Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity 261468

Код товару: 261468Паперова книга
Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then with step-by-step instructions you’ll expand your understanding of offline hacking, external safety checks, penetration testing in networks, and other essential security techniques, including steps for mobile, cloud, and IoT security. Use this guide to ensure your system can withstand any threat!
  • Understand IT system vulnerabilities and identify attack vectors
  • Learn to secure multiple infrastructures, including Linux, Microsoft Windows, cloud, and mobile
  • Master pen testing with tools like Metaspolit, Kali Linux, hydra, Open-VAS, Empire, Pwnagotchi, and more
Key Concepts and Tools
Set up your environment with Metasploitable and Juice Shop, install Kali Linux, and explore hacking tools like nmap, hydra, and Armitage that will assist you with the more complex practices covered in later chapters.
Penetration Testing and Security Practices
From man-in-the-middle attacks to finding vulnerabilities using nmap, walk step-by-step through client-side and network penetration testing. Master key security techniques like passwords, IT forensics, and safety checks and see how to secure Windows servers, Linux, Samba file servers, and web applications.
Advanced Security Concepts
Supplement your understanding of security concepts with practical instruction and theoretical information on more advanced topics like cloud, mobile, and Internet of Things security. Learn how to secure Office 365 through multi-level authentication and conditional access, explore protective measures for Android and iOS, and determine IoT protocols and services.
About the Author
Michael Kofler is a renowned author of German IT publications. He works as an administrator and software developer, and is also a lecturer at a technical college. Michael is the driving force behind Hacking & Security, having written a number of its chapters, recruited its author team, designed the book, and supervised its writing as editor.
Klaus Gebeshuber is the professor of IT security at FH JOANNEUM, University of Applied Sciences in Kapfenberg, Austria. His focus is on network security, industrial security, security analysis, and penetration testing. He holds numerous industry certificates in the field of IT security, network security, and penetration testing.
Peter Kloep is an expert of secure Microsoft Windows infrastructures in German-speaking countries. He has been a Microsoft Certified Trainer since 2002 and has held numerous technical training courses on Windows administration since then. He is also a Microsoft Certified Software Engineer and Microsoft Certified Solutions Master - Windows Server 2012.
Frank Neugebauer worked in IT security for more than 25 years as an officer in the German Armed Forces. He was also employed as an IT security officer for various departments in Germany and abroad, a systems engineer at a NATO headquarters, and head of an incident response team. As a member of the German Armed Forces' Computer Emergency Response Team, he played a key role in analyzing vulnerabilities in many German Armed Forces networks.
Andre Zingsheim works as a senior security consultant at TUV TRUST IT GmbH. In addition to technical security analyzes and penetration tests of IT systems and infrastructures, he deals intensively with the security of mobile devices. He is a penetration tester certified by the Bundesamt fur Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security).
Thomas Hackner is senior security consultant and managing director of HACKNER Security Intelligence GmbH, which he founded in 2010 after studying secure information systems in Hagenberg, Upper Austria. He also works on international projects in which both IT networks and web applications as well as SCADA systems are checked for security in the form of penetration tests.
Markus Widl has been working as a consultant, developer, and trainer in IT for more than 20 years. His focus is on cloud technologies such as MS Office 365 and Microsoft Azure.
Roland Aigner is an expert in secure IoT infrastructures. He developed firmware and software for medical in-vitro diagnostics, is a co-author of the Bluetooth SIG, and a founding member of the NFC Forum, where he was specifically responsible for ticketing and communication security.
Stefan Kania has been a freelance consultant and trainer since 1997. His focus is on the secure implementation of Samba and LDAP as well as training on both topics.
Tobias Scheible is a research associate at Albstadt-Sigmaringen University. There he works as a lecturer in the university certificate program at the Institut fur wissenschaftliche Weiterbildung (IWW) (Institute for Scientific Continuing Education) and holds extra-occupational modules in the areas of network security, Internet technologies, and IT forensics. In addition, he holds lectures and workshops for associations and companies, including open events for the VDI.
Matthias Wubbeling is an IT security enthusiast, scientist, author, entrepreneur, consultant, and speaker. As an academic advisor at the University of Bonn and a scientist at Fraunhofer FKIE, he researches and teaches in the areas of network security, IT security awareness, and identity theft.
2'700 ₴
Купити
Monobank
до 10 платежей
от 303 ₴ / міс.
  • Нова Пошта
    Безкоштовно від 3'000,00 ₴
  • Укрпошта
    Безкоштовно від 1'000,00 ₴
  • Meest Пошта
    Безкоштовно від 3'000,00 ₴
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity - фото 1
Інші книги Rheinwerk Computing
Spring Boot 3 and Spring Framework 6 First Edition
263354
Christian Ullenboom
2'900 ₴
Python 3: The Comprehensive Guide to Hands-On Python Programming
263355
Johannes ErnestiPeter Kaiser
2'590 ₴
React: The Comprehensive Guide
263491
Sebastian Springer
2'700 ₴
Git: Project Management for Developers and DevOps
263488
Bernd OgglMichael Kofler
2'100 ₴
Docker: Practical Guide for Developers and Devops Teams
263487
Bernd OgglMichael Kofler
2'400 ₴
HTML and CSS: The Comprehensive Guide
263486
Jurgen Wolf
2'200 ₴

