Catalog Search Results
81) The Games
Author
Series
Language
English
Description
Rio de Janeiro, Brazil -- home to beautiful white-sand beaches, gorgeous women, stunning natural beauty, and the world's largest Carnival celebration -- knows how to throw a party. So it's a natural choice to host the biggest spectacles in sports -- the World Cup and the Olympics. To ensure that the games go off without a hitch, the organizers turn to Jack Morgan, the unflappable head of the renowned international security and consulting firm Private....
Author
Language
English
Description
Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
About This Book
Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks
Perform advanced wireless assessment and penetration tests
Use Embedded Platforms, Raspberry PI, and Android in wireless penetration testing with Kali...
Author
Language
English
Description
COMPUTER HACKING
Computer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking.
Inside, you will learn the basics of hacking for beginners.
This includes the different types of hacking, the reasons behind hacking, jobs in the hacking world, how to do some basic hacks, and the skills a hacker requires.
Many hackers are hired by companies to ensure that their computer systems are...
Author
Language
English
Description
HACKING
Computer hacking is an often misunderstood activity, with hackers being portrayed in the media as all being criminals and deviants. However, as you will discover through reading this book, there is more to hacking than meets the eye!
This informative book dispels the myths surrounding computer hacking, and teaches you about the different types of hackers in the world. You will learn about the different hacking techniques that can be used,...
Author
Language
English
Description
Welcome to "Cybersecurity in the Digital Age: Safeguarding Data and Privacy." In today's interconnected world, where digital technologies are deeply embedded in our daily lives, the need for robust cybersecurity measures has never been more critical. This book serves as a comprehensive guide to understanding the threats posed by cybercriminals and how individuals and organizations can protect themselves against these threats. As technology continues...
Author
Language
English
Description
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State...
Author
Language
English
Description
In today's digital landscape, web apps evolve rapidly, demanding enhanced security. This “Ultimate Web Authentication Handbook” offers a comprehensive journey into this realm. Beginning with web authentication basics, it builds a strong foundation. You'll explore cryptography fundamentals, essential for secure authentication. The book delves into the connection between authentication and network security, mastering federated authentication via...
Author
Language
English
Description
Practical gateway to securing web applications with OIDC, OAuth, SAML, FIDO, and Digital Identity to.
KEY FEATURES ? Dive into real-world practical hands-on experience with authentication protocols through sample code.? Gain a programmer's perspective on cryptography, certificates, and their role in securing authentication processes.? Explore a wide array of authentication protocols, including TLS, SAML, OAuth, OIDC, WebAuthn, and Digital Identity.?...
Author
Language
English
Description
Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do to protect yourself from cyber threats and the most common hacking techniques used today. Structured in 10 chapters, all about cyber-security and ethical hacking, this is in short what the book covers...
Author
Language
English
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
Author
Language
English
Description
This is not your regular hacking book.
Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform. The kind of vulnerabilities you find in every corporate environment around the world: • Bypassing application whitelisting • Privilege escalation • Pivoting on other machines. It's up to you to exploit them in a meaningful way without screwing...
Author
Language
English
Description
"Defending the Digital Perimeter: Network Security Audit Readiness Strategies" is a must-read eBook for IT professionals, cybersecurity experts, and business leaders who are dedicated to safeguarding their organization's digital assets. In today's interconnected world, where data breaches and cyberattacks are on the rise, maintaining a robust and secure network perimeter is of paramount importance.This comprehensive eBook delves into the intricacies...
Author
Series
Language
English
Description
This is the story of one hacker who met his match in the form of machine learning, behavioral analysis, artificial intelligence, and a dedicated SOC team while breaking into an offshore service provider.
Most hacking tools simply crash and burn in such a hostile environment.
What is a hacker to do when facing such a fully equipped opponent? In this new edition, we cover step-by-step tricks and techniques to circumvent next-generation security vendors...
94) Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digita
Author
Language
English
Description
Security is a shared responsibility, and we must all own it
KEY FEATURES ● Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components.● Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams.● Adopts a perspective of developing a Cybersecurity strategy that aligns with business goals.
DESCRIPTION Once a business is connected to the Internet,...
Author
Series
Language
English
Description
This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company's network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on.
Whether you are a wannabe ethical hacker or an experienced pentester frustrated by outdated books and false media reports, this book is definitely for you.
We...
Author
Language
English
Description
COMPUTER HACKING
Most people are quite familiar with the word hacker due to the attention these entities get in the media. In this book, you will learn about how the world of hacking is growing and what you can do to protect your business from being the victim of a hacking. The last thing any business owner wants to do is leave themselves open to attacks due to lack of knowledge and planning on their part. This book will show you how you can take...
Author
Language
English
Description
"Safeguarding the Digital Fortress: A Guide to Cyber Security" is an essential resource that equips readers with the knowledge and tools needed to navigate the complex world of cyber security. In this comprehensive guide, a clear and concise roadmap for individuals and organizations to protect their digital assets from the ever-evolving threats of the digital age is provided. Chapters included:Chapter 1: Fundamentals of Information SecurityChapter...
Author
Language
English
Description
Introducing the "Defense in Depth" Book Bundle
Are you concerned about the ever-growing threats to your digital world? Do you want to fortify your network security and bolster your cyber resilience? Look no further - the "Defense in Depth" book bundle is your ultimate resource to safeguard your digital assets.
This comprehensive bundle consists of four carefully curated volumes, each designed to cater to different levels of expertise, from beginners...
Author
Language
English
Description
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.
Book Description
Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request