Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker’s Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered…

Read More

Google Hacking for Penetration Testers, Third Edition

Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and “self-police” their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can…

Read More

Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies–and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn’t just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information. Driven by a powerful urge to accomplish the impossible, Mitnick bypassed…

Read More

Exam Ref 70-410 Installing and Configuring Windows Server 2012 R2 (MCSA)

Fully updated for Windows Server 2012 R2! Prepare for Microsoft Exam 70-410 – and help demonstrate your real-world mastery of implementing and configuring core services in Windows Server 2012 R2. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Install and configure servers Configure server roles and features Configure Hyper-V Deploy and configure core network services Install and administer Active Directory Create and…

Read More

Exam 98-365 MTA Windows Server Administration Fundamentals

Students who are beginning studies in technology need a strong foundation in the basics before moving on to more advanced technology courses and certification programs.   The Microsoft Technology Associate (MTA) is a new and innovative certification track designed to provide a pathway for future success in technology courses and careers. The MTA program curriculum helps instructors teach and validate fundamental technology concepts and provides students with a foundation for their careers as well as the confidence they need to succeed in advanced studies. Through the use of MOAC MTA titles…

Read More

Delivering Business Intelligence with Microsoft SQL Server 2012 3/E

Implement a Robust BI Solution with Microsoft SQL Server 2012 Equip your organization for informed, timely decision making using the expert tips and best practices in this practical guide. Delivering Business Intelligence with Microsoft SQL Server 2012, Third Edition explains how to effectively develop, customize, and distribute meaningful information to users enterprise-wide. Learn how to build data marts and create BI Semantic Models, work with the MDX and DAX languages, and share insights using Microsoft client tools. Data mining and forecasting are also covered in this comprehensive resource. Understand the…

Read More

Circus Maximus: The Economic Gamble Behind Hosting the Olympics and the World Cup

The numbers are staggering: China spent $40 billion to host the 2008 Summer Olympic Games in Beijing and Russia spent $50 billion for the 2014 Sochi Winter Games. Brazil’s total expenditures are thought to have been as much as $20 billion for the World Cup this summer and Qatar, which will be the site of the 2022 World Cup, is estimating that it will spend $200 billion. How did we get here? And is it worth it? Those are among the questions noted sports economist Andrew Zimbalist answers in Circus…

Read More

Blogging for Beginners: Learn How to Start and Maintain a Successful Blog the Simple Way (Blogging Strategies) (Volume 1)

Blogging for BeginnersLearn How to Start and Maintain a Successful Blog the Simple Way! In recent years, ‘Blogging’ has become one of the most widely used words on the internet and in books. In this book, we will explore many facets of blogging which will help to kick-start your goal of becoming a success story in blogging or at least familiarize yourself with this new internet craze. This is an ultimate beginner’s guide to blogging because it starts where other books never start. In this book, I do not make…

Read More

Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You’ll learn how to: Create a trojan command-and-control using GitHub Detect sandboxing and automate common malware tasks, like keylogging and screenshotting Escalate Windows privileges with creative process…

Read More