|
Showing 1 - 16 of
16 matches in All Departments
In today's competitive market, a manager must be able to look at
data, understand it, analyze it, and then interpret it to design a
smart business strategy. Big data is also a valuable source of
information on how customers interact with firms through various
mediums such as social media platforms, online reviews, and many
more. The applications and uses of business analytics are numerous
and must be further studied to ensure they are utilized
appropriately. Data-Driven Approaches for Effective Managerial
Decision Making investigates management concepts and applications
using data analytics and outlines future research directions. The
book also addresses contemporary advancements and innovations in
the field of management. Covering key topics such as big data,
business intelligence, and artificial intelligence, this reference
work is ideal for managers, business owners, industry
professionals, researchers, scholars, academicians, practitioners,
instructors, and students.
Although green innovation and technology is not new, so far very
limited information is available regarding the diversified
approaches for green technologies and engineering. This book
highlights the challenges and opportunities, offering a roadmap for
using various approaches in the most cost effective way. The book
discusses the interrelationship between a circular economy and
green technologies. It presents the dimensions of green innovations
and illustrates the challenges of industrialization, especially in
terms of material synthesis and utilized processes. It covers the
current environmental and health challenges of societies and
describes the role of stakeholders in developing sustainable
societies and industries. This book provides a line of approach to
core and interdisciplinary students, academicians, research
scientists, and various industry personnel to present their ideas
of green innovations with a common vision of sustainable
development of community and industries in mind. Features Discusses
the interrelationship between a circular economy and green
technologies Presents the dimensions of green innovations
Illustrates the challenges of industrialization, especially in
terms of material synthesis and utilized processes Covers the
current environmental and health challenges of societies Offers the
identification and role of stakeholders in the sustainable
development of societies and industries
In today's competitive market, a manager must be able to look at
data, understand it, analyze it, and then interpret it to design a
smart business strategy. Big data is also a valuable source of
information on how customers interact with firms through various
mediums such as social media platforms, online reviews, and many
more. The applications and uses of business analytics are numerous
and must be further studied to ensure they are utilized
appropriately. Data-Driven Approaches for Effective Managerial
Decision Making investigates management concepts and applications
using data analytics and outlines future research directions. The
book also addresses contemporary advancements and innovations in
the field of management. Covering key topics such as big data,
business intelligence, and artificial intelligence, this reference
work is ideal for managers, business owners, industry
professionals, researchers, scholars, academicians, practitioners,
instructors, and students.
Identify, exploit, and test web application security with ease Key
Features Get up to speed with Metasploit and discover how to use it
for pentesting Understand how to exploit and protect your web
environment effectively Learn how an exploit works and what causes
vulnerabilities Book DescriptionMetasploit has been a crucial
security tool for many years. However, there are only a few modules
that Metasploit has made available to the public for pentesting web
applications. In this book, you'll explore another aspect of the
framework - web applications - which is not commonly used. You'll
also discover how Metasploit, when used with its inbuilt GUI,
simplifies web application penetration testing. The book starts by
focusing on the Metasploit setup, along with covering the life
cycle of the penetration testing process. Then, you will explore
Metasploit terminology and the web GUI, which is available in the
Metasploit Community Edition. Next, the book will take you through
pentesting popular content management systems such as Drupal,
WordPress, and Joomla, which will also include studying the latest
CVEs and understanding the root cause of vulnerability in detail.
Later, you'll gain insights into the vulnerability assessment and
exploitation of technological platforms such as JBoss, Jenkins, and
Tomcat. Finally, you'll learn how to fuzz web applications to find
logical security vulnerabilities using third-party tools. By the
end of this book, you'll have a solid understanding of how to
exploit and validate vulnerabilities by working with various tools
and techniques. What you will learn Get up to speed with setting up
and installing the Metasploit framework Gain first-hand experience
of the Metasploit web interface Use Metasploit for web-application
reconnaissance Understand how to pentest various content management
systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become
well-versed with fuzzing web applications Write and automate
penetration testing reports Who this book is forThis book is for
web security analysts, bug bounty hunters, security professionals,
or any stakeholder in the security sector who wants to delve into
web application security testing. Professionals who are not experts
with command line tools or Kali Linux and prefer Metasploit's
graphical user interface (GUI) will also find this book useful. No
experience with Metasploit is required, but basic knowledge of
Linux and web application pentesting will be helpful.
