Monday, October 31, 2011

Penetration Tester's Open Source Toolkit, Vol. 2

Penetration Tester's Open Source Toolkit, Vol. 2 Review



Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.

. Perform Network Reconnaissance
Master the objectives, methodology, and tools of the least understood aspect of a penetration test.
. Demystify Enumeration and Scanning
Identify the purpose and type of the target systems, obtain specific information about the versions of the services that are running on the systems, and list the targets and services.
. Hack Database Services
Understand and identify common database service vulnerabilities, discover database services, attack database authentication mechanisms, analyze the contents of the database, and use the database to obtain access to the host operating system.
. Test Web Servers and Applications
Compromise the Web server due to vulnerabilities on the server daemon itself, its unhardened state, or vulnerabilities within the Web applications.
. Test Wireless Networks and Devices
Understand WLAN vulnerabilities, attack WLAN encryption, master information gathering tools, and deploy exploitation tools.
. Examine Vulnerabilities on Network Routers and Switches
Use Traceroute, Nmap, ike-scan, Cisco Torch, Finger, Nessus, onesixtyone, Hydra, Ettercap, and more to attack your network devices.
. Customize BackTrack 2
Torque BackTrack 2 for your specialized needs through module management, unique hard drive installations, and USB installations.
. Perform Forensic Discovery and Analysis with BackTrack 2
Use BackTrack in the field for forensic analysis, image acquisition, and file carving.
. Build Your Own PenTesting Lab
Everything you need to build your own fully functional attack lab.


Sunday, October 30, 2011

Practical WAP: Developing Applications for the Wireless Web (Breakthroughs in Application Development)

Practical WAP: Developing Applications for the Wireless Web (Breakthroughs in Application Development) Review



This is an intermediate-level guide to building WAP applications. The Wireless Application Protocol (WAP) provides the technological framework for combining mobile communications with Internet technologies. WAP opens up the Web to a vastly expanded audience, allowing new types of applications to take advantage of user location, provide time-critical information, and offer personalized content. This book details the WAP Forum, mobile devices, and what makes a good WAP application. Using real world examples, this book examines the WAP standards, focusing on those essential to building working WAP applications. It outlines the critical success factors in designing WAP applications and helps the reader select the right architecture for his or her WAP project. Complete tutorials on WML (the HTML of wireless web), WMLScript, and Push technology are combined with the many examples to make Practical Wap ideal for software developers, architects, and managers.


Thursday, October 27, 2011

Ghost Huntress Book 2: The Guidance

Ghost Huntress Book 2: The Guidance Review



Ghost Huntress Book 2: The Guidance Feature

  • ISBN13: 9780547150949
  • Condition: New
  • Notes: BRAND NEW FROM PUBLISHER! 100% Satisfaction Guarantee. Tracking provided on most orders. Buy with Confidence! Millions of books sold!
Kendall and her ghost hunting team is the talk of Radisson, Georgia, but one person isn’t so pleased. Courtney Langdon doesn’t appreciate Kendall’s new popularity or her relationship with Jason, Courtney’s ex.

So Courtney begins dabbling in the paranormal world. At first it’s all a game to draw attention away from Kendall. But Courtney doesn’t know what she’s getting into—or what wants in her. This is one game that’s about to turn deadly serious.

And for more about Kendall and the ghost huntresses, check out www.ghosthuntress.com!


Wednesday, October 26, 2011

Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action)

Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action) Review



Extreme NXT: Extending the LEGO MIDSTORMS NXT to the Next Level is for intermediate-level users of NXT who would like to advance their capabilities by learning some of the basics of electronics. Plenty of examples are provided, and easy-to-follow instructions are included for building over 15 different sensors.

This makes a great reference for the NXT hardware interfaces. Examples even come complete with multiple, alternative NXT languages. The book is also abundant with illustrations.


Monday, October 24, 2011

The Battle to Get Traffic to Your Website: A Guide to the Small Business Owner

The Battle to Get Traffic to Your Website: A Guide to the Small Business Owner Review



At last! A guide to web marketing written by a small business owner for small business owners. This jargon-free guide takes the reader step by step through the black art of trying to get websites to the front page of Google. Based on the author's own experience over the last 15 years with various websites for his own business, this guide covers the basics of keyword strategy, optimising page content, linking and using Google to get websites to the first page in Google.
 
You don't have to know anything about designing websites to benefit from this book. If you use external web designers then the information in this book can be used to badger and cajole them into putting many of these ideas into practice. If your web designers are telling you that they are experts in optimising websites to appear on Google, then this book will help you check this from the comfort of your own desk. More importantly, if your competitor's websites are doing better than your own, then this book will help you analyse how they are achieving this and how to use this information to improve your own website.
 
This book is for all those hard working small business owners out there. Use it and make your on-line business prosper. All proceeds from the sale of this book will be donated to the author's Rocket Stove project in Rwanda. To find out more about this exciting charitable project, visit www.ohmbooks.co.uk/RocketStoveLetter.pdf to download a letter from the author.


