Explore the latest books of this year!
Bookbot

Jason Andress

    Podstawy bezpieczeństwa informacji Praktyczne wprowadzenie
    The Basics of Information Security
    Ninja Hacking
    Cyber Warfare
    Foundations of Information Security
    Coding for Penetration Testers
    • 2019

      Foundations of Information Security

      • 380 pages
      • 14 hours of reading
      4.1(101)Add rating

      High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications.You'll also learn the basics of topics A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.

      Foundations of Information Security
    • 2014

      The Basics of Information Security

      • 240 pages
      • 9 hours of reading

      "The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We will then dive into practical applications of these ideas in the areas of operations, physical, network, operating system, and application security. Book Audience This book will provide a valuable resource to beginning security professionals, as well as to network and systems administrators. The information provided on can be used develop a better understanding on how we protect our information assets and defend against attacks, as well as how to apply these concepts practically"--

      The Basics of Information Security
    • 2013

      Cyber Warfare

      • 324 pages
      • 12 hours of reading
      3.8(17)Add rating

      Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks.

      Cyber Warfare
    • 2011

      Coding for Penetration Testers

      • 336 pages
      • 12 hours of reading

      Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. "Coding for Penetration Testers" provides you with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides you through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, you are guided through real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated Second Edition focuses on an expanded discussion on the use of Powershell and includes practical updates to all tools and coverage. Discusses the use of various scripting languages in penetration testingPresents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languagesProvides a primer on scripting, including, but not limited to, Web scripting, scanner scripting, and exploitation scriptingIncludes all-new coverage of Powershell

      Coding for Penetration Testers
    • 2010

      Ninja Hacking

      Unconventional Penetration Testing Tactics and Techniques

      • 336 pages
      • 12 hours of reading

      Focusing on innovative security strategies, the book introduces a unique approach to penetration testing by adopting a "ninja" mindset. Readers will explore unconventional techniques that emphasize stealth, disguise, and espionage to gain faster access to a company's assets. It covers practical methods such as impersonating employees, evading alarm systems, identifying vulnerabilities, and utilizing spyware. By rethinking traditional pen testing methods, the author aims to equip security professionals with creative tools to outsmart potential hackers effectively.

      Ninja Hacking