Programmer's Guide to Drupal, 2nd Edition
by Jennifer Hodgdon
If you're a web programmer, your experiences have taught you certain lessons - and only some of them apply well to Drupal. Drupal has its own set of programming principles that require a different approach, and many programmers make mistakes when relying on skills they've used for other projects. This book will show you which programming techniques you can use - and which you should avoid - when b...
Price: $23.06 | Publisher: O'Reilly Media | Release: 2015
Kali Linux Wireless Penetration Testing
by Vivek Ramachandran, Cameron Buchanan
As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.Kali Linux Wireless Penetration Testing Beginner's Guide presents wireless pentesting from the ground up, introduci...
Price: $7.75 | Publisher: Packt Publishing | Release: 2015
Web Penetration Testing with Kali Linux, 2nd Edition
by Juned Ahmed Ansari
Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering.At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know abou...
Price: $49.99 | Publisher: Packt Publishing | Release: 2015
Python Penetration Testing Essentials
by Mohit
This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples.We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve into hacking the application layer where we start with gathering information from a website. We then move on to concepts related to website hacking such as parameter t...
Price: $29.99 | Publisher: Packt Publishing | Release: 2015
by Slava Gomzin
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of ma...
Price: $32.99 | Publisher: Wiley | Release: 2014
Computer Security Handbook, 6th Edition
by Seymour Bosworth, Michel E. Kabay, Eric Whyne
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and co...
Price: $184.99 | Publisher: Wiley | Release: 2014
by Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security arc...
Price: $12.00 | Publisher: Wiley | Release: 2014
by Wade Alcorn, Christian Frichot, Michele Orru
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.The web browser has become the most popular and widely used computer &a...
Price: $44.99 | Publisher: Wiley | Release: 2014
by Georgia Weidman
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab...
Price: $20.00 | Publisher: No Starch Press | Release: 2014
by Justin Seitz
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities - writing network sniffers, manipulating packets, infecting virtual machines, creating s...
Price: $29.17 | Publisher: No Starch Press | Release: 2014