Описание: The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class. This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
Автор: Jack Wiles Название: Low Tech Hacking, ISBN: 1597496650 ISBN-13(EAN): 9781597496650 Издательство: Elsevier Science Рейтинг: Цена: 4499 р. Наличие на складе: Поставка под заказ.
Описание: Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.
Описание: Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don?t know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.
Автор: Gomzin Slava Название: Hacking Point of Sale ISBN: 1118810112 ISBN-13(EAN): 9781118810118 Издательство: Wiley Рейтинг: Цена: 6531 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately.
Описание: Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits-from the bestselling coauthor of the original Hacking Exposed
Автор: Beaver, Kevin Название: Hacking for dummies ISBN: 0470550937 ISBN-13(EAN): 9780470550939 Издательство: Wiley Рейтинг: Цена: 3024 р. Наличие на складе: Поставка под заказ.
Описание: A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It`s bad enough when a hack occurs-stealing identities, bank accounts, and personal information.
Описание: THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, "Gray Hat Hacking: The Ethical Hacker's Handbook," Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.
Develop and launch exploits using BackTrack and Metasploit Employ physical, social engineering, and insider attack techniques Build Perl, Python, and Ruby scripts that initiate stack buffer overflows Understand and prevent malicious content in Adobe, Office, and multimedia files Detect and block client-side, Web server, VoIP, and SCADA attacks Reverse engineer, fuzz, and decompile Windows and Linux software Develop SQL injection, cross-site scripting, and forgery exploits Trap malware and rootkits using honeypots and SandBoxes
Описание: This fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new "5 Deployments" approach
Автор: Sudhanshu Chauhan Название: Hacking Web Intelligence ISBN: 0128018674 ISBN-13(EAN): 9780128018675 Издательство: Elsevier Science Рейтинг: Цена: 5307 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is, reconnaissance—is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.
Автор: Kurtz Jennifer Название: Hacking Wireless Access Points ISBN: 0128053151 ISBN-13(EAN): 9780128053157 Издательство: Elsevier Science Рейтинг: Цена: 5076 р. Наличие на складе: Поставка под заказ.
Описание: Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. . The book demonstrates a variety of ways that these vulnerabilities can be—and have been—exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.
Описание: Identity theft, fraud, and deception - these are the titles in every newspaper around the globe. As these threats increase it is even more important for consumers, IT Staff and security professionals to be aware and prepared to combat against these. How can we do that without proper education? This book provides a basis for this education and a foundation for protection from social engineering. The best deterrent to a crime is to reveal how the crime is perpetrated. This book provides that reveal and at the same time, steps through how to prevent social engineering threats. Of significant interest is the case study section: Dissecting The Art of Deception's Case Studies Obtaining Information from the DMV The Social Security Administration Our own Case Studies The Over confident CEO The Theme Park Email Scandal As a bonus, readers can also link directly to: http://www.backtrack-linux.org/downloads/ for the latest version of BackTrack Social Engineers Edition, one of the world's premiere penetration testing distributions, with tools and features focused on the social engineer. BackTrack and its solid community can be reviewed at www.remote-exploit.org.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru