حوزه هک و امنیت | hack & security
کتاب رمزنگاری و امنیت شبکه استالینگز یک بررسی عملی از رمزنگاری و امنیت شبکه با پشتیبانی بی نظیر برای مدرسان و دانشجویان فراهم می کند. و می تواند برای متخصصین امنیت، دانشجویان و اساتید رشته های کامپیوتر، فناوری اطلاعات و الکترونیک و کسانی که می خواهند در حوزه ی امنیت شبکه پژوهش کنند مفید باشد.
Chapter 0 Reader’s Guide
Chapter 1 Overview
Chapter 2 Classical Encryption Techniques
Chapter 3 Block Ciphers and the Data Encryption Standard
Chapter 4 Basic Concepts in Number Theory and Finite Fields
Chapter 5 Advanced Encryption Standard
Chapter 6 Block Cipher Operation
Chapter 7 Pseudorandom Number Generation and Stream Ciphers
Chapter 8 More Number Theory
Chapter 9 Public-Key Cryptography and RSA
Chapter 10 Other Public-Key Cryptosystems
Chapter 11 Cryptographic Hash Functions
Chapter 12 Message Authentication Codes
Chapter 13 Digital Signatures
Chapter 14 Key Management and Distribution
Chapter 15 User Authentication Protocols
Chapter 16 Transport-Level Security
Chapter 17 Wireless Network Security
Chapter 18 Electronic Mail Security
Chapter 19 IP Security
نویسنده: William Stallings
سال نشر: ۲۰۱۰
تعداد صفحات: ۷۴۴
Protect yourself, and your Bitcoins from hackers, by learning their methods.
This book is going to share with you some of the ways that hackers can get your Bitcoins, and do with them as they please. All without a trace of evidence landing back to them.
This is all too real. And it goes on daily, as we speak.
If you are invested in Bitcoin, or any type of investment, crypto, or not. You should read this short, to the point book.
The patterns of hackers is clear to see, once you know what they do.
Protect your investments against all hacking, and data theft.
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it’s easy to write quickly, and it has the low-level support and libraries that make hackers happy.
But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.
Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools – and how to build your own when the pre-built ones won’t cut it.
You’ll learn how to:
Automate tedious reversing and security tasks
Design and program your own debugger
Learn how to fuzz Windows drivers and create powerful fuzzers from scratch
Have fun with code and library injection, soft and hard hooking techniques, and other software trickery
Sniff secure traffic out of an encrypted web browser session
Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more
This book includes three different computer technology books in 1:
Hacking: Become a World Class Hacker, Hack Any Password, Program Or System With Proven Strategies and Tricks
Cyber Security: Understand Hacking and Protect Yourself and Your Organization From Ever Getting Hacked
Python Programming: Fluent In Python – Code Examples, Tips & Trick for Beginners
Hacking, puzzles, and code breaking have always been something humans have been interested in. Even if we refer back to the famous enigma during world war two or back to the clues the ancient society left us, we love to engage in code breaking one way or the other.
Today, most of that code breaking involves computers and in large extent hacking. Hacking, cyber security, and programming have become a part of every organization and company.
With all the confidential information floating around the internet, a lot of criminals get into the hacking and cyber war as well.
Learning to hack your competitor and protect yourself have become one of the most important skill to protect your business today. By doing so you can focus on serving your customers and deliver to your clients, without fear of having your computer infrastructure shoot down.
This three book bundle including all three parts that will make you a great hacker!
As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security.
An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more.
Distribution neutral throughout, this edition is fully updated for today’s Linux kernels, and includes current code examples and support scripts for Red Hat/Fedora, Ubuntu, and Debian implementations. If you’re a Linux professional, it will help you establish an understanding of security for any Linux system, and for networks of all sizes, from home to enterprise.
Inside, you’ll find just what you need to
Install, configure, and update a Linux firewall running either iptables or nftables
Migrate to nftables, or take advantage of the latest iptables enhancements
Manage complex multiple firewall configurations
Create, debug, and optimize firewall rules
Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions
Harden systems against port scanning and other attacks
Uncover exploits such as rootkits and backdoors with chkrootkit
Take Control of Wi-Fi Networking and Security
Wi-Fi is nearing two decades old. It’s much easier to set up and use than in the past, but the intricacies of creating a robust home or small-office network that has solid and fast coverage everywhere you want it can remain a struggle.
