Catalog Search Results
Author
Language
English
Description
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.
Book Description
Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive...
62) 360° Vulnerability Assessment With Nessus and Wireshark: Identify, Evaluate, Treat, and Report TH
Author
Language
English
Description
A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark KEY FEATURES ● Minimize your organization's exposure to cybersecurity threats with Vulnerability management.● Learn how to locate vulnerabilities using Nessus and Wireshark.● Explore and work with different network analysis and mapping tools. DESCRIPTION Today, the world depends on services that run on the IT environments. These services,...
Author
Language
English
Description
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.
Book Description
Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive...
64) Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digita
Author
Language
English
Description
Security is a shared responsibility, and we must all own it
KEY FEATURES ● Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components.● Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams.● Adopts a perspective of developing a Cybersecurity strategy that aligns with business goals.
DESCRIPTION Once a business is connected to the Internet,...
65) Cybersecurity and Ethical Hacking: Exploring the Dark Art of Ethical Hacking and Penetration Testing
Author
Language
English
Description
"Cybersecurity and Ethical Hacking: Exploring the Dark Art of Ethical Hacking and Penetration Testing" is a comprehensive guide that provides an in-depth exploration of the latest techniques and tools used by cybersecurity professionals to protect networks and systems from cyber threats. With the rise of cybercrime, protecting digital assets has become a critical concern for individuals and organizations alike. This book provides a practical and accessible...
Author
Language
English
Description
HACKING
Computer hacking is an often misunderstood activity, with hackers being portrayed in the media as all being criminals and deviants. However, as you will discover through reading this book, there is more to hacking than meets the eye!
This informative book dispels the myths surrounding computer hacking, and teaches you about the different types of hackers in the world. You will learn about the different hacking techniques that can be used,...
Author
Language
English
Description
COMPUTER HACKING
Computer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking.
Inside, you will learn the basics of hacking for beginners.
This includes the different types of hacking, the reasons behind hacking, jobs in the hacking world, how to do some basic hacks, and the skills a hacker requires.
Many hackers are hired by companies to ensure that their computer systems are...
Author
Language
English
Description
Wireless networks are everywhere. You have probably set one up yourself, but have you ever wondered just how safe you are while browsing online? In the majority of cases, the default settings for your networks are not enough to protect you. With your data being transferred over the air, it can be easily plucked and used by anyone who knows how. Don't let it happen to you.BackTrack - Testing Wireless Network Security will help you secure your wireless...
Author
Language
English
Description
Welcome to "Cybersecurity in the Digital Age: Safeguarding Data and Privacy." In today's interconnected world, where digital technologies are deeply embedded in our daily lives, the need for robust cybersecurity measures has never been more critical. This book serves as a comprehensive guide to understanding the threats posed by cybercriminals and how individuals and organizations can protect themselves against these threats. As technology continues...
Author
Language
English
Description
Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis" is a comprehensive guide to understanding the vulnerabilities and defenses of network protocols. In today's interconnected world, networks are essential for communication and collaboration, making them a prime target for hackers seeking to exploit vulnerabilities in the protocols that underpin them. This book provides a detailed overview of network protocols, including...
Author
Language
English
Description
This is not your regular hacking book.
Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform. The kind of vulnerabilities you find in every corporate environment around the world: • Bypassing application whitelisting • Privilege escalation • Pivoting on other machines. It's up to you to exploit them in a meaningful way without screwing...
Author
Language
English
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
Author
Language
English
Description
In today's digital landscape, web apps evolve rapidly, demanding enhanced security. This “Ultimate Web Authentication Handbook” offers a comprehensive journey into this realm. Beginning with web authentication basics, it builds a strong foundation. You'll explore cryptography fundamentals, essential for secure authentication. The book delves into the connection between authentication and network security, mastering federated authentication via...
Author
Language
English
Description
"Hacking and Cybersecurity: Building Resilient Digital Defenses" is a comprehensive guide to understanding the fundamentals of cybersecurity and the principles of hacking, and building resilient digital defenses to protect against cyberattacks. In today's interconnected world, cyberattacks are becoming increasingly frequent and sophisticated, posing a threat to individuals, organizations, and governments. This book provides a detailed overview of...
Author
Language
English
Description
"Defending the Digital Perimeter: Network Security Audit Readiness Strategies" is a must-read eBook for IT professionals, cybersecurity experts, and business leaders who are dedicated to safeguarding their organization's digital assets. In today's interconnected world, where data breaches and cyberattacks are on the rise, maintaining a robust and secure network perimeter is of paramount importance.This comprehensive eBook delves into the intricacies...
Author
Language
English
Description
Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
About This Book
Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks
Perform advanced wireless assessment and penetration tests
Use Embedded Platforms, Raspberry PI, and Android in wireless penetration testing with Kali...
Author
Language
English
Description
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State...
Author
Language
English
Description
Malware, DoS attacks, SQLi, and data exfiltration are some of the problems that many security officers have to face every day. Having advanced knowledge in communications and protocol analysis is therefore essential to investigate and detect any of these attacks. Tshark is the ideal tool for professionals who wish to meet these needs, or students who want to delve into the world of networking.Instant Traffic Analysis with Tshark How-to is a practical,...
Author
Language
English
Description
The Ransomware Handbook is an essential read for anyone wishing to learn about ransomware attacks. Mike thoroughly examines the essence of what ransomware is, the current trends within ransomware, and how to protect your organization from this modern threat. The book gives data driven insights on the trends within ransomware, such as the rise of the demanded sums of money and the likelihood of companies retrieving their data.
The Ransomware Handbook...
Author
Language
English
Description
Introducing the "Wireless Security Masterclass" Book Bundle - Your Path to Becoming a Wireless Security Expert!
���� Are you concerned about the security of your wireless networks? ���� Want to learn the ins and outs of penetration testing and ethical hacking? ���� Seeking a comprehensive resource to master wireless security from beginner to expert level?
Look no further! Our "Wireless Security Masterclass" book bundle is...
In Interlibrary Loan
Didn't find what you need? Items not owned by Penticton Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup. Items must be over 1 year old.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service for new books published this year. Submit Request