The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.Each chapter contains hands-on examples teach you how to interpret the results and utilize those results in later phases
برچسب ها: hacking، Penetration،
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester’s Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.
Once you’ve built your foundation for penetration testing, you’ll learn the Framework’s conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks
برچسب ها: Metasploit، Security، Testing،
A new edition, packed with even more clever tricks and methods that make everyday life easier
Lifehackers redefine personal productivity with creative and clever methods for making life easier and more enjoyable. This new edition of a perennial bestseller boasts new and exciting tips, tricks, and methods that strike a perfect balance between current technology and common sense solutions for getting things done. Exploring the many ways technology has changed since the previous edition, this new edition has been updated to reflect the latest and greatest in technological and personal productivity.
The new “hacks” run the gamut of working with the latest Windowsand Mac operating systems for both Windows and Apple, getting more done with smartphones and their operating systems, and dealing with the evolution of the web. Even the most tried-and-true hacks have been updated to reflect the contemporary tech world and the tools it provides us.
برچسب ها: hacking،
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the AdvancedEncryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology.|This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.|This volume is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.
برچسب ها: Algorithm، Encryption، Secure، Security،
Automate your computing systems with, the popular configuration framework. Through samples and real-world examples, this concise introduction shows you how to use tools and templates to organize and execute configuration plans on your *nix servers. Learn how to manage pools of servers and virtual instances, and discover how helps you administer access control. If you’re familiar with system administration and basics, this book is the ideal way to get up to speed on this framework.
برچسب ها: Puppet، Management، Open Source،
Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so you’ll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.
برچسب ها: Security، hacking، CEH،
Springer | 2011 | ISBN: 3642223389 | 267 pages | PDF | 4,7 MB
This book constitutes the refereed proceedings of the 8th FIRAInternational Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, held in Loutraki, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held from 2006 until 2010 in various locations.
CCNA for Dummies
Publisher: For Dummies | ISBN: 0764506900 | edition 2000 | PDF | 305 pages | 11 mb
What was that whizzing sound? It was you, passing the CCNA certification exam. After you’ve covered all of Cisco Systems’ exam objectives in CCNA For Dummies, such tasks as following network protocols, routing, and maintaining network security will be new tools to add to your skill set. First, expect to become familiar with the language of the exam with the expert guidance of your certified authors. Then, find your way around the workings of the OSI model and its layers: the data link, network, transport,
Publisher: Springer | ISBN 10: 9400713371 | 2011 | PDF | 272 pages | 4.1 MB
In Security Trends for FPGA’s the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid.
برچسب ها: FPGAS،
Publisher: Pa,.ckt Publ,,ishing 2011 | 408 Pages | ISBN: 1849512108 | PDF | 8 MB
Automate your computing systems with Puppet, the popular configuration management framework. Through code samples and real-world examples, this concise introduction shows you how to use Puppet tools and templates to organize and execute configuration plans on your *nix servers. Learn how to manage pools of servers and virtual instances, and discover how Puppet helps you administer access control. If you’re familiar with systemadministration and Ruby language basics, this book is the ideal way to get up to speed on this open source framework.
برچسب ها: Puppet، Open Source ·،
The author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking, speech encryption, steganography, multilevel security systems comprising speaker identification, real transmission of watermarked or encrypted speech signals, and more. The book is especially useful for information security specialist, government security analysts, speech development professionals, and for individuals involved in the study and research of speech recognition at advancedlevels.Download:
Beginning Database Design: From Novice to Professional, 2 edition جمعه 3 شهریور 1391
Fundamentals of Robotic Mechanical Systems: Theory, Methods, and Algorithms - 3rd edition جمعه 3 شهریور 1391
Ian H. Witten, “Data Mining: Practical Machine Learning Tools and Techniques” جمعه 3 شهریور 1391
Algorithms and Computation جمعه 3 شهریور 1391
Oracle Business Intelligence Enterprise Edition 11g: A Hands-On Tutorial شنبه 28 مرداد 1391
IBM Cognos Business Intelligence 10.1 Dashboarding Cookbook شنبه 28 مرداد 1391
Windows Phone 7.5: Building Location-aware Applications شنبه 28 مرداد 1391
Mastering Prezi for Business Presentations شنبه 28 مرداد 1391
Node Cookbook شنبه 28 مرداد 1391
Oracle Database XE 11gR2 Jump Start Guide پنجشنبه 26 مرداد 1391
Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology پنجشنبه 26 مرداد 1391
Joomla! Search Engine Optimization پنجشنبه 26 مرداد 1391
Drupal 7 Cookbook پنجشنبه 26 مرداد 1391
لیست آخرین پستها