|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Detailed walkthroughs of how to discover, test, and document common
web application vulnerabilities. Key Features Learn how to test for
common bugs Discover tools and methods for hacking ethically
Practice working through pentesting engagements step-by-step Book
DescriptionBug bounties have quickly become a critical part of the
security economy. This book shows you how technical professionals
with an interest in security can begin productively-and
profitably-participating in bug bounty programs. You will learn
about SQli, NoSQLi, XSS, XXE, and other forms of code injection.
You'll see how to create CSRF PoC HTML snippets, how to discover
hidden content (and what to do with it once it's found), and how to
create the tools for automated pentesting workflows. Then, you'll
format all of this information within the context of a bug report
that will have the greatest chance of earning you cash. With
detailed walkthroughs that cover discovering, testing, and
reporting vulnerabilities, this book is ideal for aspiring security
professionals. You should come away from this work with the skills
you need to not only find the bugs you're looking for, but also the
best bug bounty programs to participate in, and how to grow your
skills moving forward in freelance security research. What you will
learn Choose what bug bounty programs to engage in Understand how
to minimize your legal liability and hunt for bugs ethically See
how to take notes that will make compiling your submission report
easier Know how to take an XSS vulnerability from discovery to
verification, and report submission Automate CSRF PoC generation
with Python Leverage Burp Suite for CSRF detection Use WP Scan and
other tools to find vulnerabilities in WordPress, Django, and Ruby
on Rails applications Write your report in a way that will earn you
the maximum amount of money Who this book is forThis book is
written for developers, hobbyists, pentesters, and anyone with an
interest (and a little experience) in web application security.
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage
security vulnerabilities of Ethereum Key Features Build end-to-end
decentralized Ethereum apps using Truffle, Web3, and Solidity
Explore various solution-based recipes to build smart contracts and
foolproof decentralized applications Develop decentralized
marketplaces from scratch, build wallets, and manage transactions
Book DescriptionEthereum and Blockchain will change the way
software is built for business transactions. Most industries have
been looking to leverage these new technologies to gain
efficiencies and create new business models and opportunities. The
Ethereum Cookbook covers various solutions such as setting up
Ethereum, writing smart contracts, and creating tokens, among
others. You'll learn about the security vulnerabilities, along with
other protocols of Ethereum. Once you have understood the basics,
you'll move on to exploring various design decisions and tips to
make your application scalable and secure. In addition to this,
you'll work with various Ethereum packages such as Truffle, Web3,
and Ganache. By the end of this book, you'll have comprehensively
grasped the Ethereum principles and ecosystem. What you will learn
Efficiently write smart contracts in Ethereum Build scalable
distributed applications and deploy them Use tools and frameworks
to develop, deploy, and test your application Use block explorers
such as Etherscan to find a specific transaction Create your own
tokens, initial coin offerings (ICOs), and games Understand various
security flaws in smart contracts in order to avoid them Who this
book is forThe Ethereum Cookbook is for you if you are a software
engineer, Blockchain developer, or research scientist who wants to
build smart contracts, develop decentralized applications, and
facilitate peer-to-peer transaction. It is assumed that you are
familiar with Blockchain concepts and have sound knowledge of
JavaScript.
Get more from your network by securing its infrastructure and
increasing its effectiveness Key Features Learn to choose the best
network scanning toolset for your system Implement different
concepts of network scanning such as port scanning and OS detection
Adapt a practical approach to securing your network Book
DescriptionNetwork scanning is the process of assessing a network
to identify an active host network; same methods can be used by an
attacker or network administrator for security assessment. This
procedure plays a vital role in risk assessment programs or while
preparing a security plan for your organization. Practical Network
Scanning starts with the concept of network scanning and how
organizations can benefit from it. Then, going forward, we delve
into the different scanning steps, such as service detection,
firewall detection, TCP/IP port detection, and OS detection. We
also implement these concepts using a few of the most prominent
tools on the market, such as Nessus and Nmap. In the concluding
chapters, we prepare a complete vulnerability assessment plan for
your organization. By the end of this book, you will have hands-on
experience in performing network scanning using different tools and
in choosing the best tools for your system. What you will learn
Achieve an effective security posture to design security
architectures Learn vital security aspects before moving to the
Cloud Launch secure applications with Web Application Security and
SQL Injection Explore the basics of threat detection/response/
mitigation with important use cases Learn all about integration
principles for PKI and tips to secure it Design a WAN
infrastructure and ensure security over a public WAN Who this book
is forIf you are a security professional who is responsible for
securing an organization's infrastructure, then this book is for
you.
