Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Network Security

Buy
Applied Network Security, 9781786466273 (1786466279), Packt Publishing, 2017

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi passwords, penetrating anti-virus networks, sniffing the network, and USB hacks
  • This step-by-step guide shows you how to confidently and quickly detect vulnerabilities for your network before the hacker does

Who This Book Is For

This book is for network security professionals, cyber security professionals, and Pentesters who are well versed with fundamentals of network security and now want to master it. So whether you're a cyber security professional, hobbyist, business manager, or student aspiring to becoming an ethical hacker or just want to learn more about the cyber security aspect of the IT industry, then this book is definitely for you.

What You Will Learn

  • Use SET to clone webpages including the login page
  • Understand the concept of Wi-Fi cracking and use PCAP file to obtain passwords
  • Attack using a USB as payload injector
  • Familiarize yourself with the process of trojan attacks
  • Use Shodan to identify honeypots, rogue access points, vulnerable webcams, and other exploits found in the database
  • Explore various tools for wireless penetration testing and auditing
  • Create an evil twin to intercept network traffic
  • Identify human patterns in networks attacks

In Detail

Computer networks are increasing at an exponential rate and the most

(HTML tags aren't allowed.)

Manual of Obstetrics (Spiral Manual Series)
Manual of Obstetrics (Spiral Manual Series)
The seventh edition of the Manual of Obstetrics is the first without the authorship and editorial guidance of Dr. Ken Niswander. It was Dr. Niswander who created the Manual of Obstetrics in 1980 and served as the sole editor for the first three editions. For the fourth edition,...
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown...

Everyday Cryptography: Fundamental Principles and Applications
Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the...


A History of Plastic Surgery
A History of Plastic Surgery

This book covers the history of plastic surgery from the remarkable achievements of such ancient civilizations as India and Egypt up to the revolutionary techniques developed at the end of the Middle Age, the Renaissance and beyond. Coverage details how the knowledge of wound healing has changed and influenced plastic surgery, describes the...

Zabbix Network Monitoring Essentials
Zabbix Network Monitoring Essentials

Your one-stop solution to efficient network monitoring with Zabbix

About This Book

  • Effectively monitor a number of network devices based on network security and segments
  • Adapt your monitoring solution to an array of evolving network scenarios using Zabbix discovery features
  • ...
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy