dropping hacks, mods, and customizations. These include creating mashups with data from other sources such as Flickr, building a space station tracker, hacking Maps with Firefox PiggyBank, and building a complete community site with Maps and Earth.

Google Hacking for Penetration Testers

Автор: Johnny Long
Название: Google Hacking for Penetration Testers
ISBN: 0128029641 ISBN-13(EAN): 9780128029640
Издательство: Elsevier Science
Рейтинг:
Цена: 5769 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third editionincludes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.

Hacking Exposed 7 Network Security Secrets & Solutions

Автор: McClure Stuart
Название: Hacking Exposed 7 Network Security Secrets & Solutions
ISBN: 0071780289 ISBN-13(EAN): 9780071780285
Издательство: McGraw-Hill
Рейтинг:
Цена: 5499 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new "5 Deployments" approach

Social Engineering: The Art of Human Hacking

Автор: Hadnagy Christopher
Название: Social Engineering: The Art of Human Hacking
ISBN: 0470639539 ISBN-13(EAN): 9780470639535
Издательство: Wiley
Рейтинг:
Цена: 0 р.
Наличие на складе: Невозможна поставка.

Описание: Identity theft, fraud, and deception - these are the titles in every newspaper around the globe.  As these threats increase it is even more important for consumers, IT Staff and security professionals to be aware and prepared to combat against these.  How can we do that without proper education?  This book provides a basis for this education and a foundation for protection from social engineering. The best deterrent to a crime is to reveal how the crime is perpetrated. This book provides that reveal and at the same time, steps through how to prevent social engineering threats. Of significant interest is the case study section: Dissecting The Art of Deception's Case Studies Obtaining Information from the DMV The Social Security Administration Our own Case Studies The Over confident CEO The Theme Park Email Scandal As a bonus, readers can also link directly to: http://www.backtrack-linux.org/downloads/ for the latest version of BackTrack Social Engineers Edition, one of the world's premiere penetration testing distributions, with tools and features focused on the social engineer.  BackTrack and its solid community can be reviewed at www.remote-exploit.org.

The Basics of Web Hacking,

Автор: Josh Pauli
Название: The Basics of Web Hacking,
ISBN: 0124166008 ISBN-13(EAN): 9780124166004
Издательство: Elsevier Science
Рейтинг:
Цена: 2766 р.
Наличие на складе: Поставка под заказ.

Описание: The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities. The Basics of Web Hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user. With Dr. Pauli’s approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known-vulnerable Web application VMs that are widely available and maintained for this very purpose. Once you complete the entire process, not only will you be prepared to test for the most damaging Web exploits, you will also be prepared to conduct more advanced Web hacks that mandate a strong base of knowledge.

Hacking For Dummies, 4th Edition

Автор: Beaver
Название: Hacking For Dummies, 4th Edition
ISBN: 1118380932 ISBN-13(EAN): 9781118380932
Издательство: Wiley
Рейтинг:
Цена: 3024 р.
Наличие на складе: Поставка под заказ.

Описание: Hacking For Dummies explores the malicious hacker's mindset, helps the reader develop an ethical hacking plan, and covers typical hack attacks and how to counteract them. Readers will also discover strategies for reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end users not to be victims of social engineering. Updates and new and expanded content include: Windows 8 hacks  Linux hacks Web application hacks Database hacks VoIP hacks  Mobile computing hacks, including laptops and smartphones Free testing tools Tools and resources appendix 

Hacking Web Apps,

Автор: Mike Shema
Название: Hacking Web Apps,
ISBN: 159749951X ISBN-13(EAN): 9781597499514
Издательство: Elsevier Science
Рейтинг:
Цена: 4499 р.
Наличие на складе: Поставка под заказ.

Описание: How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. . Attacks featured in this book include: . • SQL Injection . • Cross Site Scripting . • Logic Attacks . • Server Misconfigurations . • Predictable Pages . • Web of Distrust . • Breaking Authentication Schemes . • HTML5 Security Breaches . • Attacks on Mobile Apps . Even if you don’t develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked—as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser – sometimes your last line of defense – more secure.

Hacking for dummies

Автор: Beaver, Kevin
Название: Hacking for dummies
ISBN: 0470550937 ISBN-13(EAN): 9780470550939
Издательство: Wiley
Рейтинг:
Цена: 3024 р.
Наличие на складе: Поставка под заказ.

Описание: A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It`s bad enough when a hack occurs-stealing identities, bank accounts, and personal information.

Gray Hat Hacking: The Ethical Hackers Handbook

Автор: Harper Allen
Название: Gray Hat Hacking: The Ethical Hackers Handbook
ISBN: 0071742557 ISBN-13(EAN): 9780071742559
Издательство: McGraw-Hill
Рейтинг:
Цена: 6186 р.
Наличие на складе: Поставка под заказ.

Описание: THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, "Gray Hat Hacking: The Ethical Hacker's Handbook," Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

Develop and launch exploits using BackTrack and Metasploit Employ physical, social engineering, and insider attack techniques Build Perl, Python, and Ruby scripts that initiate stack buffer overflows Understand and prevent malicious content in Adobe, Office, and multimedia files Detect and block client-side, Web server, VoIP, and SCADA attacks Reverse engineer, fuzz, and decompile Windows and Linux software Develop SQL injection, cross-site scripting, and forgery exploits Trap malware and rootkits using honeypots and SandBoxes

Ninja Hacking,

Автор: Thomas Wilhelm
Название: Ninja Hacking,
ISBN: 1597495883 ISBN-13(EAN): 9781597495882
Издательство: Elsevier Science
Рейтинг:
Цена: 4499 р.
Наличие на складе: Поставка под заказ.

Описание: Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия