Filter
(found 1510 products)
Book cover image
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these ...
Cybersecurity Essentials
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. * Learn security and surveillance fundamentals * Secure and protect remote access and devices * Understand network topologies, protocols, and strategies * Identify threats and mount an effective defense Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge
https://magrudy-assets.storage.googleapis.com/9781119362395.jpg
42.000000 USD

Cybersecurity Essentials

by Donald D. Short, Philip Craig, Charles J Brooks
Paperback / softback
Book cover image
Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book DescriptionBug bounties have quickly become a critical part of the security economy. This book ...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book DescriptionBug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively-and profitably-participating in bug bounty programs. You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You'll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it's found), and how to create the tools for automated pentesting workflows. Then, you'll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research. What you will learn Choose what bug bounty programs to engage in Understand how to minimize your legal liability and hunt for bugs ethically See how to take notes that will make compiling your submission report easier Know how to take an XSS vulnerability from discovery to verification, and report submission Automate CSRF PoC generation with Python Leverage Burp Suite for CSRF detection Use WP Scan and other tools to find vulnerabilities in WordPress, Django, and Ruby on Rails applications Write your report in a way that will earn you the maximum amount of money Who this book is forThis book is written for developers, hobbyists, pentesters, and anyone with an interest (and a little experience) in web application security.
https://magrudy-assets.storage.googleapis.com/9781789344202.jpg
41.990000 USD

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

by Joseph Marshall
Paperback / softback
Book cover image
The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the ...
Compressed Sensing for Privacy-Preserving Data Processing
The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the topic by first establishing a shared knowledge about compressed sensing and how it is used nowadays. Then, clear models and definitions for its use as a cryptosystem and a privacy-preserving embedding are laid down, before tackling state-of-the-art results for both applications. The reader will conclude the book having learned that the current results in terms of security of compressed techniques allow it to be a very promising solution to many practical problems of interest. The book caters to a broad audience among researchers, scientists, or engineers with very diverse backgrounds, having interests in security, cryptography and privacy in information retrieval systems. Accompanying software is made available on the authors' website to reproduce the experiments and techniques presented in the book. The only background required to the reader is a good knowledge of linear algebra, probability and information theory.
https://magrudy-assets.storage.googleapis.com/9789811322785.jpg
73.490000 USD

Compressed Sensing for Privacy-Preserving Data Processing

by Enrico Magli, Tiziano Bianchi, Diego Valsesia, Matteo Testa
Paperback / softback
Book cover image
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum Key Features Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity Explore various solution-based recipes to build smart contracts and foolproof decentralized applications Develop decentralized marketplaces from scratch, build wallets, and manage transactions Book DescriptionEthereum ...
Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum Key Features Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity Explore various solution-based recipes to build smart contracts and foolproof decentralized applications Develop decentralized marketplaces from scratch, build wallets, and manage transactions Book DescriptionEthereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities. The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You'll learn about the security vulnerabilities, along with other protocols of Ethereum. Once you have understood the basics, you'll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you'll work with various Ethereum packages such as Truffle, Web3, and Ganache. By the end of this book, you'll have comprehensively grasped the Ethereum principles and ecosystem. What you will learn Efficiently write smart contracts in Ethereum Build scalable distributed applications and deploy them Use tools and frameworks to develop, deploy, and test your application Use block explorers such as Etherscan to find a specific transaction Create your own tokens, initial coin offerings (ICOs), and games Understand various security flaws in smart contracts in order to avoid them Who this book is forThe Ethereum Cookbook is for you if you are a software engineer, Blockchain developer, or research scientist who wants to build smart contracts, develop decentralized applications, and facilitate peer-to-peer transaction. It is assumed that you are familiar with Blockchain concepts and have sound knowledge of JavaScript.
https://magrudy-assets.storage.googleapis.com/9781789133998.jpg
47.240000 USD

Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps

by Manoj P R
Paperback / softback
Book cover image
Act now and get savvy to ensure your kids can enjoy the best of the internet and social media - without the risks. This practical go-to guide explains all the digital dangers kids face when they visit chat rooms, share selfies, use apps, and explore the internet. Worried about what ...
Parent Alert How To Keep Your Kids Safe Online
Act now and get savvy to ensure your kids can enjoy the best of the internet and social media - without the risks. This practical go-to guide explains all the digital dangers kids face when they visit chat rooms, share selfies, use apps, and explore the internet. Worried about what their own teenagers get up to, best friends Nadia Sawalha and Kaye Adams team up with international security expert Will Geddes. They ask the questions, and Will gives the answers, with simple action plans, preventative steps, and advice on how to recognise the warning signs. Your child's experiences online can potentially impact them for many years to come. Learn how to avoid internet dangers and help them stay safe online.
https://magrudy-assets.storage.googleapis.com/9780241350706.jpg
25.20 USD

Parent Alert How To Keep Your Kids Safe Online

by Kaye Adams, Nadia Sawalha, Will Geddes
Paperback / softback
Book cover image
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to ...
Social Engineering: The Science of Human Hacking
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the system in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.
https://magrudy-assets.storage.googleapis.com/9781119433385.jpg
46.05 USD

Social Engineering: The Science of Human Hacking

by Christopher Hadnagy
Paperback / softback
Book cover image
Pam Mastery
https://magrudy-assets.storage.googleapis.com/9781642350074.jpg
20.990000 USD

Pam Mastery

by Michael W. Lucas
Paperback / softback
Book cover image
Internet Password Keeper: Your Password and Internet Journal Notebook
https://magrudy-assets.storage.googleapis.com/9781726222228.jpg
7.340000 USD

Internet Password Keeper: Your Password and Internet Journal Notebook

by Priscilla Sunshine
Paperback / softback
Book cover image
Internet Password Journal: Your Internet Address Book and Password Notebook
https://magrudy-assets.storage.googleapis.com/9781726224581.jpg
10.470000 USD

Internet Password Journal: Your Internet Address Book and Password Notebook

by Brian Rothrock
Paperback / softback
Book cover image
Internet Password Logbook: Forget Your Password and Username No More
https://magrudy-assets.storage.googleapis.com/9781726224833.jpg
10.490000 USD

Internet Password Logbook: Forget Your Password and Username No More

by Stacy Nancy
Paperback / softback
Book cover image
Password Organizer: Your Password Journal, Password Book and Password Keeper
https://magrudy-assets.storage.googleapis.com/9781726221863.jpg
6.560000 USD

Password Organizer: Your Password Journal, Password Book and Password Keeper

by Kelli Everything
Paperback / softback
Book cover image
Internet Password Organizer: Your Internet Password Keeper, Password Journal and Password Book
https://magrudy-assets.storage.googleapis.com/9781726221825.jpg
8.890000 USD

Internet Password Organizer: Your Internet Password Keeper, Password Journal and Password Book

by Thomas Everything
Paperback / softback
Book cover image
A Password Keeper Vol.1: Blank Internet Logbook Keep Track Your Username, Password, Web Addresses, Expiry Date, Telephone Number Convenient to Use with Full Paper of Large Size 8.5*11.5 Inches.Office Log and Plan Organizer for All Records with Matte Flowe
https://magrudy-assets.storage.googleapis.com/9781726156547.jpg
6.600000 USD

A Password Keeper Vol.1: Blank Internet Logbook Keep Track Your Username, Password, Web Addresses, Expiry Date, Telephone Number Convenient to Use with Full Paper of Large Size 8.5*11.5 Inches.Office Log and Plan Organizer for All Records with Matte Flowe

by Deana Delisiotio
Paperback / softback
Book cover image
Learn how to execute web application penetration testing end-to-end Key Features Build an end-to-end threat model landscape for web application security Learn both web application vulnerabilities and web intrusion testing Associate network vulnerabilities with a web application infrastructure Book DescriptionCompanies all over the world want to hire professionals dedicated to ...
Practical Web Penetration Testing: Secure web applications using Burp Suite, Nmap, Metasploit, and more
Learn how to execute web application penetration testing end-to-end Key Features Build an end-to-end threat model landscape for web application security Learn both web application vulnerabilities and web intrusion testing Associate network vulnerabilities with a web application infrastructure Book DescriptionCompanies all over the world want to hire professionals dedicated to application security. Practical Web Penetration Testing focuses on this very trend, teaching you how to conduct application security testing using real-life scenarios. To start with, you'll set up an environment to perform web application penetration testing. You will then explore different penetration testing concepts such as threat modeling, intrusion test, infrastructure security threat, and more, in combination with advanced concepts such as Python scripting for automation. Once you are done learning the basics, you will discover end-to-end implementation of tools such as Metasploit, Burp Suite, and Kali Linux. Many companies deliver projects into production by using either Agile or Waterfall methodology. This book shows you how to assist any company with their SDLC approach and helps you on your journey to becoming an application security specialist. By the end of this book, you will have hands-on knowledge of using different tools for penetration testing. What you will learn Learn how to use Burp Suite effectively Use Nmap, Metasploit, and more tools for network infrastructure tests Practice using all web application hacking tools for intrusion tests using Kali Linux Learn how to analyze a web application using application threat modeling Know how to conduct web intrusion tests Understand how to execute network infrastructure tests Master automation of penetration testing functions for maximum efficiency using Python Who this book is forPractical Web Penetration Testing is for you if you are a security professional, penetration tester, or stakeholder who wants to execute penetration testing using the latest and most popular tools. Basic knowledge of ethical hacking would be an added advantage.
https://magrudy-assets.storage.googleapis.com/9781788624039.jpg
41.990000 USD

