نوشته‌ها

Hacking For Dummies

Hacking For Dummies

welcome to Hacking For Dummies, 5th Edition

This book outlines in plain English computer hacker tricks and techniques that you can use to assess the security of your information systems, find the vulnerabilities that matter, and fix the weaknesses before criminal hackers and malicious insiders take advantage of them This hacking is the professionala boveboard, and legal type of security testing which I often refer to as ethical hacking throughout the book,

سرفصل ها:

Part I: Building the Foundation for Security Testing

Chapter 1: Introduction to Ethical Hacking

Chapter 2: Cracking the Hacker Mindset

Chapter 3: Developing Your Ethical Hacking Plan

Chapter 4: Hacking Methodology

Part II: Putting Security Testing in Motion

Chapter 5: Information Gathering

Chapter 6: Social Engineering

Chapter 7: Physical Security

Chapter 8: Passwords

Part III: Hacking Network Hosts

Chapter 9: Network Infrastructure Systems

Chapter 10: Wireless Networks

Chapter 11: Mobile Devices

Part IV: Hacking Operating Systems

Chapter 12: Windows

Chapter 13: Linux

Part V: Hacking Applications

Chapter 14: Communication and Messaging Systems

Chapter 15: Web Applications and Mobile Apps

Chapter 16: Databases and Storage Systems

Part VI: Security Testing Aftermath

Chapter 17: Reporting Your Results

Chapter 18: Plugging Security Holes

Chapter 19: Managing Security Processes

Part VII: The Part of Tens

Chapter 20: Ten Tips for Getting Security Buy-In

Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test

Chapter 22: Ten Deadly Mistakes

مشخصات:

نویسنده:Kevin Beaver

ناشر:John Wiley & Sons

سال نشر:۲۰۱۷

تعداد صفحات:۴۱۰

 

دانلود رایگان کتاب

 

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

این کتاب شما را با درون دنیای امنیت سایبری آشنا می کند و به شما نشان می دهد که در پشت صحنه چه می گذرد و مردان و زنانی را که در این راه پیشرو هستند را معرفی می کند.

سرفصل ها:

CH 1 What Type of Hacker Are You

CH 2 How Hackers Hack

CH 3 Profile: Bruce Schneier

CH 4 Social Engineering

CH 5 Profile: Kevin Mitnick

CH 6 Software Vulnerabilities

CH 7 Profile: Michael Howard

CH 8 Profile: Gary McGraw

CH 9 Malware

CH 10 Profile: Susan Bradley

CH 11 Profile: Mark Russinovich

CH 12 Cryptography

CH 13 Profile: Martin Hellman

CH 14 Intrusion Detection/APTs

CH 15 Profile: Dr. Dorothy E. Denning

CH 16 Profile: Michael Dubinsky

CH 17 Firewalls

CH 18 Profile: William Cheswick

CH 19 Honeypots

CH 20 Profile: Lance Spitzner

CH 21 Password Hacking

CH 22 Profile: Dr. Cormac Herley

CH 23 Wireless Hacking

CH 24 Profile: Thomas d’Otreppe de Bouvette

CH 25 Penetration Testing

CH 26 Profile: Aaron Higbee

CH 27 Profile: Benild Joseph

CH 28 DDoS Attacks

CH 29 Profile: Brian Krebs

CH 30 Secure OS

CH 31 Profile: Joanna Rutkowska

CH 32 Profile: Aaron Margosis

CH 33 Network Attacks

CH 34 Profile: Laura Chappell

CH 35 IoT Hacking

CH 36 Profile: Dr. Charlie Miller

CH 37 Policy and Strategy 201

CH 38 Profile: Jing de Jong-Chen 205

CH 39 Threat Modeling

CH 40 Profile: Adam Shostack

CH 41 Computer Security Education

CH 42 Profile: Stephen Northcutt

CH 43 Privacy

CH 44 Profile: Eva Galperin

CH 45 Patching

CH 46 Profile: Window Snyder

CH 47 Writing as a Career

CH 48 Profile: Fahmida Y. Rashid

CH 49 Guide for Parents with Young Hackers

CH 50 Hacker Code of Ethics

مشخصات:

نویسنده:Roger A. Grimes

ناشر: Wiley

سال نشر: ۲۰۱۷

تعداد صفحات: ۲۷۸

دانلود رایگان کتاب

Managing Risk and Information Security

Managing Risk and Information Security

در این کتاب یا مدیریت ریسک و امنیت اطلاعات در کسب و کار آشنا می شوید. امروزه با گسترش کسب و کارهای اینترنتی و گسترش آن در فضای مجازی و اینترنت این کتاب سعی دارد در ابتدا درک نادرستی که از ریسک دارید به شما نشان دهد و سپس معماری های جدیدی برای ایجاد و بهبود امنیت اطلاعات کسب و کارتان را به شما می آموزد.

سرفصل ها:

Chapter 1: Introduction

Chapter 2: The Misperception of Risk

Chapter 3: Governance and Internal Partnerships

Chapter 4: External Partnerships: The Power of Sharing

Chapter 5: People Are the Perimeter

Chapter 6: Emerging Threats and Vulnerabilities

Chapter 7: A New Security Architecture to Improve

Chapter 8: Looking to the Future: Emerging

Chapter 9: Corporate Social Responsibility

Chapter 10: The 21st Century CISO

Chapter 11: Performance Coaching

مشخصات:

نام نویسنده: Makcolm W. Harkins

ناشر: ApressOpen

سال نشر: ۲۰۱۶

تعداد صفحات: ۲۰۸

دانلود رایگان کتاب