• CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide

    Pass the First Time.The CompTIA Security+ Get Certified Get Ahead SY0-501 Study Guide is an update to the top-selling SY0-201, SY0-301, and SY0-401 study guides, which have helped thousands of readers pass the exam the first time they took it. It covers all of the SY0-501 objectives and includes the same elements readers raved about in the previous two versions. Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he’s honed in the classroom t... [Read More]

    • ASIN: 1939136059
    • ASIN: 1939136059
    • ISBN: 1939136059
    • Brand: YCDA, LLC
    • Manufacturer: YCDA, LLC

  • CompTIA A+ Certification All-in-One Exam Guide, Tenth Edition (Exams 220-1001 & 220-1002)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This bestselling on-the-job reference and test preparation guide has been fully revised for the new 2019 CompTIA Core 1 and Core 2 CompTIA A+ exam objectivesThis fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1001 & 220-1002. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations... [Read More]

    • ASIN: 1260454037
    • ASIN: 1260454037
    • ISBN: 1260454037
    • Manufacturer: McGraw-Hill Education

  • Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali

    This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll ... [Read More]

    • ASIN: 1593278551
    • ASIN: 1593278551
    • ISBN: 1593278551
    • Manufacturer: No Starch Press

  • Basic Security Testing with Kali Linux 2

    Basic Security Testing with Kali Linux 2 Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do. In Basic Security Testing with Kali Linux 2, you will learn basic examples of how hackers find out information about your company, find weaknesses in your security and how they gain access to your system. Completely updated for 2016, this step-by-step guide covers: Kali Linux Introduction and Overview Shodan (the “Hacker’s Google”) Metasploit Tutorials Explo... [Read More]

    • ASIN: 1530506565
    • ASIN: 1530506565
    • ISBN: 1530506565
    • Brand: Dieterle Daniel W
    • Manufacturer: CreateSpace Independent Publishing Platform

  • Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

    With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests ... [Read More]

    • ASIN: 149202869X
    • ASIN: 149202869X
    • ISBN: 9781492028697
    • Manufacturer: O'Reilly Media

  • The Linux Command Line, 2nd Edition: A Complete Introduction

    You've experienced the shiny, point-and-click surface of your Linux computer--now dive below and explore its depths with the power of the command line.The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more.In addition to that practical knowledge, author William Shotts reve... [Read More]

    • ASIN: 1593279523
    • ASIN: 1593279523
    • ISBN: 1593279523
    • Manufacturer: No Starch Press

  • Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

    Completely Rewritten Sixth Edition Sheds New Light on Open Source Intelligence Collection and Analysis Author Michael Bazzell has been well known in government circles for his ability to locate personal information about any target through Open Source Intelligence (OSINT). In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for ... [Read More]

    • ASIN: 1984201573
    • ASIN: 1984201573
    • ISBN: 1984201573
    • Manufacturer: CreateSpace Independent Publishing Platform

  • UNIX and Linux System Administration Handbook (5th Edition)

    “As an author, editor, and publisher, I never paid much attention to the competition—except in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against.” —Tim O’Reilly, founder of O’Reilly Media   “This edition is for those whose systems live in the cloud or in virtualized data centers; those whose administrative work largely takes the form of automation and configuration source code; those who collaborate closely with developers, network engineers, compliance officers, and all the other wor... [Read More]

    • ASIN: 0134277554
    • ASIN: 0134277554
    • ISBN: 0134277554
    • Manufacturer: Addison-Wesley Professional

  • HACKED: Kali Linux and Wireless Hacking Ultimate Guide With Security and Penetration Testing Tools, Practical Step by Step Computer Hacking Book

    Hacking book is intended to serve as an intermediate-level guide to some common penetration testing tools and skills – particularly those of wireless hacking and of maintaining anonymity. The book concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks.Gain the ability to do ethical hacking and penetration testing by taking this hacking book! Get answers from an experienced IT expert to every single question you have related to the learning you do in this book including: ... [Read More]

    • ASIN: B0791WSRNZ
    • ASIN: B0791WSRNZ

  • Kali Linux Revealed: Mastering the Penetration Testing Distribution

    Kali Linux has not only become the information security professional's platform of choice, but evolved into an industrial-grade, and world-class operating system distribution--mature, secure, and enterprise-ready.Through the decade-long development process, Muts and his team, along with countless volunteers from the hacker community, have taken on the burden of streamlining and organizing our work environment, freeing us from much of the drudgery. They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world.An amazing community has built up around Ka... [Read More]

    • ASIN: 0997615605
    • ASIN: 0997615605
    • ISBN: 0997615605
    • Brand: Unknown
    • Manufacturer: Offsec Press

