Identify tools and techniques to secure and perform a penetration test on an AWS infrastructure using Kali Linux
Key Features
Efficiently perform penetration testing techniques on your public cloud……続きを見る
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award
"SQL injection is probably the number one problem for any server-side application, and this book unequal……続きを見る
The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker……続きを見る
The Symantec Guide to Home Internet Security helps you protect against every Internet threat: You’ll learn no-hassle ways to keep bad guys out and private information in...minimize exposure to every……続きを見る
Winner of the Best Book Bejtlich Read in 2009 award!
"SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich,……続きを見る
Essential Skills for Hackers is about the skills you need to be in the elite hacker family.
The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more ……続きを見る
著者:Justin Crump
出版社: Taylor & Francis
発売日: 2016年03月30日
Despite a clear and compelling need for an intelligence-led approach to security, operational, and reputational risks, the subject of corporate security intelligence remains poorly understood. An ef……続きを見る
Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other ……続きを見る
Security Smarts for the Self-Guided IT Professional
“Get to know the hackersーor plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed w……続きを見る
An expert guide to implementing fast, secure, and scalable decentralized applications that work with thousands of users in real time
Key Features
Implement advanced features of the Ethereum network……続きを見る
NOW A MAJOR TV SERIES!
'THE STAND meets THE ROAD' Entertainment Weekly
'Enthralling ... richly imagined. Above all, Amy is a superb creation, believably human yet beguilingly enigmatic' Sunday Times……続きを見る
Use this book to build secure firmware.
As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents t……続きを見る
Explore foundational concepts in blockchain theory with an emphasis on recent advances in theory and practice
In Wireless Blockchain: Principles, Technologies and Applications, accomplished research……続きを見る
Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who ……続きを見る
Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments
About This Book
Learn how to build your own pentesting lab environment to practice advanced……続きを見る
Learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
About This Book
Explore and build intricate architectures that a……続きを見る
**Alors vous voulez apprendre à hacker les réseaux WiFi ? Ai-je raison ?
Le WiFi est partout et si vous pouvez hacker ces réseaux, cela signifie que vous pouvez tout hacker.
Ou vous voulez simplemen……続きを見る
Do you ever wonder just how safe you are online?
Do you worry that someone will steal your data? Your passwords? Your bank details?
Every day we hear new stories about people being attacked by cyber……続きを見る
著者:Susan Lincke
出版社: Springer International Publishing
発売日: 2024年01月18日
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational se……続きを見る
This book offers the first comprehensive analysis of touchless fingerprint-recognition technologies. It gives an overview of the state of the art, describes relevant industrial applications, and pre……続きを見る
著者:B. Vincent
出版社: QuantumQuill Press
発売日: 2024年03月21日
In "Cybersecurity in the Age of Espionage: Protecting Your Digital Life," journey into the dynamic realm of cybersecurity, where threats evolve, and resilience is key. Delve into the intricacies of ……続きを見る
An essential anti-phishing desk reference for anyone with an email address
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive tec……続きを見る
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to t……続きを見る
This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems. It covers new technologies……続きを見る
著者:Susan Lincke
出版社: Springer International Publishing
発売日: 2016年03月25日
This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidentia……続きを見る
Practice the Computer Security Skills You Need to Succeed!
40+ lab exercises challenge you to solve problems based on realistic case studies
Step-by-step scenarios require you to think critically
L……続きを見る
Learn how to secure your Java applications from hackers using Spring Security 4.2
About This Book
Architect solutions that leverage the full power of Spring Security while remaining loosely coupled……続きを見る
The infusion of digital technology into contemporary society has had significant effects for everyday life and for everyday crimes. Digital Criminology: Crime and Justice in Digital Society is the f……続きを見る
This book will help you learn to hack in an easy and S****tep-By-Step method. Previously, only computer networks were getting hacked, but in today's modern world, technology has grown immensely and ……続きを見る