Hacking Exposed Malware & Rootkits, 2nd Edition
by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate...
Price: $6.00 | Publisher: McGraw-Hill | Release: 2016
Hacking Exposed Industrial Control Systems
by Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt
This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effec...
Price: $35.87 | Publisher: McGraw-Hill | Release: 2016
by Srinivasa Rao Kotipalli, Mohammed A. Imran
With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security.Hacking Android...
Price: $30.99 | Publisher: Packt Publishing | Release: 2016
by Edmund Weitz
Find solutions to problems and answers to questions you are likely to encounter when writing real-world applications in Common Lisp. This book covers areas as diverse as web programming, databases, graphical user interfaces, integration with other programming languages, multi-threading, and mobile devices as well as debugging techniques and optimization, to name just a few. Written by an author who has used...
Price: $35.13 | Publisher: Apress | Release: 2016
Mastering Kali Linux Wireless Pentesting
by Brian Sak, Jilumudi Raghu Ram
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit.This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration te...
Price: $49.99 | Publisher: Packt Publishing | Release: 2016
Penetration Testing with Raspberry Pi
by Joseph Muniz, Aamir Lakhani
The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyze...
Price: $24.99 | Publisher: Packt Publishing | Release: 2015
Network Attacks and Exploitation
by Matthew Monte
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop d...
Price: $26.66 | Publisher: Wiley | Release: 2015
Machine Learning Projects for .NET Developers
by Mathias Brandewinder
Machine Learning Projects for .NET Developers shows you how to build smarter .NET applications that learn from data, using simple algorithms and techniques that can be applied to a wide range of real-world problems. You'll code each project in the familiar setting of Visual Studio, while the machine learning logic uses F#, a language ideally suited to machine learning applications in .NET. If you'...
Price: $49.99 | Publisher: Apress | Release: 2015
by Joel Grus
Data science libraries, frameworks, modules, and toolkits are great for doing data science, but they're also a good way to dive into the discipline without actually understanding data science. In this book, you'll learn how many of the most fundamental data science tools and algorithms work by implementing them from scratch.If you have an aptitude for mathematics and some programming skills, autho...
Price: $7.17 | Publisher: O'Reilly Media | Release: 2015
Network Security Assessment, 3rd Edition
by Chris McNab
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that professional security analysts use to identify and assess risks in government, military, and commercial networks. Armed with this book, you can work to create environments that are hardened and immune from unauthorized use and attack.Author Chris McNab demonstrate...
Price: $41.06 | Publisher: O'Reilly Media | Release: 2015