-
Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition
Author Shakeel Ali , Tedi Heriyanto , Lee Allen , Gerard Johansen , Damian Boodoo , Alex Sam
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth editionKey FeaturesRely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-....
Release Date 2018/10 -
Social Ontology of Whoness, 3rd Edition
Author Michael Eldred
How are core social phenomena to be understood as modes of being? This book offers an alternative approach to social ontology. Recent interest in social ontology on the part of mainstream philosophy and the social sciences presupposes from the outset that the human....
Release Date 2018/10 -
Building a Successful Social Venture
Author James Koch , Eric Carlson
This is the first book on creating and running a social enterprise to combine theoretical discussions with current cases from around the world, filling a huge gap in the literature. It serves as an eminently practical blueprint for those who wish to build, sus....
Release Date 2018/09 -
Hands-On Bug Hunting for Penetration Testers
Author Joseph Marshall
Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.Key FeaturesLearn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book Desc....
Release Date 2018/09 -
Kali Linux Web Penetration Testing Cookbook - Second Edition
Author Gilberto Najera-Gutierrez
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilities Conduct a preliminary assessment of attack surfaces and run exploits in your lab E....
Release Date 2018/08 -
Social Engineering, 2nd Edition
Author Christopher Hadnagy
Harden the human firewall against the most current threatsSocial Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus softw....
Release Date 2018/07 -
Hacking For Dummies, 6th Edition
Author Kevin Beaver
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penet....
Release Date 2018/07 -
Author Ric Messier
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book cov....
Release Date 2018/07 -
Hands-On Penetration Testing on Windows
Author Phil Bramwell
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux.Key FeaturesIdentify the vulnerabilities in your system using Kali Linux 2018.02 Discover the art of exploiting Windows kernel drivers Get ....
Release Date 2018/07 -
Learn Ethical Hacking from Scratch
Author Zaid Sabih
Learn how to hack systems like black hat hackers and secure them like security experts Key FeaturesUnderstand how computer systems work and their vulnerabilitiesExploit weaknesses and hack into machines to test their securityLearn how to secure systems from hackers....
Release Date 2018/07 -
Practical Web Penetration Testing
Author Gus Khawaja
Learn how to execute web application penetration testing end-to-endAbout This BookBuild an end-to-end threat model landscape for web application securityLearn both web application vulnerabilities and web intrusion testingAssociate network vulnerabilities with a web....
Release Date 2018/06 -
Learning Python Web Penetration Testing
Author Christian Martorella
Leverage the simplicity of Python and available libraries to build web security testing tools for your applicationAbout This BookUnderstand the web application penetration testing methodology and toolkit using PythonWrite a web crawler/spider with the Scrapy librar....
Release Date 2018/06 -
Mastering Metasploit - Third Edition
Author Nipun Jaswal
Discover the next level of network defense with the Metasploit frameworkAbout This BookGain the skills to carry out penetration testing in complex and highly-secured environmentsBecome a master using the Metasploit framework, develop exploits, and generate modules ....
Release Date 2018/05 -
Python Penetration Testing Essentials
Author Mohit
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1.About This BookDetect and avoid various attack types that put the privacy of a ....
Release Date 2018/05 -
Author Mark Redmond
Social decentering theory was developed in response to the confusion created by the use of the term empathy and to a lesser extent, perspective-taking, to reflect a wide and varied set of human cognitive processes and behaviors. Theory of Social Decentering: A Theo....
Release Date 2018/05 -
Author Dr. Erdal Ozkaya
Improve information security by learning Social Engineering.About This BookLearn to implement information security using social engineeringGet hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so onPractical approac....
Release Date 2018/04 -
Author Hussam Khrais
Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming languageAbout This BookComprehensive information on building a web application penetration testing framework using PythonMaster....
Release Date 2018/04 -
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits, First edition
Author William Easttom
The perfect introduction to pen testing for all IT professionals and studentsClearly explains key concepts, terminology, challenges, tools, and skillsCovers the latest penetration testing standards from NSA, PCI, and NISTWelcome to today’s most useful and practical....
Release Date 2018/03 -
Penetration Testing with Shellcode
Author Hamza Megahed
Master Shellcode to leverage the buffer overflow conceptAbout This BookUnderstand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and MetasploitLearn to write and modify 64-bit shellcode along with kernel-level s....
Release Date 2018/02 -
Web Penetration Testing with Kali Linux - Third Edition
Author Juned Ahmed Ansari , Gilberto Najera-Gutierrez
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holesAbout This BookKnow how to set up your lab with Kali LinuxDiscover the core concepts of web penetration testin....
Release Date 2018/02 -
Advanced Infrastructure Penetration Testing
Author Chiheb Chebbi
A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructureAbout This BookAdvanced exploitation techniques to breach modern operating systems and complex network....
Release Date 2018/02 -
Author J. Stuart Bunderson , Bret Sanner
Research on social species shows that hierarchies are important for group functioning. Human beings also have a tendency to think and act hierarchically. In fact, hierarchies — distinct differences in group members' power and status — can be found in v....
Release Date 2018/01 -
Social Development Through Benevolent Business
Author Kalyan Sankar Mandal
This book points out that apart from usual “profit- maximizing business,”, there are some other types of business models which that serve social causes with profit. The author discusses some such business models, namely, social business, compassionate b....
Release Date 2018/01 -
Author Camilo Olaya , César García-Díaz
Uniquely reflects an engineering view to social systems in a wide variety of contexts of applicationSocial Systems Engineering: The Design of Complexity brings together a wide variety of application approaches to social systems from an engineering viewpoint. The bo....
Release Date 2017/12 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Brad Hibbert , Morey J. Haber
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breache....
Release Date 2017/12 -
Metasploit Revealed: Secrets of the Expert Pentester
Author Nipun Jaswal , Sagar Rahalkar
Exploit the secrets of Metasploit to master the art of penetration testing.About This BookDiscover techniques to integrate Metasploit with the industry's leading toolsCarry out penetration testing in highly-secured environments with Metasploit and acquire skills t....
Release Date 2017/12 -
Digital Forensics with Kali Linux
Author Shiva V.N. Parasram
Learn the skills you need to take advantage of Kali Linux for digital forensics investigations using this comprehensive guideAbout This BookMaster powerful Kali Linux tools for digital investigation and analysisPerform evidence acquisition, preservation, and analys....
Release Date 2017/12 -
Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition
Author Vivek Ramachandran , Cameron Buchanan
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack.About This BookLearn wireless penetration testi....
Release Date 2017/12 -
Kali Linux - An Ethical Hacker's Cookbook
Author Himanshu Sharma
Over 120 recipes to perform advanced penetration testing with Kali LinuxAbout This BookPractical recipes to conduct effective penetration testing using the powerful Kali LinuxLeverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities wi....
Release Date 2017/10 -
Ethical Hacking and Penetration Testing Guide
Author Rafay Baloch
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret ....
Release Date 2017/09