|
|
Google Hacking for Penetration Testers, Volume 2A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google... | | Check Point NGX R65 Security AdministrationCheck Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all sizes to reduce the cost and complexity... | | |
|
Alternate Data Storage ForensicsDigital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital... | | The Best Damn Cybercrime and Forensics Book PeriodAs is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.
If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the... | | LEGO Mindstorms Masterpieces: Building Advanced RobotsIn LEGO Mindstorm Masterpieces, some of the world's leading LEGO Mindstorms inventors share their knowledge and development secrets. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will include detailed discussions of the mechanics that drive the robot - and... |
|
Netcat Power ToolsThe only book on Netcat, one of the world's most popular open source security tools, used by systems administrators and hackers alike.
Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable... | | | | |
|
Nmap in the Enterprise: Your Guide to Network ScanningRichard Stiennon, vice president at Gartner "Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."
A... | | | | |
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |