eBooks-it.org Logo
eBooks-IT.org Inner Image

Syngress eBooks

Download free Syngress eBooks

Professional Penetration Testing

Creating and Operating a Formal Hacking Lab
Professional Penetration Testing Image
Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price! Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers, digital piracy groups, and countless other organized or individual malicious hackers. The material presented will b...

The Basics of Hacking and Penetration Testing

Ethical Hacking and Penetration Testing Made Easy
The Basics of Hacking and Penetration Testing Image
2nd Edition
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET) , w3af, Netcat, post exploitation tactics, the Hacker Defender rootkit, and more. The book provides a simple and clean explanatio...

Violent Python

A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python Image
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. - Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, ...

SSCP Study Guide

Systems Security Certification Practitioner
SSCP Study Guide Image
The SSCP Study Guide and DVD Training System is a unique and comprehensive combination of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation. These components will give the student 100% coverage of all (ISC) official exam objectives and realistic exam simulation.The SSCP Study Guide and DVD Training System consists of:1. SSCP Study Guide The 1,000,000 readers who have read previous Syngress Study Guides will find many familiar features in the Study Guide along with many new enhancements including: Exercises: There will be frequent use of step-by-step exercises with many screen captures and line drawings. Exercises will be presented in sidebar-like style, and will run 1 to 2 pages. Anatomy of a Question: Question...

iPhone and iOS Forensics

Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics Image
As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at the core hardware and software components of an iPhone, file systems and data structures, data security considerations, and a detailed review of forensic acquisition techniques and strategies for the subsequent analysis required. A heavy emphasis on open source tools and step-by-step examples are a primary focus of this book....


2007 - 2017 © eBooks-IT.org