Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Ethical Hacking: Social Engineering
  • Language: en

Ethical Hacking: Social Engineering

  • Type: Book
  • -
  • Published: 2016
  • -
  • Publisher: Unknown

Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated. In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"-how hackers use charm, power, and influence to penetrate an organization-and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks. Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.

Learn Wireshark
  • Language: en
  • Pages: 607

Learn Wireshark

Expertly analyze common protocols such as TCP, IP, and ICMP, along with learning how to use display and capture filters, save and export captures, create IO and stream graphs, and troubleshoot latency issues Key Features • Gain a deeper understanding of common protocols so you can easily troubleshoot network issues • Explore ways to examine captures to recognize unusual traffic and possible network attacks • Learn advanced techniques, create display and capture filters, and generate IO and stream graphs Book Description Wireshark is a popular and powerful packet analysis tool that helps network administrators investigate latency issues and potential attacks. Over the years, there have ...

Identity Management with Biometrics
  • Language: en
  • Pages: 369

Identity Management with Biometrics

Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systems Key FeaturesExplore the next iteration of identity protection and overcome real-world challengesUnderstand different biometric use cases to deploy a large-scale biometric systemCurated by renowned security ambassador and experienced author Lisa BockBook Description Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individua...

Ethical Hacking: System Hacking
  • Language: en

Ethical Hacking: System Hacking

  • Type: Book
  • -
  • Published: 2016
  • -
  • Publisher: Unknown

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking-password cracking, privilege escalation, spyware installation, and keylogging-and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools. These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.

Wireshark Essential Training
  • Language: en

Wireshark Essential Training

  • Type: Book
  • -
  • Published: 2018
  • -
  • Publisher: Unknown

None

Wireshark: Advanced Tools and Techniques
  • Language: en

Wireshark: Advanced Tools and Techniques

  • Type: Book
  • -
  • Published: 2018
  • -
  • Publisher: Unknown

None

Learning Cryptography and Network Security
  • Language: en

Learning Cryptography and Network Security

  • Type: Book
  • -
  • Published: 2015
  • -
  • Publisher: Unknown

None

Modern Cryptography for Cybersecurity Professionals
  • Language: en
  • Pages: 286

Modern Cryptography for Cybersecurity Professionals

As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen data Key FeaturesDiscover how cryptography is used to secure data in motion as well as at restCompare symmetric with asymmetric encryption and learn how a hash is usedGet to grips with different types of cryptographic solutions along with common applicationsBook Description In today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in usin...

Ethical Hacking: Penetration Testing
  • Language: en

Ethical Hacking: Penetration Testing

  • Type: Book
  • -
  • Published: 2016
  • -
  • Publisher: Unknown

You've done everything you can to logically secure your systems, along with layering in user education and providing physical security. However, the only way to know if your defenses will hold is to test them. This course looks at one of the most important skills of any IT security professional: penetration testing. A key competency for the Certified Ethical Hacker exam, penetration testing is the process to check if a computer, system, network, or web application has any vulnerabilities. Cybersecurity expert Lisa Bock reviews the steps involved in performing a worthwhile penetration test, including auditing systems, listing and prioritizing vulnerabilities, and mapping out attack points a hacker might target. She also defines the various types of "pen" tests-such as black, grey, and white box; announced vs. unannounced; and automated vs. manual testing-and the techniques and blueprints a pen tester should use to test everything from Wi-Fi to VoIP. Finally, she discusses how to choose and work with an outsourced pen-testing organization, which can bring a valuable outsider's perspective to your IT security efforts.

Securing the IoT: Privacy
  • Language: en

Securing the IoT: Privacy

  • Type: Book
  • -
  • Published: 2017
  • -
  • Publisher: Unknown

None