|
Showing 1 - 15 of
15 matches in All Departments
Meeting People via WiFi and Bluetooth will contain an overview of
how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi)
and Bluetooth 802.15 Radio Frequencies. The content contained here
came from research and materials originally presented at Defcon
Wireless CTF Village in August 2015 entitled "Meeting People Via
Wi-Fi". The book will go over the hardware and software needed in
order to do this tracking, how to use these particular tools in
order to do attribution, and tips for protecting yourself from
being attributed via those signals.
How to Attack and Defend Your Website is a concise introduction to
web security that includes hands-on web hacking tutorials. The book
has three primary objectives: to help readers develop a deep
understanding of what is happening behind the scenes in a web
application, with a focus on the HTTP protocol and other underlying
web technologies; to teach readers how to use the industry standard
in free web application vulnerability discovery and exploitation
tools - most notably Burp Suite, a fully featured web application
testing tool; and finally, to gain knowledge of finding and
exploiting the most common web security vulnerabilities. This book
is for information security professionals and those looking to
learn general penetration testing methodology and how to use the
various phases of penetration testing to identify and exploit
common web protocols. How to Attack and Defend Your Website is be
the first book to combine the methodology behind using penetration
testing tools such as Burp Suite and Damn Vulnerable Web
Application (DVWA), with practical exercises that show readers how
to (and therefore, how to prevent) pwning with SQLMap and using
stored XSS to deface web pages.
Introduction to US Cybersecurity Careers is a concise introduction
to the world of cybersecurity and the career opportunities therein.
This book provides a basic rundown of industry sectors, roles, and
places to search for job opportunities within the US cybersecurity
industry. Within this book is vital information for anyone trying
to get into the industry - basic knowledge for those looking to
start training for a career, tips on networking and resume-building
in a fast-evolving and nontraditional sector, and advice on how to
get your foot in the door and become recognized in your field. This
book is designed to help those who are just starting out in
cybersecurity and those who have training and knowledge and want to
get into the industry. Introduction to US Cybersecurity Careers is
your first-stop reference for everything you need to know to start
your journey.
How to Defeat Advanced Malware is a concise introduction to the
concept of micro-virtualization. The book provides current facts
and figures that prove detection- based security products have
become ineffective. A simple strategy is then presented that both
leverages the opportunities presented by Bring Your Own Device
(BYOD) and protects enterprise end users against advanced malware.
The book concludes with case studies demonstrating how hardware-
isolated micro-VMs are helping Fortune 500 financial service
providers defeat advanced malware. This book is primarily designed
for infosec professionals, consultants, network administrators,
CIO's, CTO's, CISO's and senior executives who work within the
financial industry and are responsible for their company's endpoint
protection. How to Defeat Advanced Malware: New Tools for
Protection and Forensics is the first book to compare and contrast
current endpoint security products, while making a case for
encouraging and facilitating the growth of BYOD and social media by
adopting micro-virtualization.
Intelligence-Led Security: How to Understand, Justify and Implement
a New Approach to Security is a concise review of the concept of
Intelligence-Led Security. Protecting a business, including its
information and intellectual property, physical infrastructure,
employees, and reputation, has become increasingly difficult.
Online threats come from all sides: internal leaks and external
adversaries; domestic hacktivists and overseas cybercrime
syndicates; targeted threats and mass attacks. And these threats
run the gamut from targeted to indiscriminate to entirely
accidental. Among thought leaders and advanced organizations, the
consensus is now clear. Defensive security measures: antivirus
software, firewalls, and other technical controls and post-attack
mitigation strategies are no longer sufficient. To adequately
protect company assets and ensure business continuity,
organizations must be more proactive. Increasingly, this proactive
stance is being summarized by the phrase Intelligence-Led Security:
the use of data to gain insight into what can happen, who is likely
to be involved, how they are likely to attack and, if possible, to
predict when attacks are likely to come. In this book, the authors
review the current threat-scape and why it requires this new
approach, offer a clarifying definition of what Cyber Threat
Intelligence is, describe how to communicate its value to business,
and lay out concrete steps toward implementing Intelligence-Led
Security.
Risky Behaviours in the Top 400 iOS and Android Apps is a concise
overview of the security threats posed by the top apps in iOS and
Android apps. These apps are ubiquitous on a phones and other
mobile devices, and are vulnerable to a wide range digital systems
attacks, This brief volume provides security professionals and
network systems administrators a much-needed dive into the most
current threats, detection techniques, and defences for these
attacks.
Cyber Security Awareness for Lawyers is a concise overview of the
cyber security threats posed to companies and organizations. The
book will provide an overview of the cyber threat to you, your
business, your livelihood, and discuss what you need to
do--especially as Lawyers--to lower risk, reduce or eliminate
liability, and protect reputation all related to information
security, data protection and data breaches. The purpose of this
book is to discuss the risk and threats to company information,
customer information, as well as the company itself; how to lower
the risk of a breach, reduce the associated liability, react
quickly, protect customer information and the company's reputation,
as well as discuss your ethical, fiduciary and legal obligations.
Cyber Security Awareness for Accountants and CPAs is a concise
overview of the cyber security threats posed to companies and
organizations. The book will provide an overview of the cyber
threat to you, your business, your livelihood, and discuss what you
need to do, especially as accountants and CPAs, to lower risk,
reduce or eliminate liability, and protect reputation all related
to information security, data protection and data breaches. The
purpose of this book is to discuss the risk and threats to company
information, customer information, as well as the company itself;
how to lower the risk of a breach, reduce the associated liability,
react quickly, protect customer information and the company's
reputation, as well as discuss your ethical, fiduciary and legal
obligations.
Essential Skills for Hackers is about the skills you need to be in
the elite hacker family. The book will mainly about two things:
TCP/IP 101, and Protocol Analysis. The better the hacker, the more
we will be able to master TCP/IP. Once the reader understands what
TCP/IP is, what it looks like, the book will go into Protocol
Analysis and how analyzing the protocol or, in a more general
sense, looking at packets on the wire, we will be able to determine
what exactly is taking place on a network. By doing this, readers
can identify when something on the network doesn't match what it
should and, more importantly, can create any type of sequence of
events or packets that they want on the network and see how the
defenses or the machines that we send them to react.
Cyber Security Awareness for Corporate Directors and Board Members
is a concise overview of the cyber threat to you, your business,
your livelihood, and what you need to do--especially as board
members and directors of boards-- to lower the risk, reduce or
eliminate liability, and protect reputation. The book details the
severity of the treat to companies, and what to do as corporate
directors and board members to build a defense against potential
breaches.
In the book we will be talking about Deploying Secure Containers
for Training and Development. The book covers the technology behind
Linux-based containers and what they can be used for. Details on
how to use containers in training and development are also
provided.
Infosec Management Fundamentals is a concise overview of the
Information Security management concepts and techniques, providing
a foundational template for both experienced professionals and
those new to the industry. This brief volume will also appeal to
business executives and managers outside of infosec who want to
understand the fundamental concepts of Information Security and how
it impacts their business decisions and daily activities.
Cyber Security for CEOs and Managment is a concise overview of the
security threats posed to organizations and networks by the
ubiquity of USB Flash Drives used as storage devices. The book will
provide an overview of the cyber threat to you, your business, your
livelihood, and discuss what you need to do, especially as CEOs and
Management, to lower risk, reduce or eliminate liability, and
protect reputation all related to information security, data
protection and data breaches. The purpose of this book is to
discuss the risk and threats to company information, customer
information, as well as the company itself; how to lower the risk
of a breach, reduce the associated liability, react quickly,
protect customer information and the company's reputation, as well
as discuss your ethical, fiduciary and legal obligations.
Red Teaming is can be described as a type of wargaming.In private
business, penetration testers audit and test organization security,
often in a secretive setting. The entire point of the Red Team is
to see how weak or otherwise the organization's security posture
is. This course is particularly suited to CISO's and CTO's that
need to learn how to build a successful Red Team, as well as
budding cyber security professionals who would like to learn more
about the world of information security.
Securing Social Media in the Enterprise is a concise overview of
the security threats posed by the use of social media sites and
apps in enterprise network environments. Social media sites and
apps are now a ubiquitous presence within enterprise systems and
networks, and are vulnerable to a wide range of digital systems
attacks. This brief volume provides security professionals and
network systems administrators a much-needed dive into the most
current threats, detection techniques, and defenses for these
attacks, and provides a roadmap for best practices to secure and
manage social media within the enterprise.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R164
Discovery Miles 1 640
Tenet
John David Washington, Robert Pattinson, …
DVD
(1)
R51
Discovery Miles 510
|