You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your cur...
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your cur...
THE SMILING CORPSE is one of the most unusual books you'll read this year, and it's a pretty good bet you haven't read this since it came out in 1935. It's a mystery, but unlike any mystery you've ever read, because the "detectives" in this tale are quite recognizable -- as mystery writers of the Golden Age, such as S.S. Van Dine, G.K. Chesterton, Dashiell Hammett, James Cain, and Sax Rohmer.The book has an introduction, The Smiling Corpse—A Re-Introduction by J. Randolph Cox, as well as a Preface by John Graham Ballantine, and there's even a "Who's Who" in case you've forgotten some of the old masters of mystery who show up as characters in this crazy novel. There are also several beautiful illustrations by Georg Hartmann.
Over 80 recipes to master the most widely used penetration testing framework.
As awareness and understanding of Asperger Syndrome and Autism Spectrum Disorder increases, more adults are identifying themselves as being on the spectrum and seeking formal diagnosis. This book discusses the process, the pros and cons, and the after-effects of receiving an autism diagnosis in adulthood. Outlining the likely stages of the journey to diagnosis, this book looks at what the individual may go through as they become aware of their Asperger characteristics and as they seek pre-assessment and diagnosis, as well as common reactions upon receiving a diagnosis - from depression and anger to relief and self-acceptance. Combining practical guidance with advice from personal experience and interviews and correspondence with specialists in the field, the book discusses if and when to disclose to family, friends and employers, how to seek appropriate support services, and how to use the self-knowledge gained through diagnosis to live well in the future.
What people are saying about Inside Cyber Warfare "The necessary handbook for the 21st century." --Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments "A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war." --Jim Stogdill, CTO, Mission Services Accenture You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll ...
A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker’s perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. ...
Gladiator, first published in 1930, tells the story of Hugo Danner, who is given superhuman speed, endurance, strength, and intelligence by his father as an experiment in creating a better human. We follow Hugo throughout his life viewed from his perspective, from childhood, when Hugo first discovers he’s different from others, to adulthood, as Hugo tries to find a positive outlet for his abilities around the time of the first World War. Gladiator has been made into a 1938 comedy movie, and is thought to be the inspiration for the Superman comic books—though this has not been confirmed.
Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing-including attacking different types of networks, pivoting through security controls, privilege escalation, and ...
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have fig...