0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Client-Side Attacks and Defense (Paperback, New): Sean Philip Oriyano, Robert Shimonski Client-Side Attacks and Defense (Paperback, New)
Sean Philip Oriyano, Robert Shimonski
R1,073 R767 Discovery Miles 7 670 Save R306 (29%) Ships in 12 - 17 working days

Individuals wishing to attack a company s network have found a new path of least resistance the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user s machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible.

The most current attacks are discussed along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. The severity of these attacks is examined along with defences against them, including antivirus and anti-spyware, intrusion detection systems, and end-user education.
Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authorsLearn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit the client-side attackDefend your network against attacks that target your company's most vulnerable asset the end user"

Hands-On Penetration Testing with Kali NetHunter - Spy on and protect vulnerable ecosystems using the power of Kali Linux for... Hands-On Penetration Testing with Kali NetHunter - Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go (Paperback)
Glen D. Singh, Sean Philip Oriyano
R1,038 Discovery Miles 10 380 Ships in 10 - 15 working days

Convert Android to a powerful pentesting platform. Key Features Get up and running with Kali Linux NetHunter Connect your Android device and gain full control over Windows, OSX, or Linux devices Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual data Book DescriptionKali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You'll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure. Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem. By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor. What you will learn Choose and configure a hardware device to use Kali NetHunter Use various tools during pentests Understand NetHunter suite components Discover tips to effectively use a compact mobile platform Create your own Kali NetHunter-enabled device and configure it for optimal results Learn to scan and gather information from a target Explore hardware adapters for testing and auditing wireless networks and Bluetooth devices Who this book is forHands-On Penetration Testing with Kali NetHunter is for pentesters, ethical hackers, and security professionals who want to learn to use Kali NetHunter for complete mobile penetration testing and are interested in venturing into the mobile domain. Some prior understanding of networking assessment and Kali Linux will be helpful.

Kali Linux Wireless Penetration Testing Cookbook (Paperback): Sean Philip Oriyano Kali Linux Wireless Penetration Testing Cookbook (Paperback)
Sean Philip Oriyano
R1,087 Discovery Miles 10 870 Ships in 10 - 15 working days

Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes About This Book * Expose wireless security threats through the eyes of an attacker, * Recipes to help you proactively identify vulnerabilities and apply intelligent remediation, * Acquire and apply key wireless pentesting skills used by industry experts Who This Book Is For If you are a security professional, administrator, and a network professional who wants to enhance their wireless penetration testing skills and knowledge then this book is for you. Some prior experience with networking security and concepts is expected. What You Will Learn * Deploy and configure a wireless cyber lab that resembles an enterprise production environment * Install Kali Linux 2017.3 on your laptop and configure the wireless adapter * Learn the fundamentals of commonly used wireless penetration testing techniques * Scan and enumerate Wireless LANs and access points * Use vulnerability scanning techniques to reveal flaws and weaknesses * Attack Access Points to gain access to critical networks In Detail More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats. Style and approach The book will provide the foundation principles, techniques, and in-depth analysis to effectively master wireless penetration testing. It will aid you in understanding and mastering many of the most powerful and useful wireless testing techniques in the industry.

Cryptography InfoSec Pro Guide (Paperback, Ed): Sean Philip Oriyano Cryptography InfoSec Pro Guide (Paperback, Ed)
Sean Philip Oriyano
R980 R806 Discovery Miles 8 060 Save R174 (18%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working tools to data storage architects, security mangers, and others security practitioners who need to possess a thorough understanding of cryptography. True to the hallmarks of all InfoSec Pro Guides, the book imparts the hard-learned lessons and experiences of knowledgeable professionals in security, providing know-how that otherwise takes years to learn. You're led through the Why and How of cryptography, the history of the science, the components of cryptography and how it is applied to various areas in the field of security. Challenging crypto puzzles in every chapter Ready-to-implement cryptographic techniques explained Lingo-Common security terms defined so that you're in the know on the job IMHO-Frank and relevant opinions based on the author's years of industry experience Budget Note-Tips for getting security technologies and processes into your organization's budget In Actual Practice-Exceptions to the rules of security explained in real-world contexts Your Plan-Customizable checklists you can use on the job now Into Action-Tips on how, why, and when to apply new skills and techniques at work

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Harry Potter Wizard Wand - In…
 (3)
R800 Discovery Miles 8 000
Hart Easy Pour Kettle (2.5L)
 (2)
R199 R179 Discovery Miles 1 790
Hoover H84-7WD-ZA Wet & Dry Hand Vacuum…
 (1)
R799 R725 Discovery Miles 7 250
Crayola Crayons (Pack of 8)(Assorted…
R29 R27 Discovery Miles 270
Giotto Turbo Color Felt Tip Pens (12…
 (1)
R51 R42 Discovery Miles 420
Womens 2-Piece Fitness Gym Gloves…
R129 Discovery Miles 1 290
Fine Living E-Table (Black | White)
 (7)
R319 R199 Discovery Miles 1 990
Wild About You - A 60-Day Devotional For…
John Eldredge, Stasi Eldredge Hardcover R309 Discovery Miles 3 090
What Really Happened In Wuhan
Sharri Markson Paperback R300 R21 Discovery Miles 210
Tower Sign - Beware Of The Dog…
R60 R46 Discovery Miles 460

 

Partners