Improve information security by learning Social Engineering. Key
Features Learn to implement information security using social
engineering Get hands-on experience of using different tools such
as Kali Linux, the Social Engineering toolkit and so on Practical
approach towards learning social engineering, for IT security Book
DescriptionThis book will provide you with a holistic understanding
of social engineering. It will help you to avoid and combat social
engineering attacks by giving you a detailed insight into how a
social engineer operates. Learn Social Engineering starts by giving
you a grounding in the different types of social engineering
attacks,and the damages they cause. It then sets up the lab
environment to use different toolS and then perform social
engineering steps such as information gathering. The book covers
topics from baiting, phishing, and spear phishing, to pretexting
and scareware. By the end of the book, you will be in a position to
protect yourself and your systems from social engineering threats
and attacks. All in all, the book covers social engineering from A
to Z , along with excerpts from many world wide known security
experts. What you will learn Learn to implement information
security using social engineering Learn social engineering for IT
security Understand the role of social media in social engineering
Get acquainted with Practical Human hacking skills Learn to think
like a social engineer Learn to beat a social engineer Who this
book is forThis book targets security professionals, security
analysts, penetration testers, or any stakeholder working with
information security who wants to learn how to use social
engineering techniques. Prior knowledge of Kali Linux is an added
advantage
This book contains more than 25 hands-on recipes that will equip
you to build a PKI and roll out remote access capabilities via
Microsoft DirectAccess and VPN. This book also contains tips and
tricks for increasing the security footprint of your Windows Server
infrastructure. Key Features Identify and mitigate security risks
in your Windows Server 2016 infrastructure Learn how to build a PKI
and use it to issue certificates within your network In-depth
information for setting up Microsoft DirectAccess Book Description
Windows Server 2016 is an operating system designed to run on
today's highly performant servers, both on-premise and in the
cloud. It supports enterprise-level data storage, communications,
management, and applications. This book builds off a basic
knowledge of the Windows Server operating system, and assists
administrators with taking the security of their systems one step
further. You will learn tips for configuring proper networking,
especially on multi-homed systems, and tricks for locking down
access to your servers. Then you will move onto one of the hottest
security topics of the year - certificates. You will learn how to
build your own PKI, or how to better administer one that you
already have. You will publish templates, issue certificates, and
even configure autoenrollment in your network. When we say
"networking" we don't only mean inside the LAN. To deal safely with
mobile devices, you will learn about the capabilities of Windows
Server 2016 for connecting these assets securely back into the
corporate network, with information about DirectAccess and VPN. The
material in the book has been selected from the content of Packt's
Windows Server 2016 Cookbook by Jordan Krause to provide a specific
focus on these key Windows Server tasks. What you will learn
Implement solid networking and security practices into your Windows
Server environment Design your own PKI and start issuing
certificates today Connect your remote laptops back to the
corporate network using Microsoft's own remote access technologies,
including DirectAccess Learn to use commands that will help you
with monitoring network traffic. Build and explore your first
Server Core instance today! Who this book is forIf you are a
Windows Server administrator interested in learning the key
security and networking functions available in Windows Server 2016,
keep this book close at hand. If you are a server administrator
setting up certificate services for the first time you will also
benefit from the step-by-step instructions on implementation of a
PKI.
|
You may like...
New Times
Rehana Rossouw
Paperback
(1)
R280
R259
Discovery Miles 2 590
Vengeance
Wilbur Smith, Tom Harper
Hardcover
R399
R319
Discovery Miles 3 190
Joburg Noir
Niq Mhlongo
Paperback
(2)
R325
Discovery Miles 3 250
Crossfire
Wilbur Smith, David Churchill
Hardcover
R399
R362
Discovery Miles 3 620
|