Internet Security Book Recommendations
What is penetration testing? What is the strategic approach to learning penetration testing? What are the specific ways to learn penetration testing? How to solve various problems encountered? 1. Do you need to learn programming for penetration? 2. What is the thinking of penetration testing? 3. Who do you ask if you have any questions? How to ask? 4. The problem of penetration tools. 5. Questions about infiltration of actual combat. 6. How much do you need to learn to go to work... Come to us to give you the answer!
8个产品
-
White Hat on Web Security [Commemorative Edition]
10.00 USDAlibaba group chief technology officer of former President ali cloud jian wang | no founder David feng science and technology | | know UCloud founder JiXin China gen yu founder zhao | small cloud platform, founder of the party's | taobao core technology experts Lin hao joint the testimonials -
Hacker Secrets Practical guide to penetration testing
8.00 USDExcellent reputation on the market penetration test books, in the field of test books in the United States ranked the first, the reader's good reviews, sales second kill all other similar penetration test books.
The tactics of penetration testing, described in rugby lingo, are as follows.
Preparation - Installation: This chapter describes how to set up the lab, attack host, and tools used throughout the book.
Before serving - Scan the network: Before carrying out various operations, you need to carefully check the environment and understand the situation. We will take you to discover and intelligently scan the target system.
Dribbling - Exploit: Infiltrate the target system based on the vulnerabilities found in Chapter 2. In this chapter, we need manual practices to penetrate the target system.
Toss - Manual detection techniques for Web applications: Sometimes you need to get creative when finding targets that are publicly available on the Internet. We'll delve into how to manually search and attack web applications.
Cross transmission - Penetration of the Intranet: After a system has been breached, various methods for horizontal penetration of the network will be discussed.
Assists -- Social Engineering: Deceiving opponents through play. This chapter will explain some social engineering strategies.
Short Pass - Physical Access Attack: A good short pass requires a short distance. In this section, physical attack methods are introduced.
Quarterback Break - Evade antivirus detection: The quarterback break is ideal when only a few yards away. Sometimes you cannot escape the anti-virus software. This chapter describes how to avoid the anti-virus software and overcome the above obstacles.
Secret Service Groups - Cracking, Exploiting and Techniques: Cracking codes, exploiting vulnerabilities, Nethunters and some techniques.
Two-minute drill - Go from Zero to Hero: You only have two minutes to go from no access rights to very high domain administrator rights.
Post-match -- Analysis report: Write the penetration test report and report the results.
Continuing education: Share with your readers some of the things you need to do to improve penetration testing. -
Red and blue attack and defense: Building a real combat network security defense system
9.00 USDThis is a book from the perspective of the red team, the blue team, the purple team to comprehensively explain how to carry out the red and blue attack and defense practice, is a summary of the experience of the Qi 'an principal service team for many years in the service of various large government and enterprise organizations. -
Web security Attack and defense
10.00 USDSuitable audience: This book is suitable for enterprise security personnel, research and development personnel, ordinary colleges and universities network security discipline teaching and reference books, and as a network security enthusiasts self-study book. -
Linux Programming
8.00 USDThis book describes the development of programs on Linux and other UNIX-style operating systems, mainly including the standard Linux C language library and the use of various tools by different Linux or UNIX standards, the use of most of the standard Linux development tools, Through DBM and MySQL data store Linux data, for X window system to establish a graphical user interface. This book helps the reader grasp the relevant knowledge by first introducing the theory of programming and then clarifying it with appropriate examples and clear explanations. This book is suitable for beginners of Linux and those who want to use Linu line development programs, and it is also suitable as a reference for teachers and students of computer related majors in universities. -
Kali Linux Wireless penetration
6.00 USDWireless network is ubiquitous in our life and wireless penetration testing has become an important skill for security practitioners. And with the advent of a KRACK attack, which can be used by an attacker to breach a WiFi network that uses WPA2 encryption, wireless penetration testing is once again in the spotlight. Kali Linux comes with a number of tools for detecting security vulnerabilities and can be used to perform a variety of network testing tasks.
The book provides a comprehensive update to the emerging methodologies, covering the principles of a KRACK attack and the methods to defend against it. This book explains the knowledge of wireless penetration testing from the ground up, introduces all the relevant content of each penetration testing technology, and demonstrates the methodology of wireless testing with a large number of cases. The reader will learn the basics of wireless routing and encryption, as well as the details of various cracking methods and attacks such as Hirte and Caffe Latted. -
Hacker attack and defense from entry to mastery
10.00 USD"Hacker Attack and Defense from entry to mastery (Encryption and Decryption)" covers from the introduction of computer hacking attack and defense, to professional Web technology security knowledge, suitable for all levels of readers with different foundations.