You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key FeaturesRely on the most updated version of Kali to formulate your pentesting strategiesTest your corporate network against threatsExplore new cutting-edge wireless penetration tools and featuresBook Description Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement. This fo...
The world’s fresh water supplies are dwindling rapidly—even wastewater is now considered an asset. By 2025, most of the world's population will be facing serious water stresses and shortages. Aquananotechnology: Global Prospects breaks new ground with its informative and innovative introduction of the application of nanotechnology to the remediation of contaminated water for drinking and industrial use. It provides a comprehensive overview, from a global perspective, of the latest research and developments in the use of nanotechnology for water purification and desalination methods. The book also covers approaches to remediation such as high surface area nanoscale media for adsorption of...
The November/December 2020 issue of Hugo Award-winning Uncanny Magazine. Featuring new fiction by Ken Liu, Hal Y. Zhang, Brit E.B. Hvide, Martha Wells, Lee Mandelo, and John Wiswell. Reprint fiction by Maurice Broaddus. Essays by Meghan Ball, Meg Elison, Michi Trota, and K.A. Doore, poetry by Jane Yolen, Peter Tacy, Brandon O'Brien, Valerie Valdes, and Jennifer Crow, interviews with Ken Liu and Lee Mandelo by Caroline M. Yoachim, a cover by Julie Dillon, and editorials by Lynne M. Thomas and Michael Damian Thomas, and Elsa Sjunneson. Uncanny Magazine is a bimonthly science fiction and fantasy magazine first published in November 2014. Edited by 2016, 2017, 2018, 2019 & 2020 Hugo award winners for best semiprozine, and 2018 Hugo award winners for Best Editor, Short Form, Lynne M. Thomas and Michael Damian Thomas, and Chimedum Ohaegbu and Elsa Sjunneson, each issue of Uncanny includes new stories, poetry, articles, and interviews.
A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book Employ advanced pentesting techniques with Kali Linux to build highly-secured systems Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs Who This Book Is For Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux,...
A complete reference guide to mastering Nmap and its scripting engine, covering practical tasks for IT personnel, security engineers, system administrators, and application security enthusiasts Key FeaturesLearn how to use Nmap and other tools from the Nmap family with the help of practical recipesDiscover the latest and most powerful features of Nmap and the Nmap Scripting EngineExplore common security checks for applications, Microsoft Windows environments, SCADA, and mainframesBook Description Nmap is one of the most powerful tools for network discovery and security auditing used by millions of IT professionals, from system administrators to cybersecurity specialists. This third edition o...
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratch Key FeaturesGet up and running with Kali Linux 2019.2Gain comprehensive insights into security concepts such as social engineering, wireless network exploitation, and web application attacksLearn to use Linux commands in the way ethical hackers do to gain control of your environmentBook Description The current rise in hacking and security breaches makes it more important than ever to effectively pentest your environment, ensuring endpoint protection. This book will take you through the latest version of Kali Linux and help you use various tools and techniques to efficiently ...
Take a seat—the captain’s seat, that is—and relax. You’re about to land a Boeing 747. “Brilliant.” —The Sunday Times A Daily Mail and Spectator Best Book of the Year A Points Guy Best Book of the Year The mystery of flight is magical; the reality even more so—from the physics that keeps a 450-ton vehicle aloft, to the symphony of technology and teamwork that safely sets it down again. Take it from Mark Vanhoenacker—British Airways pilot, international bestselling author, and your new flight instructor. This is How to Land a Plane. Vanhoenacker covers every step—from approach to touchdown— with precision, wit, and infectious enthusiasm. Aided by dozens of illustrations, ...
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! About This Book Get a rock-solid insight into penetration testing techniques and test your corporate network against threats like never before Formulate your pentesting strategies by relying on the most up-to-date and feature-rich Kali version in town—Kali Linux 2 (aka Sana). Experience this journey with new cutting-edge wireless penetration tools and a variety of new features to make your pentesting experience smoother Who This Book Is For If you are an IT security professional or a student with basic knowledge of Unix/Linux operating systems, including an awareness of information ...
Learn the skills you need to take advantage of Kali Linux for digital forensics investigations using this comprehensive guide About This Book Master powerful Kali Linux tools for digital investigation and analysis Perform evidence acquisition, preservation, and analysis using various tools within Kali Linux Implement the concept of cryptographic hashing and imaging using Kali Linux Perform memory forensics with Volatility and internet forensics with Xplico. Discover the capabilities of professional forensic tools such as Autopsy and DFF (Digital Forensic Framework) used by law enforcement and military personnel alike Who This Book Is For This book is targeted at forensics and digital investi...
Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book Practical recipes to conduct effective penetration testing using the powerful Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn Installing, setting up and customizing Kali for pentesting on multiple platforms Pentesting routers and embedded dev...