Rabu, 08 Mei 2013

Wow! eBook: Wireless Reconnaissance in Penetration Testing - 5 new eBooks


Wow! eBook: Wireless Reconnaissance in Penetration Testing - 5 new eBooks

Link to Wow! eBook

Wireless Reconnaissance in Penetration Testing

Posted: 08 May 2013 11:00 AM PDT

Book Description

In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling.

  • Author Matthew Neely is a respected and well-known expert and speaker on radio reconnaissance and penetration testing
  • Includes real-world case studies of actual penetration tests using radio profiling
  • Covers data leakage, frequency, attacks, and information gathering

Table of Contents
Chapter 1. Why Radio Profiling?
Chapter 2. Basic Radio Theory and Introduction to Radio Systems
Chapter 3. Targets (Wireless Headsets, Guard Radios, Wireless Cameras, etc.)
Chapter 4. Offsite Profiling
Chapter 5. Offsite Profiling Case Study
Chapter 6. Onsite Profiling
Chapter 7. Onsite Profiling Case Study
Chapter 8. How to Use the Information You Gather
Chapter 9. Basic Overview of Equipment and How It Works
Chapter 10. Case Study to Pull It All Together
Chapter 11. New Technology and the Future of Radios in Penetration Testing

Book Details

  • Paperback: 226 pages
  • Publisher: Syngress (October 2012)
  • Language: English
  • ISBN-10: 1597497312
  • ISBN-13: 978-1597497312
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Wireless Reconnaissance in Penetration Testing appeared first on Wow! eBook.

Practical Lock Picking, 2nd Edition

Posted: 08 May 2013 10:56 AM PDT

Book Description

Practical Lock Picking, 2nd Edition is presented with rich, detailed full-color diagrams and includes easy-to-follow lessons that allow even beginners to acquire the knowledge they need quickly. Everything from straightforward lock picking to quick-entry techniques like shimming, bumping, and bypassing are explained and illustrated. Whether you’re being hired to penetrate security or simply trying to harden your own defenses, this book is essential. This edition has been updated to reflect the changing landscape of tools and tactics which have emerged in recent years

  • Detailed full-color photos make learning as easy as picking a lock
  • Companion website is filled with indispensible lock picking videos
  • Extensive appendix details tools and toolkits currently available for all your lock picking needs

Table of Contents
Chapter 1. Fundamentals of Pin Tumbler and Wafer Locks
Chapter 2. The Basics of Picking – Exploiting Weaknesses
Chapter 3. Beginner Training – How to Get Very Good, Very Fast
Chapter 4. Advanced Training – Learning Some Additional Skills
Chapter 5. Quick-Entry Tricks – Shimming, Bumping, and Bypassing
Chapter 6. They All Come Tumbling Down – Pin Tumblers in Other Configurations

Book Details

  • Paperback: 296 pages
  • Publisher: Syngress; 2nd Edition (September 2012)
  • Language: English
  • ISBN-10: 1597499897
  • ISBN-13: 978-1597499897
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Practical Lock Picking, 2nd Edition appeared first on Wow! eBook.

The Basics of Digital Forensics

Posted: 08 May 2013 10:50 AM PDT

Book Description

The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Also learn how to collect evidence, document the scene, and how deleted data is recovered.

  • Learn all about what Digital Forensics entails
  • Build a toolkit and prepare an investigative plan
  • Understand the common artifacts to look for during an exam

Table of Contents
Chapter 1. Introduction
Chapter 2. Key Technical Concepts
Chapter 3. Labs and Tools
Chapter 4. Collecting Evidence
Chapter 5. Windows System Artifacts
Chapter 6. Anti-Forensics
Chapter 7. Legal
Chapter 8. Internet and Email
Chapter 9. Network Forensics
Chapter 10. Mobile Device Forensics
Chapter 11. Looking Ahead: Challenges and Concerns

Book Details

  • Paperback: 208 pages
  • Publisher: Syngress (February 2012)
  • Language: English
  • ISBN-10: 1597496618
  • ISBN-13: 978-1597496612
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post The Basics of Digital Forensics appeared first on Wow! eBook.

Moving To The Cloud

Posted: 08 May 2013 10:45 AM PDT

Book Description

Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies. The authors particularly examine cloud platforms that are in use today. They also describe programming APIs and compare the technologies that underlie them. The basic foundations needed for developing both client-side and cloud-side applications covering compute/storage scaling, data parallelism, virtualization, MapReduce, RIA, SaaS and Mashups are covered. Approaches to address key challenges of a cloud infrastructure, such as scalability, availability, multi-tenancy, security and management are addressed. The book also lays out the key open issues and emerging cloud standards that will drive the continuing evolution of cloud computing.

  • Includes complex case studies of cloud solutions by cloud experts from Yahoo! , Amazon, Microsoft, IBM, Adobe and HP Labs.
  • Presents insights and techniques for creating compelling rich client applications that interact with cloud services.
  • Demonstrates and distinguishes features of different cloud platforms using simple to complex API programming examples.

Table of Contents
Chapter 1. Introduction
Chapter 2. Infrastructure as a Service
Chapter 3. Platform as a Service
Chapter 4. Application as a Service
Chapter 5. Paradigms for Developing Cloud Applications
Chapter 6. Addressing the Cloud Challenges
Chapter 7. Security
Chapter 8. Managing the Cloud Infrastructure
Chapter 9. Related Technologies
Chapter 10. Future trends and Research Directions

Book Details

  • Paperback: 468 pages
  • Publisher: Syngress (December 2011)
  • Language: English
  • ISBN-10: 1597497258
  • ISBN-13: 978-1597497251
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Moving To The Cloud appeared first on Wow! eBook.

Low Tech Hacking

Posted: 08 May 2013 10:42 AM PDT

Book Description

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren’t broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.

  • Contains insider knowledge of what could be your most likely Low Tech threat
  • Includes timely advice from some of the top security minds in the world
  • Covers many detailed countermeasures that you can employ to improve your security posture

Table of Contents
Chapter 1. Social Engineering-The Ultimate Low Tech Hacking Threat
Chapter 2. Low Tech Vulerabilities-Physical Security
Chapter 3. More About Locks and Ways to Low Tech Hack Them
Chapter 4. Low Tech Wireless Hacking
Chapter 5. Low Tech Targeting and Surveillance-How Much Could They Find Out About You?
Chapter 6. Low Tech Hacking for the Penetration Tester
Chapter 7. Low Tech Hacking and the Law-Where Can You Go For Help?
Chapter 8. Information Security Awareness Training. Your Most Valuable Countermeasure to Employee Risk

Book Details

  • Paperback: 264 pages
  • Publisher: Syngress (December 2011)
  • Language: English
  • ISBN-10: 1597496650
  • ISBN-13: 978-1597496650
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Low Tech Hacking appeared first on Wow! eBook.

Tidak ada komentar:

Posting Komentar