Характеристики

Від видавця

Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then with step-by-step instructions you’ll expand your understanding of offline hacking, external safety checks, penetration testing in networks, and other essential security techniques, including steps for mobile, cloud, and IoT security. Use this guide to ensure your system can withstand any threat!
  • Understand IT system vulnerabilities and identify attack vectors
  • Learn to secure multiple infrastructures, including Linux, Microsoft Windows, cloud, and mobile
  • Master pen testing with tools like Metaspolit, Kali Linux, hydra, Open-VAS, Empire, Pwnagotchi, and more
Key Concepts and Tools
Set up your environment with Metasploitable and Juice Shop, install Kali Linux, and explore hacking tools like nmap, hydra, and Armitage that will assist you with the more complex practices covered in later chapters.
Penetration Testing and Security Practices
From man-in-the-middle attacks to finding vulnerabilities using nmap, walk step-by-step through client-side and network penetration testing. Master key security techniques like passwords, IT forensics, and safety checks and see how to secure Windows servers, Linux, Samba file servers, and web applications.
Advanced Security Concepts
Supplement your understanding of security concepts with practical instruction and theoretical information on more advanced topics like cloud, mobile, and Internet of Things security. Learn how to secure Office 365 through multi-level authentication and conditional access, explore protective measures for Android and iOS, and determine IoT protocols and services.
About the Author
Michael Kofler is a renowned author of German IT publications. He works as an administrator and software developer, and is also a lecturer at a technical college. Michael is the driving force behind Hacking & Security, having written a number of its chapters, recruited its author team, designed the book, and supervised its writing as editor.
Klaus Gebeshuber is the professor of IT security at FH JOANNEUM, University of Applied Sciences in Kapfenberg, Austria. His focus is on network security, industrial security, security analysis, and penetration testing. He holds numerous industry certificates in the field of IT security, network security, and penetration testing.
Peter Kloep is an expert of secure Microsoft Windows infrastructures in German-speaking countries. He has been a Microsoft Certified Trainer since 2002 and has held numerous technical training courses on Windows administration since then. He is also a Microsoft Certified Software Engineer and Microsoft Certified Solutions Master - Windows Server 2012.
Frank Neugebauer worked in IT security for more than 25 years as an officer in the German Armed Forces. He was also employed as an IT security officer for various departments in Germany and abroad, a systems engineer at a NATO headquarters, and head of an incident response team. As a member of the German Armed Forces' Computer Emergency Response Team, he played a key role in analyzing vulnerabilities in many German Armed Forces networks.
Andre Zingsheim works as a senior security consultant at TUV TRUST IT GmbH. In addition to technical security analyzes and penetration tests of IT systems and infrastructures, he deals intensively with the security of mobile devices. He is a penetration tester certified by the Bundesamt fur Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security).
Thomas Hackner is senior security consultant and managing director of HACKNER Security Intelligence GmbH, which he founded in 2010 after studying secure information systems in Hagenberg, Upper Austria. He also works on international projects in which both IT networks and web applications as well as SCADA systems are checked for security in the form of penetration tests.
Markus Widl has been working as a consultant, developer, and trainer in IT for more than 20 years. His focus is on cloud technologies such as MS Office 365 and Microsoft Azure.
Roland Aigner is an expert in secure IoT infrastructures. He developed firmware and software for medical in-vitro diagnostics, is a co-author of the Bluetooth SIG, and a founding member of the NFC Forum, where he was specifically responsible for ticketing and communication security.
Stefan Kania has been a freelance consultant and trainer since 1997. His focus is on the secure implementation of Samba and LDAP as well as training on both topics.
Tobias Scheible is a research associate at Albstadt-Sigmaringen University. There he works as a lecturer in the university certificate program at the Institut fur wissenschaftliche Weiterbildung (IWW) (Institute for Scientific Continuing Education) and holds extra-occupational modules in the areas of network security, Internet technologies, and IT forensics. In addition, he holds lectures and workshops for associations and companies, including open events for the VDI.
Matthias Wubbeling is an IT security enthusiast, scientist, author, entrepreneur, consultant, and speaker. As an academic advisor at the University of Bonn and a scientist at Fraunhofer FKIE, he researches and teaches in the areas of network security, IT security awareness, and identity theft.

