• Ebook Google hacking for penetration testers (Volume 2): Part 2

    Ebook Google hacking for penetration testers (Volume 2): Part 2

    Ebook Google hacking for penetration testers (Volume 2): Part 2 includes contents: Chapter 7: ten simple security searches that work; chapter 8: tracking down web servers, login portals, and network hardware; chapter 9: usernames, passwords, and secret stuff, oh my!; chapter 10: hacking google services; chapter 11: Google hacking showcase; chapter 12: protecting yourself from google hackers.

     278 p actvn 26/01/2024 11 0

  • Ebook Incident response: Computer forensics toolkit – Part 2

    Ebook Incident response: Computer forensics toolkit – Part 2

    Ebook Incident response: Computer forensics toolkit – Part 2 includes contents: Chapter 8: incident containment and eradication of vulnerabilities; chapter 9: disaster recovery and follow-up; chapter 10: responding to different types of incidents; chapter 11: assessing system security to prevent further attacks; chapter 12: pulling it all together; appendix a: what's on the CD-ROM; appendix b: commonly attacked ports; appendix c: field...

     184 p actvn 26/01/2024 14 0

  • Ebook Incident response: Computer forensics toolkit – Part 1

    Ebook Incident response: Computer forensics toolkit – Part 1

    Ebook Incident response: Computer forensics toolkit – Part 1 includes contents: Chapter 1: computer forensics and incident response essentials; chapter 2: addressing law enforcement considerations; chapter 3: forensic preparation and preliminary response; chapter 4: windows registry, recycle bin, and data storage; chapter 5: analyzing and detecting malicious code and intruders; chapter 6: retrieving and analyzing clues; chapter 7: procedures...

     178 p actvn 26/01/2024 12 0

  • Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 2

    Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 2

    Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) – Part 2 includes contents: Chapter 6 input injection attacks, chapter 7 attacking XML web services, chapter 8 attacking web application management, chapter 9 hacking web clients, chapter 10 the enterprise web application security program, A: Web application security checklist, B: Web hacking tools and techniques cribsheet.

     233 p actvn 25/12/2023 30 1

  • Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 1

    Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 1

    Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 1 includes contents: Chapter 1 hacking web apps 101, chapter 2 profiling, chapter 3 hacking web platforms, chapter 4 attacking web authentication, chapter 5 attacking web authorization.

     248 p actvn 25/12/2023 26 0

  • Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 information security basics, chapter 2 the windows security architecture from the hacker's perspective, chapter 3 footprinting and scanning, chapter 4 enumeration, chapter 5 hacking windows-specific services, chapter 6 discovering and exploiting windows vulnerabilities, chapter 7 post-exploit pillaging.

     252 p actvn 25/12/2023 30 0

  • Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2 includes contents: Chapter 8 achieving stealth and maintaining presence, chapter 9 hacking SQL server, chapter 10 hacking Microsoft client apps, chapter 11 physical attacks, chapter 12 windows security features and tools, chapter a windows security checklist, chapter b about the companion website.

     230 p actvn 25/12/2023 28 0

  • Ebook OS X exploits and defense

    Ebook OS X exploits and defense

    Ebook "OS X exploits and defense" includes content: Macintosh OS X boot process and forensic software, past and current threats, malicious macs - malware and the mac, malware detection and the mac, Mac OS X for pen testers, wardriving and wireless penetration testing with OS X, security and OS X, encryption technologies and OS X.

     348 p actvn 25/12/2023 47 0

  • Ebook How to cheat at VolP security

    Ebook How to cheat at VolP security

    Ebook "How to cheat at VolP security" includes content: The hardware infrastructure, introduction to VolP security, architectures, support protocols, threats to VolP communications systems, confirm user identity, active security monitoring, logically segregate network traffic, IETF encryption solutions for VolP, skype security... and other contents.

     433 p actvn 25/12/2023 31 0

  • Ebook Open source fuzzing tools

    Ebook Open source fuzzing tools

    Ebook "Open source fuzzing tools" includes content: Introduction to vulnerability research, fuzzing—what’s that, building a fuzzing environment, open source fuzzing tools, commercial fuzzing solutions, build your own fuzzer, integration of fuzzing in the development cycle,... and other contents.

     209 p actvn 25/12/2023 24 0

  • Ebook How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin

    Ebook How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin

    Ebook "How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin" includes content: Presenting the business case for open source software; hardening the operating system; enumeration and scanning your network, introducing intrusion detection and snort; installing and configuring snort and add ons; advanced snort deployment; network analysis, troubleshooting, and packet sniffing; basics of cryptography and encryption;...

     430 p actvn 25/12/2023 27 0

  • Ebook Phishing exposed

    Ebook Phishing exposed

    Ebook "Phishing exposed" includes content: Banking on phishing, go phish, e-mail - the weapon of mass delivery; crossing the phishing line; the dark side of the web; malware, money movers, and ma bell mayhem; so long, and thanks for all the phish.

     416 p actvn 25/12/2023 23 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn