Physical and digital books, media, journals, archives, and databases.
Results include
  1. Cryptography : Infosec pro guide

    Oriyano, Sean-Philip
    New York : McGraw-Hill Education, ©2013.

    Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working too.Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working tools to data storage architects, security mangers, and others security practitioners who need to possess a thorough understanding of cryptography. True to the hallmarks of all InfoSec Pro Guides, the book imparts the hard-learned lessons and experiences of knowledgeable professionals in security, providing know-how that otherwise takes years to learn. You're led through the Why and How of cryptography, the history of the science, the components of cryptography and how it is applied to various areas in the field of security. Challenging crypto puzzles in every chapter Ready-to-implement cryptographic techniques explained Lingo-Common security terms defined so that you're in the know on the job IMHO-Frank and relevant opinions based on the author's years of industry experience Budget Note-Tips for getting security technologies and processes into your organization's budget In Actual Practice-Exceptions to the rules of security explained in real-world contexts Your Plan-Customizable checklists you can use on the job now Into Action-Tips on how, why, and when to apply new skills and techniques at work.

    Online Safari Books Online

  2. Client-side attacks and defense [electronic resource]

    Oriyano, Sean-Philip
    [Waltham, MA] : Syngress, 2012.

    Individuals wishing to attack a company's network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user's machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible. The most current attacks are discussed along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. The severity of these attacks is examined along with defences against them, including antivirus and anti-spyware, intrusion detection systems, and end-user education. Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authorsLearn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit-the client-side attackDefend your network against attacks that target your company's most vulnerable asset-the end user.Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich internet applications, and file format vulnerabilities. It also covers defenses, such as antivirus and anti-spyware, intrusion detection systems, and end-user education. The book explains how to secure Web browsers, such as Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari, and Opera. It discusses advanced Web attacks and advanced defenses against them. Moreover, it explores attacks on messaging, Web applications, and mobiles. The book concludes with a discussion on security measures against client-side attacks, starting from the planning of security. This book will be of great value to penetration testers, security consultants, system and network administrators, and IT auditors.

    Online ScienceDirect

  3. Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

    Oriyano, Sean-Philip
    Birmingham, UK : Packt Publishing, 2017.

    More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking ...Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes About This Book * Expose wireless security threats through the eyes of an attacker, * Recipes to help you proactively identify vulnerabilities and apply intelligent remediation, * Acquire and apply key wireless pentesting skills used by industry experts Who This Book Is For If you are a security professional, administrator, and a network professional who wants to enhance their wireless penetration testing skills and knowledge then this book is for you. Some prior experience with networking security and concepts is expected. What You Will Learn * Deploy and configure a wireless cyber lab that resembles an enterprise production environment * Install Kali Linux 2017.3 on your laptop and configure the wireless adapter * Learn the fundamentals of commonly used wireless penetration testing techniques * Scan and enumerate Wireless LANs and access points * Use vulnerability scanning techniques to reveal flaws and weaknesses * Attack Access Points to gain access to critical networks In Detail More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats. Style and approach The book will provide the foundation principles, techniques, and in-depth analysis to effectively master wireless penetration testing. It will aid you in understanding and mastering many of the most powerful and useful wireless testing techniques in the industry.

    Online Safari Books Online

Guides

Course- and topic-based guides to collections, tools, and services.
No guide results found... Try a different search

Library website

Library info; guides & content by subject specialists
No website results found... Try a different search

Exhibits

Digital showcases for research and teaching.
No exhibits results found... Try a different search

EarthWorks

Geospatial content, including GIS datasets, digitized maps, and census data.
No earthworks results found... Try a different search

More search tools

Tools to help you discover resources at Stanford and beyond.