Відгуки про Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity

Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
2'700 ₴
Купити
Персонально для вас
Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed.
244753
Andrew Martin, Michael Hausenblas
2'100 ₴
Metasploit, 2nd Edition
283887
Dave KennedyJim O'GormanDevon KearnsMati AharoniDr. Daniel G. Graham
2'100 ₴
Data Engineering for Cybersecurity
303122
James Bonifield
2'100 ₴
Windows Forensics: Understand Analysis Techniques for Your Windows First Edition
306388
Chuck EasttomWilliam ButlerJessica PhelanRamya Sai BhagavatulaSean SteuberKarely RodriguezVictoria Indy BalkissoonZehra Naseer
2'200 ₴
Security in Computing, 6th Edition
286459
Pfleeger CharlesPfleeger Shari LawrenceColes-Kemp Lizzie
2'300 ₴
Data Science: The Hard Parts: Techniques for Excelling at Data Science 1st Edition
264541
Daniel Vaughan
1'700 ₴
Mastering Julia - Second Edition: Enhance your analytical and programming skills for data modeling and processing with Julia 2nd ed. Edition
286416
Malcolm Sherrington
1'880 ₴
Cloud Native Go: Building Reliable Services in Unreliable Environments
152827
Matthew A. Titmus
2'000 ₴
object-oriented software construction 2nd edition
14348
Bertrand Meyer
2'500 ₴
Mastering Ethereum: Smart Building Contracts and Dapps 1st Edition
67017
Andreas M. Antonopoulos
3'291 ₴
Augmented Analytics: Enabling Analytics Transformation for Data-Informed Decisions 1st Edition
276273
Willi WeberTobias Zwingmann
2'400 ₴1'920 ₴
Beginning C: From Beginner to Pro 7th ed. Edition
270251
Ivor HortonGerman Gonzalez-Morris
2'400 ₴
Certified Kubernetes Administrator (CKA) Study Guide: In-Depth Guidance and Practice 1st Edition
274262
Benjamin Muschko
1'700 ₴
NGINX Cookbook: Advanced Recipes for High-Performance Load Balancing 3rd Edition
273861
Derek DeJonghe
1'700 ₴