"Thorough and comprehensive coverage from one of the foremost experts in browser security."--Tavis Ormandy, Google Inc.Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.
CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide is an update to the top-selling SY0-201 guide, which helped thousands of readers pass the exam the first time they took it. The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version.Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action.
by David Kennedy, Jim OGorman, Devon Kearns, Mati Aharoni, No Starch Press
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors.
The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis.
Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually.
by Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams, McGraw-Hill Osborne Media
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods.
by Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, David Lindsay, Syngress
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems.
*Master every topic on Microsoft’s new MCTS 70-680 exam. *Assess your knowledge and focus your learning. *Get the practical workplace knowledge you need!Start-to-finish MCTS 70-680 preparation from top Microsoft technology consultant, trainer, and author Don Poulton!Master every MCTS 70-680 topic! *Windows 7 installation, upgrades, and deployment *User and application migration *Windows 7 deployment
VMware ESXi is the easiest way to get started with virtualization -- and it's free. It allows administrators to consolidate their applications onto fewer servers and start saving money through reduced hardware, power, cooling, and administration costs. VMware ESXi has been optimized and tested to run even their most resource-intensive applications and databases with minimal performance overhead.
by Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard, Wiley
A computer forensics "how-to" for fighting malicious code and analyzing incidentsWith our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software.