This book is designed to offer guidance at every step of the way, and reduce your frustration with the terminology and arcana required to make decisions.
Because we all now use many different kinds of equipment on a modern Wi-Fi networks, I provide detailed, illustrated advice on connecting and configuring hardware running macOS, iOS, Android, Windows 10, and ChromeOS to work with various Wi-Fi features. After surveying popular Wi-Fi gateways, I provide advice compatible with nearly all hardware on the market.
If you’re trying to understand the difference between standard Wi-Fi networks and new mesh wireless networks, I go into great detail, and help you decide which may serve you better. I also provide information on how to plan a network and locate the Wi-Fi network devices that provide service to your various connected equipped, from computers to game systems to sous vide cookers.
This book will also help you set up and use personal hotspots, add printers and use networked drives, manage wireless security, and make sure your own data is secured when you use Wi-Fi on your own or other networks.
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects.
Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you’re in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.
- Learn about information security without wading through a huge textbook
- Covers both theoretical and practical aspects of information security
- Provides a broad view of the information security field in a concise manner
- All-new Second Edition updated for the latest information security trends and threats, including material on incident response, social engineering, security awareness, risk management, and legal/regulatory issues
مجموعه ی Ethical Hacking and Countermeasures از پنج کتاب تشکیل شده است که مباحث مربوط به امنیت شبکه، هک قانونمند و حفاظت از شبکه و اقدامات متقابل را پوشش می دهند. محتوای این مجموعه به گونه ای طراحی شده که خواننده را در یک محیط تعاملی فرو می برد و در آن چگونگی اسکن، تست، هک و سیستم های اطلاعاتی امن نشان داده خواهد شد.
با این مجموعه کتابها خواننده دانش لازم را کسب خواهد کرد و تجربه ی عملی با سیستم های امن اساسی حاصل می شود و برای موفقیت در آزمون Certified Ethical Hacker یا C|EH آماده می شود.
با بدست آوردن درک کامل از نحوه ی عمل هکرها، یک هکر قانونمند قادر به راه اندازی اقدامات متقابل قوی و سیستم های دفاعی برای حفاظت از زیرساخت های حیاتی سازمان و اطلاعات خواهد بود.
Chapter1: Linux Hacking
Chapter2: Macintosh Hacking
Chapter3: Hacking Routers, Cable Modems, and Firewalls
Chapter4: Hacking Mobile Phones, PDAs and Handheld Devices
Chapter5: Bluetooth Hacking
Chapter6: RFID Hacking
Chapter7: Hacking USB Devices
ناشر: Cengage Learning
سال نشر: ۲۰۰۹
تعداد صفحات: ۱۸۶
welcome to Hacking For Dummies, 5th Edition
This book outlines in plain English computer hacker tricks and techniques that you can use to assess the security of your information systems, find the vulnerabilities that matter, and fix the weaknesses before criminal hackers and malicious insiders take advantage of them This hacking is the professionala boveboard, and legal type of security testing which I often refer to as ethical hacking throughout the book,
Part I: Building the Foundation for Security Testing
Chapter 1: Introduction to Ethical Hacking
Chapter 2: Cracking the Hacker Mindset
Chapter 3: Developing Your Ethical Hacking Plan
Chapter 4: Hacking Methodology
Part II: Putting Security Testing in Motion
Chapter 5: Information Gathering
Chapter 6: Social Engineering
Chapter 7: Physical Security
Chapter 8: Passwords
Part III: Hacking Network Hosts
Chapter 9: Network Infrastructure Systems
Chapter 10: Wireless Networks
Chapter 11: Mobile Devices
Part IV: Hacking Operating Systems
Chapter 12: Windows
Chapter 13: Linux
Part V: Hacking Applications
Chapter 14: Communication and Messaging Systems
Chapter 15: Web Applications and Mobile Apps
Chapter 16: Databases and Storage Systems
Part VI: Security Testing Aftermath
Chapter 17: Reporting Your Results
Chapter 18: Plugging Security Holes
Chapter 19: Managing Security Processes
Part VII: The Part of Tens
Chapter 20: Ten Tips for Getting Security Buy-In
Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test
Chapter 22: Ten Deadly Mistakes
ناشر:John Wiley & Sons