  • RHCSA/RHCE Red Hat Linux Certification Study Guide, Seventh Edition (Exams EX200 & EX300)

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Based on Red Hat Enterprise Linux 7, the new edition of this bestselling study guide covers the updated Red Hat Certified System Administrator (RHCSA) and Red Hat Certified Engineer (RHCE) exams. RHCSA/RHCE Red Hat Linux Certification Study Guide, 7th Edition is fully revised to cover the recently released Red Hat Enterprise Linux 7 and the corresponding RHCSA and RHCE certification exams. This new edition pr... [Read More]

    • ASIN: 0071841962
    • ASIN: 0071841962
    • ISBN: 0071841962
    • Brand: McGraw-Hill Education
    • Manufacturer: McGraw-Hill Education

  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

    Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's original author suits all levels of security and networking professionals. The reference guide documents every Nmap feature and option, while the remainder demonstrates how to apply them to quickly solve real-world tasks. Examples and diagrams show actual communic... [Read More]

    • ASIN: 0979958717
    • ASIN: 0979958717
    • ISBN: 0979958717
    • Brand: Brand: Nmap Project
    • Manufacturer: Nmap Project

  • The Complete Privacy & Security Desk Reference: Volume I: Digital (Volume 1)

    This textbook, at nearly 500 pages, will explain how to become digitally invisible. You will make all of your communications private, data encrypted, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, devices locked, and home address hidden. You will remove all personal information from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will take yourself out of 'the system'. You will use covert aliases and misinformation to eliminate current and future threats toward your privacy... [Read More]

    • ASIN: 152277890X
    • ASIN: 152277890X
    • ISBN: 152277890X
    • Manufacturer: CreateSpace Independent Publishing Platform

  • The Hacker Playbook 3: Practical Guide To Penetration Testing

    Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ... [Read More]

    • ASIN: 1980901759
    • ASIN: 1980901759
    • ISBN: 1980901759
    • Manufacturer: Independently published

  • Rtfm: Red Team Field Manual

    The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations an... [Read More]

    • ASIN: 1494295504
    • ASIN: 1494295504
    • ISBN: 1494295504
    • Brand: CreateSpace Independent Publishing Platform
    • Manufacturer: CreateSpace Independent Publishing Platform

  • Linux Basics for Hackers : Getting Started with Networking, Scripting, and Security in Kali

    9781593278557

    • UPC: 704040547

  • Linux Server Security

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of

    • UPC: 38186927

  • HDE Classic USB Gamepad Retro SNES Styled Controller for PC / Mac / Windows / Linux / Raspberry Pi

    A sword wields no strength unless the hand that hold it has courage.  Complete all of your quests, win the race, solve dastardly puzzles, and always find your princess, even when she is in another

    • UPC: 457513764
    • Color: White

  • Plugable "Alt Mode" Monitor Adapter - USB-C to DVI for Windows, Mac, and Linux

    Plugable USBC-DVI Graphic Adapter - USB 3.1 Type-C - 1 x Total Number of DVI - PC Mac Linux - Dual Link DVI Supported WITH DISPLAYPORT ALTERNATE

    • UPC: 144653097
    • Model: USBCDVI
    • Color: Multicolor

  • Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux - eBook

    Hacking will demand your full dedication and interest and also a desire and a craving for knowledge and constant advancement. If your goal is to be a hacker, this is the book to start with!.This

    • UPC: 714450542

  • Evaluation of Some Windows and Linux Security Tools - eBook

     The paper evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of

    • UPC: 679509619

  • DBAN Boot and Nuke Hard Drive Data Wiping Software for Windows, Linux & Mac on CD

    short description is not available

    • UPC: 533954385

  • Linux Security 25 Success Secrets - 25 Most Asked Questions On Linux Security - What You Need To Know - eBook

    THE Guide to Linux Security. There has never been a Linux Security Guide like this. It contains 25 answers, much more than you can imagine; comprehensive answers and extensive details and references, with insights that

    • UPC: 138077035

  • Selinux : NSA's Open Source Security Enhanced Linux

    The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related

    • UPC: 43582928

  • Linux Security Cookbook - eBook

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If

    • UPC: 425335223

  • Linux Server Security: Tools & Best Practices for Bastion Hosts by Bauer Mich…

    • UPC: 143174292815
    • Category: Nonfiction
    • Price: 10 USD

  • LINUX SERVER SECURITY: TOOLS & BEST PRACTICES FOR BASTION HOSTS By Michael NEW

    • UPC: 183875140072
    • Category: Nonfiction
    • Price: 28 USD

  • The Best Linux Distro For Privacy And Security in 2018

    Best Linux Distros For Ethical Hacking And Penetration Testing

    Qubes OS - The Security-Focused OS Used by Snowden