Category: Security & Encryption

Black Hat Bash: Creative Scripting for Hackers and Pentesters 0

Black Hat Bash: Creative Scripting for Hackers and Pentesters

eBook Details: Paperback: 344 pages Publisher: WOW! eBook (October 1, 2024) Language: English ISBN-10: 1718503741 ISBN-13: 978-1718503748 eBook Description: Black Hat Bash: Creative Scripting for Hackers and Pentesters. Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more! In the hands of the penetration tester, bash scripting becomes a powerful offensive security tool. In Black Hat Bash: Creative Scripting for Hackers and Pentesters, you’ll learn how to use bash to automate tasks, develop custom tools, uncover vulnerabilities, and execute advanced, living-off-the-land attacks against Linux servers. You’ll build a toolbox...

Evasive Malware: Understanding Deceptive and Self-Defending Threats 0

Evasive Malware: Understanding Deceptive and Self-Defending Threats

eBook Details: Paperback: 488 pages Publisher: WOW! eBook (September 10, 2024) Language: English ISBN-10: 1718503261 ISBN-13: 978-1718503267 eBook Description: Evasive Malware: Understanding Deceptive and Self-Defending Threats Get up to speed on state-of-the-art malware with this Evasive Malware: Understanding Deceptive and Self-Defending Threats first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools. We’re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and analysis. Because advanced threats like these can adapt and, in some cases, self-destruct to evade detection, even the most seasoned investigators can use...

Acing the CCNA Exam, Volume 1: Fundamentals and Protocols 0

Acing the CCNA Exam, Volume 1

eBook Details: Paperback: 608 pages Publisher: WOW! eBook (August 13, 2024) Language: English ISBN-10: 1633437671 ISBN-13: 978-1633437678 eBook Description: Acing the CCNA Exam, Volume 1: Fundamentals and Protocols: Master the core fundamentals and protocols covered in the Cisco Certified Network Associate (CCNA) exam! Acing the CCNA Exam, Volume 1: Fundamentals and Protocols helps you prepare for the CCNA exam by learning vital skills like: How to study for the CCNA IP routing, addressing, and subnetting VLANs, trunking protocols, and EtherChannel Static and dynamic routing protocols (OSPF) Passing the CCNA is the perfect way to kickstart or advance your career in IT, networking,...

Decentralized Identity Explained 0

Decentralized Identity Explained

eBook Details: Paperback: 392 pages Publisher: WOW! eBook (July 19, 2024) Language: English ISBN-10: 1804617636 ISBN-13: 978-1804617632 eBook Description: Decentralized Identity Explained: Embrace decentralization for a more secure and empowering digital experience. Delve into the cutting-edge trends of decentralized identities, blockchains, and other digital identity management technologies and leverage them to craft seamless digital experiences for both your customers and employees. Looking forward to mastering digital identity? This Decentralized Identity Explained book will help you get to grips with complete frameworks, tools, and strategies for safeguarding personal data, securing online transactions, and ensuring trust in digital interactions in today’s cybersecurity landscape. Decentralized Identity...

Cryptography: Algorithms, Protocols, and Standards for Computer Security 0

Cryptography: Algorithms, Protocols, and Standards for Computer Security

eBook Details: Paperback: 624 pages Publisher: WOW! eBook (March 26, 2024) Language: English ISBN-10: 1394207484 ISBN-13: 978-1394207480 eBook Description: Cryptography: Algorithms, Protocols, and Standards for Computer Security: An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by...