E-Books (9)

Title: Ethical Hacking & Penetration Testing 
Author: Brad Causey & Bobby Rogers 

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links. 

Title Description Read more..
Your rating: None Average: 3.7 (50 votes)

Image

DESCRIPTION

Product Description

"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group

"Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker


From the Back Cover

Uncover, plug, and ethically disclose security flaws
Read more..
Your rating: None Average: 1 (1 vote)


Download the service manual for Nokia N95 (RM-159) which is a smartphone produced by Nokia and it was released at the end of March 2007. The phone uses a two-way slider to access either media playback buttons or a numeric keypad. Packed with built in 5 megapixel camera and accelerometer, N95 is able to record video MPEG-4 VGA (640×480) with image stabilization. The quality of video capture is up to 30 fps.

The N95 runs on Symbian OS v9.2, with an S60 3rd Edition platform with Feature Pack 1. Two newer versions have also been released: the upgraded N95 8GB (N95-2), and the N95-3, which adds 3G support for North America. Read more..

Your rating: None Average: 3.9 (9 votes)


Module 0: Introduction
Module 1: Business and Technical Logistics of Penetration Testing
Module 2: Information Gathering
Module 3: Linux Fundamentals
Module 4: Detecting Live Systems
Module 5: Reconnaissance -- Enumeration
Module 6: Cryptography
Module 7: Vulnerability Assessments
Module 8: Malware – Software Goes Undercover
Module 9: Hacking Windows
Module 10: Advanced Vulnerability and Exploitation Techniques
Module 11: Attacking Wireless Networks
Module 12: Networks, Firewalls, Sniffing and IDS
Module 13: Injecting the Database
Module 14: Attacking Web Technologies


Module 1: Business and Technical Logistics of Pen Testing

• Definition of a Penetration Test
• Benefits of a Penetration Test
• ID Theft Statistics
• Recent Hacking News
• The Evolving Threat
• Vulnerability Life Cycle
• Exploit Time Line
• Zombie Statistics
• Zombie Definition
• Botnet Definition
• Types of Penetration Testing
• Pen Testing Methodology
• Hacker vs. Penetration Tester
• Tools vs. Technique
• Penetration Testing Methodologies
• OSSTMM - Open Source Security Testing Methodologies
• Website Review
• SecurityNOW! SX
• Case Study and Lab

Module 2: Information Gathering
Read more..
Your rating: None Average: 3.8 (5 votes)


IEEE publishes the leading journals, transactions, letters, and magazines in electrical engineering, computing, biotechnology, telecommunications, power and energy, and dozens of other technologies. All of these publications are available electronically through the IEEE Xplore digital library.

Read more..

Your rating: None Average: 4 (3 votes)


PC World - September 2009 Read more..

Your rating: None Average: 3.5 (2 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

Be Human first, then Engineer

— Vismaya

Explore Tags

Follow Us