Practical Web Penetration Testing: Secure web applications using Burp Suite, Nmap, Metasploit, and more

by Gus Khawaja
Paperback / softback
Book cover image
Stuff I Will Not Forget!: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8)
https://magrudy-assets.storage.googleapis.com/9781725921573.jpg
7.340000 USD

Stuff I Will Not Forget!: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
Password Logbook: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V2)
https://magrudy-assets.storage.googleapis.com/9781725921474.jpg
7.340000 USD

Password Logbook: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V2)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
Password Log: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V1)
https://magrudy-assets.storage.googleapis.com/9781725921405.jpg
7.340000 USD

Password Log: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V1)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
She Believed She'd Remember, So She Did!: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8)
https://magrudy-assets.storage.googleapis.com/9781725921542.jpg
7.340000 USD

She Believed She'd Remember, So She Did!: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
Password Logbook: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V1)
https://magrudy-assets.storage.googleapis.com/9781725921443.jpg
7.340000 USD

Password Logbook: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V1)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
Password Journal: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V2)
https://magrudy-assets.storage.googleapis.com/9781725913615.jpg
7.340000 USD

Password Journal: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V2)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
Password Journal: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V1)
https://magrudy-assets.storage.googleapis.com/9781725913608.jpg
7.340000 USD

Password Journal: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V1)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
Password Log: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V2)
https://magrudy-assets.storage.googleapis.com/9781725921412.jpg
7.340000 USD

Password Log: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V2)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
Password Book: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V2)
https://magrudy-assets.storage.googleapis.com/9781725913578.jpg
7.340000 USD

Password Book: Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V2)

by Notebooks and Journals to Write in
Paperback / softback
Book cover image
Internet Password Logbook: Keep Track of Your Username, Password, Web Addresses, Expiry Date, Telephone Number All in One Easy to Carry on with Blank Full Paper of Large Size 8.5*11.5 Inch. Home Log and Plan Organizer with Colorful Butterfly Matte Cover.
https://magrudy-assets.storage.googleapis.com/9781725924451.jpg
5.870000 USD

Internet Password Logbook: Keep Track of Your Username, Password, Web Addresses, Expiry Date, Telephone Number All in One Easy to Carry on with Blank Full Paper of Large Size 8.5*11.5 Inch. Home Log and Plan Organizer with Colorful Butterfly Matte Cover.

by James a Delisiotio
Paperback / softback
Book cover image
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 116 submissions. They ...
Web Services - ICWS 2018: 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1 short paper published in this volume were carefully reviewed and selected from 116 submissions. They are organized in topical sections such as Web Services, RESTful web services, Web Services Description Langugage, Universal Description Discovery and Integration, Service discovery and interfaces, Domain-specific security and privacy architectures, Location bases services, Sercurity Services and Markup languages.
https://magrudy-assets.storage.googleapis.com/9783319942889.jpg
104.990000 USD

Web Services - ICWS 2018: 25th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings

Paperback / softback
Book cover image
Modem Computer Computers Multimedia Business Accounting Cable Money Accounts: Notebook Large Size 8.5 X 11 Ruled 150 Lined Softcover
https://magrudy-assets.storage.googleapis.com/9781725890855.jpg
7.340000 USD

Modem Computer Computers Multimedia Business Accounting Cable Money Accounts: Notebook Large Size 8.5 X 11 Ruled 150 Lined Softcover

by Wild Pages Press
Paperback / softback
Book cover image
Password Logbook to Write Down and Keep Track of Usernames & Passwords: Journal Gift Notebook for Seniors Storing Over 340 Passwords in Alphabetical Order, 9 X 6 Inch; 152.4 X 228.6 MM
https://magrudy-assets.storage.googleapis.com/9781725705333.jpg
7.340000 USD

Password Logbook to Write Down and Keep Track of Usernames & Passwords: Journal Gift Notebook for Seniors Storing Over 340 Passwords in Alphabetical Order, 9 X 6 Inch; 152.4 X 228.6 MM

by Useful Books
Paperback / softback
Book cover image
Password Book: Internet Address and Password Logbook
https://magrudy-assets.storage.googleapis.com/9781718093621.jpg
7.340000 USD

Password Book: Internet Address and Password Logbook

by Dagwood Malvin
Paperback / softback
Book cover image
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections ...
Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.
https://magrudy-assets.storage.googleapis.com/9789811086595.jpg
157.490000 USD

Smart and Innovative Trends in Next Generation Computing Technologies: Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II

Paperback / softback
Page 1 of 40