تبلیغات
Computer Book - مطالب امنیت

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

نوشته شده در تاریخ : شنبه 15 مرداد 1390   03:57 ب.ظ

نوع مطلب :امنیت ،

1cd3e2 The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Publisher: S..y..n..gr,,es,,s 2011 | 180 Pages | ISBN: 1597496553 | PDF | 4 MB

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.Each chapter contains hands-on examples teach you how to interpret the results and utilize those results in later phases


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: hacking، Penetration،

Metasploit: The Penetration Tester’s Guide

نوشته شده در تاریخ : یکشنبه 9 مرداد 1390   03:55 ب.ظ

نوع مطلب :امنیت ،

645682167130 Metasploit: The Penetration Tester’s Guide

Book Description

“The best guide to the  Framework.” —HD Moore, Founder of the  Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by  professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester’s Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you’ve built your foundation for penetration , you’ll learn the Framework’s conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration  techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Metasploit، Security، Testing،

Lifehacker, 3rd Edition

نوشته شده در تاریخ : جمعه 7 مرداد 1390   03:49 ب.ظ

نوع مطلب :امنیت ،تجارت ،

645682167119 Lifehacker, 3rd Edition

Book Description

A new edition, packed with even more clever tricks and methods that make everyday life easier

Lifehackers redefine personal productivity with creative and clever methods for making life easier and more enjoyable. This new edition of a perennial bestseller boasts new and exciting tips, tricks, and methods that strike a perfect balance between current technology and common sense solutions for getting things done. Exploring the many ways technology has changed since the previous edition, this new edition has been updated to reflect the latest and greatest in technological and personal productivity.

The new “hacks” run the gamut of working with the latest and Mac operating systems for both  and Apple, getting more done with smartphones and their operating systems, and dealing with the evolution of the . Even the most tried-and-true hacks have been updated to reflect the contemporary tech world and the tools it provides us.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: hacking،

The Design of Rijndael: AES – The Advanced Encryption Standard

نوشته شده در تاریخ : پنجشنبه 6 مرداد 1390   05:03 ب.ظ

1100 The Design of Rijndael: AES – The Advanced Encryption Standard

Book Description
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Standard (AES). AES is expected to gradually replace the present Data  Standard (DES) as the most widely applied data  technology.|This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.|This volume is THE authoritative guide to the Rijndael  and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Algorithm، Encryption، Secure، Security،

Managing Infrastructure with Puppet

نوشته شده در تاریخ : پنجشنبه 6 مرداد 1390   08:44 ق.ظ

نوع مطلب :سیستم عامل ،امنیت ،شبکه ،

6456821679 Managing Infrastructure with Puppet

Book Description

Automate your computing systems with Puppet, the popular configuration management framework. Through code samples and real-world examples, this concise introduction shows you how to use Puppet tools and templates to organize and execute configuration plans on your *nix servers. Learn how to manage pools of servers and virtual instances, and discover how Puppethelps you administer access control. If you’re familiar with system administration and Ruby language basics, this book is the ideal way to get up to speed on this open source framework.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Puppet، Management، Open Source،

CEH: Official Certified Ethical Hacker Review Guide (Exam 312-50)

نوشته شده در تاریخ : شنبه 1 مرداد 1390   12:58 ب.ظ

1639199973 CEH: Official Certified Ethical Hacker Review Guide (Exam 312 50)

Book Description

Prepare for the  certification exam with this official review guide and learn how to identify  risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so you’ll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Security، hacking، CEH،

Secure and Trust Computing, Data Management, and Applications

نوشته شده در تاریخ : سه شنبه 28 تیر 1390   06:14 ب.ظ

نوع مطلب :امنیت ،

64568216772 Secure and Trust Computing, Data Management, and Applications

Springer | 2011 | ISBN: 3642223389 | 267 pages | PDF | 4,7 MB

This book constitutes the refereed proceedings of the 8th FIRAInternational Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, held in Loutraki, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held from 2006 until 2010 in various locations. 


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری



CCNA for Dummies

نوشته شده در تاریخ : سه شنبه 28 تیر 1390   05:10 ب.ظ

نوع مطلب :امنیت ،شبکه ،

64568216731 CCNA for Dummies

CCNA  
Publisher: For Dummies | ISBN: 0764506900 | edition 2000 | PDF | 305 pages | 11 mb

What was that whizzing sound? It was you, passing the CCNA certification exam. After you’ve covered all of  Systems’ exam objectives in CCNA For Dummies, such tasks as following network protocols, routing, and maintaining network security will be new tools to add to your skill set. First, expect to become familiar with the language of the exam with the expert guidance of your certified authors. Then, find your way around the workings of the OSI model and its layers: the data link, network, transport,


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری



Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems

نوشته شده در تاریخ : دوشنبه 27 تیر 1390   03:21 ب.ظ

نوع مطلب :امنیت ،

001c3da9 medium Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
Benoit Badrignans, Jean Luc Danger, Viktor Fischer, Guy Gogniat, Lionel Torres, “ Trends for FPGAS: From Secured to Secure Reconfigurable Systems”
Publisher: Springer | ISBN 10: 9400713371 | 2011 | PDF | 272 pages | 4.1 MB

In Security Trends for FPGA’s the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: FPGAS،

WordPress 3 Ultimate Security

نوشته شده در تاریخ : شنبه 18 تیر 1390   10:25 ق.ظ

نوع مطلب :امنیت ،

001c5ce3 medium WordPress 3 Ultimate Security
WordPress 3 Ultimate  By Olly Connelly
Publisher: Pa,.ckt Publ,,ishing 2011 | 408 Pages | ISBN: 1849512108 | PDF | 8 MB
Most likely – today – some  tried to crack your WordPress site, its data and content – maybe once but, with automated tools, very likely dozens or hundreds of times. There’s no silver bullet but if you want to cut the odds of a successful attack from practically inevitable to practically zero, read this book.

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری



Managing Infrastructure with Puppet

نوشته شده در تاریخ : پنجشنبه 16 تیر 1390   01:52 ب.ظ

نوع مطلب :امنیت ،شبکه ،سیستم عامل ،

6456821679 Managing Infrastructure with Puppet

Book Description

Automate your computing systems with , the popular configuration  framework. Through code samples and real-world examples, this concise introduction shows you how to use Puppet tools and templates to organize and execute configuration plans on your *nix servers. Learn how to manage pools of servers and virtual instances, and discover how Puppet helps you administer access control. If you’re familiar with system and Ruby language basics, this book is the ideal way to get up to speed on this  framework.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Puppet، Open Source ·،

Information Security for Automatic Speaker Identification

نوشته شده در تاریخ : پنجشنبه 9 تیر 1390   10:30 ق.ظ

نوع مطلب :امنیت ،

001c3009 medium Information Security for Automatic Speaker Identification
S n er | 2011 | ISBN: 1441996974 | 135 pages | PDF | 3,7 MB

The author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking, speech encryption, steganography, multilevel security systems comprising speaker identification, real transmission of watermarked or encrypted speech signals, and more. The book is especially useful for information security specialist, government security analysts, speech  professionals, and for individuals involved in the study and research of speech recognition at levels.Download:


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری



  • تعداد کل: 2 
  • 1  
  • 2