Lybrary.com: ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Law / Forensic Science

Conducting Network Penetration and Espionage in a Global Environment

$59.95
| £48.99 | €56.73 | Ca$81.68 | Au$80.26
by Bruce Middleton
What is this?DRM-EPUB | by download   add to wish list
Conducting Network Penetration and Espionage in a Global Environment by Bruce Middleton

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.

The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.


SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 736408

Ebook Details
Pages: 599
Size: 96.5 MB
Publisher: CRC Press
Date published:   2014
ISBN: 9781498760294 (DRM-EPUB)

DRM Settings
Copying:not allowed
Printing:not allowed
Read Aloud:  not allowed

This product is listed in the following categories:

Nonfiction > Political Science > Political Freedom & Security > International Security
Nonfiction > Computers > Security
Nonfiction > Law > Forensic Science

This author has products in the following categories:

Nonfiction > Technology
Nonfiction > Political Science > Political Freedom & Security > International Security
Nonfiction > Computers > Security
Nonfiction > Law > Forensic Science

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

03/27/2017
© 2017 Lybrary.com