Discover end-to-end penetration testing solutions to enhance your
ethical hacking skills Key Features Practical recipes to conduct
effective penetration testing using the latest version of Kali
Linux Leverage tools like Metasploit, Wireshark, Nmap, and more to
detect vulnerabilities with ease Confidently perform networking and
application attacks using task-oriented recipes Book
DescriptionMany organizations have been affected by recent cyber
events. At the current rate of hacking, it has become more
important than ever to pentest your environment in order to ensure
advanced-level security. This book is packed with practical recipes
that will quickly get you started with Kali Linux (version 2018.4 /
2019), in addition to covering the core functionalities. The book
will get you off to a strong start by introducing you to the
installation and configuration of Kali Linux, which will help you
to perform your tests. You will also learn how to plan attack
strategies and perform web application exploitation using tools
such as Burp and JexBoss. As you progress, you will get to grips
with performing network exploitation using Metasploit, Sparta, and
Wireshark. The book will also help you delve into the technique of
carrying out wireless and password attacks using tools such as
Patator, John the Ripper, and airoscript-ng. Later chapters will
draw focus to the wide range of tools that help in forensics
investigations and incident response mechanisms. As you wrap up the
concluding chapters, you will learn to create an optimum quality
pentest report. By the end of this book, you will be equipped with
the knowledge you need to conduct advanced penetration testing,
thanks to the book's crisp and task-oriented recipes. What you will
learn Learn how to install, set up and customize Kali for
pentesting on multiple platforms Pentest routers and embedded
devices Get insights into fiddling around with software-defined
radio Pwn and escalate through a corporate network Write good
quality security reports Explore digital forensics and memory
analysis with Kali Linux Who this book is forIf you are an IT
security professional, pentester, or security analyst who wants to
conduct advanced penetration testing techniques, then this book is
for you. Basic knowledge of Kali Linux is assumed.
Your one-stop guide to learning and implementing Red Team tactics
effectively Key Features Target a complex enterprise environment in
a Red Team activity Detect threats and respond to them with a
real-world cyber-attack simulation Explore advanced penetration
testing tools and techniques Book DescriptionRed Teaming is used to
enhance security by performing simulated attacks on an organization
in order to detect network and system vulnerabilities. Hands-On Red
Team Tactics starts with an overview of pentesting and Red Teaming,
before giving you an introduction to few of the latest pentesting
tools. We will then move on to exploring Metasploit and getting to
grips with Armitage. Once you have studied the fundamentals, you
will learn how to use Cobalt Strike and how to set up its team
server. The book introduces some common lesser known techniques for
pivoting and how to pivot over SSH, before using Cobalt Strike to
pivot. This comprehensive guide demonstrates advanced methods of
post-exploitation using Cobalt Strike and introduces you to Command
and Control (C2) servers and redirectors. All this will help you
achieve persistence using beacons and data exfiltration, and will
also give you the chance to run through the methodology to use Red
Team activity tools such as Empire during a Red Team activity on
Active Directory and Domain Controller. In addition to this, you
will explore maintaining persistent access, staying untraceable,
and getting reverse connections over different C2 covert channels.
By the end of this book, you will have learned about advanced
penetration testing tools, techniques to get reverse shells over
encrypted channels, and processes for post-exploitation. What you
will learn Get started with red team engagements using lesser-known
methods Explore intermediate and advanced levels of
post-exploitation techniques Get acquainted with all the tools and
frameworks included in the Metasploit framework Discover the art of
getting stealthy access to systems via Red Teaming Understand the
concept of redirectors to add further anonymity to your C2 Get to
grips with different uncommon techniques for data exfiltration Who
this book is forHands-On Red Team Tactics is for you if you are an
IT professional, pentester, security consultant, or ethical hacker
interested in the IT security domain and wants to go beyond
Penetration Testing. Prior knowledge of penetration testing is
beneficial.
Over 120 recipes to perform advanced penetration testing with Kali
Linux About This Book * Practical recipes to conduct effective
penetration testing using the powerful Kali Linux * Leverage tools
like Metasploit, Wireshark, Nmap, and many more to detect
vulnerabilities with ease * Confidently perform networking and
application attacks using task-oriented recipes Who This Book Is
For This book is aimed at IT security professionals, pentesters,
and security analysts who have basic knowledge of Kali Linux and
want to conduct advanced penetration testing techniques. What You
Will Learn * Installing, setting up and customizing Kali for
pentesting on multiple platforms * Pentesting routers and embedded
devices * Bug hunting 2017 * Pwning and escalating through
corporate network * Buffer over?ows 101 * Auditing wireless
networks * Fiddling around with software-defned radio * Hacking on
the run with NetHunter * Writing good quality reports In Detail
With the current rate of hacking, it is very important to pentest
your environment in order to ensure advanced-level security. This
book is packed with practical recipes that will quickly get you
started with Kali Linux (version 2016.2) according to your needs,
and move on to core functionalities. This book will start with the
installation and configuration of Kali Linux so that you can
perform your tests. You will learn how to plan attack strategies
and perform web application exploitation using tools such as Burp,
and Jexboss. You will also learn how to perform network
exploitation using Metasploit, Sparta, and Wireshark. Next, you
will perform wireless and password attacks using tools such as
Patator, John the Ripper, and airoscript-ng. Lastly, you will learn
how to create an optimum quality pentest report! By the end of this
book, you will know how to conduct advanced penetration testing
thanks to the book's crisp and task-oriented recipes. Style and
approach This is a recipe-based book that allows you to venture
into some of the most cutting-edge practices and techniques to
perform penetration testing with Kali Linux.
|
|