Wow! eBook: Wireless Reconnaissance in Penetration Testing - 5 new eBooks | |
- Wireless Reconnaissance in Penetration Testing
- Practical Lock Picking, 2nd Edition
- The Basics of Digital Forensics
- Moving To The Cloud
- Low Tech Hacking
Wireless Reconnaissance in Penetration Testing Posted: 08 May 2013 11:00 AM PDT Book DescriptionIn many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling.
Table of Contents Book Details
Related Books
The post Wireless Reconnaissance in Penetration Testing appeared first on Wow! eBook. |
Practical Lock Picking, 2nd Edition Posted: 08 May 2013 10:56 AM PDT Book DescriptionPractical Lock Picking, 2nd Edition is presented with rich, detailed full-color diagrams and includes easy-to-follow lessons that allow even beginners to acquire the knowledge they need quickly. Everything from straightforward lock picking to quick-entry techniques like shimming, bumping, and bypassing are explained and illustrated. Whether you’re being hired to penetrate security or simply trying to harden your own defenses, this book is essential. This edition has been updated to reflect the changing landscape of tools and tactics which have emerged in recent years
Table of Contents Book Details
Related Books
The post Practical Lock Picking, 2nd Edition appeared first on Wow! eBook. |
The Basics of Digital Forensics Posted: 08 May 2013 10:50 AM PDT Book DescriptionThe Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Also learn how to collect evidence, document the scene, and how deleted data is recovered.
Table of Contents Book Details
Related Books
The post The Basics of Digital Forensics appeared first on Wow! eBook. |
Posted: 08 May 2013 10:45 AM PDT Book DescriptionMoving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies. The authors particularly examine cloud platforms that are in use today. They also describe programming APIs and compare the technologies that underlie them. The basic foundations needed for developing both client-side and cloud-side applications covering compute/storage scaling, data parallelism, virtualization, MapReduce, RIA, SaaS and Mashups are covered. Approaches to address key challenges of a cloud infrastructure, such as scalability, availability, multi-tenancy, security and management are addressed. The book also lays out the key open issues and emerging cloud standards that will drive the continuing evolution of cloud computing.
Table of Contents Book Details
Related Books
The post Moving To The Cloud appeared first on Wow! eBook. |
Posted: 08 May 2013 10:42 AM PDT Book DescriptionCriminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren’t broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.
Table of Contents Book Details
Related Books
The post Low Tech Hacking appeared first on Wow! eBook. |
You are subscribed to email updates from Wow! eBook To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
Tidak ada komentar:
Posting Komentar