Sunday, October 23, 2011

Industrial Communication Systems (The Industrial Electronics Handbook)

Industrial Communication Systems (The Industrial Electronics Handbook) Review



The successful operation of any production process is dependent upon a well designed and reliable communication system. Modern communication systems that are employed within a factory use a variety of means for sending and receiving information. With time, these systems have become more and more complicated. This volume in The Industrial Electronics Handbook, Second Edition spans the full gamut of topics which are needed for engineers working with industrial communication systems. A detailed description of the numerous topics covered in this volume is outlined in the Preambles that are provided for the various sections, and readers are directed there for the detailed topics contained within. The four other volumes in the Handbook are available individually: Fundamentals of Industrial Electronics, Intelligent Systems, Power Electronics and Motor Drives, and Control and Mechatronics. Additionally, all of the volumes are available as a set.


Friday, October 21, 2011

HTI+ Home Technology Integration All-in-One Exam Guide (All-in-One)

HTI+ Home Technology Integration All-in-One Exam Guide (All-in-One) Review



The most comprehensive on the job resource for professional installers of home automation technology. This book also provides coverage of both the HTI+ and CEDIA Installer Level I certifications.. . Features include:. . �In-depth coverage of home system integration technologies and practices make this book an indispensable working reference. . �100% coverage of all exam objectives for CompTIA�s HTI+ Certification and CEDIA�s Installer Level I exam.. �Includes Expert Discussion and Case Study sidebars, and Note, Tip, Exam Tip, and Caution icons highlighting important text throughout the book. . �CD-ROM includes 3 practice exams � 2 for each of the HTI+ exams and 1 for the CEDIA Installer Level I exam. The CD-ROM also includes a PDF document of CEDIA�s home system planning icons.. �Foreword by Ray Lepper, President of CEDIA..


Wednesday, October 19, 2011

Securing the Smart Grid: Next Generation Power Grid Security

Securing the Smart Grid: Next Generation Power Grid Security Review



"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of Computer Security, Dakota State University.

"Easy to read and full of valuable information, this book provides a wide-eyed view of our future and the security challenges we will be facing in our day-to-day lives. Exploring everything from home systems to large-scale power plants, this is a must-read for everyone in our technological society."-- Thomas Wilhelm, ISSMP, CISSP, SCSECA, SCNA, SCSA, IEM, IAM

Smart Grids are the future of energy. By creating networks from power plant to home, utility companies will be able to regulate power consumption making sure that consumers are receiving the amount that is needed, no more or less. While this new use of networking technology and unique applications such as smart meters will help to conserve energy it also opens up a pipeline, that was regulated manually, into the computer world of interconnected networks. The infrastructure that is being built will need to have robust security as an attack on this network could create chaos to tens of thousands of power consumers, stop a utility company in its tracks, or be used in a cyberwar.

Securing the Smart Grid takes a look at grid security today, how it is developing and being deployed into now over 10 million households in the US alone. Direct attacks to smart meters as well as attacks via the networks will be detailed along with suggestions for defense against them. A framework for how security should be implemented throughout this growing system will be included directing security consultants, and system and network architects on how to keep the grid strong against attackers big and small.

  • Details how old and new hacking techniques can be used against the grid and how to defend against them

  • Discusses current security initiatives and how they fall short of what is needed

  • Find out how hackers can use the new infrastructure against itself

  • Tuesday, October 18, 2011

    Wireless Internet Enterprise Applications: A Wiley Tech Brief

    Wireless Internet Enterprise Applications: A Wiley Tech Brief Review



    Uncover the latest in wireless data applications and learn how to utilize them for business. As a result of the wireless revolution, data can be sent and received using a wide variety of devices such as laptop PCs, pagers, mobile phones, PDAs, and more. With the increase in wireless communication, corporate technical managers must now rethink their network design. This book will help them understand the latest technologies and how to best utilize them for their business. It provides an overview of wireless technologies, a brief history of wireless communications, a description of the hardware and software solutions, an assessment of the main players (AT&T, Motorola, Qualcomm, etc.) and a look at what communication standards are available (WAP, CDMA, GSM, etc.). Readers will also find examples of different applications and learn where the technology is heading. Both technical and non-technical managers should educate themselves not only in the technology itself but how it is likely to impact the way they do business on a daily basis. Applications will cover both Business-to-Consumer and Business-to-Business, with the WWW continuing to play a key role


    Sunday, October 16, 2011

    Buy Me a Mercedes-Benz

    Buy Me a Mercedes-Benz Review



    More than the document of a remarkable project: "Buy Me A Mercedes-Benz" shows how various forms of expert knowledge have been combined and interwoven to finally generate an unconventional, breakthrough museum design. Providing insight into the various ideas, experiences and ambitions behind the project, this book allows visitors to take the museum home. Through photographs, diagrams, text, and drawings, this book explains the unique Mercedes museum design model, developed by UN Studio: the digitally programmed, three-dimensional, cross-connected trefoil. Implementing this model has resulted in a building that radically breaks with many of today's architectural conventions, a building that is highly complex, but still maintains a strongly directional structure, which provides many surprising perceptual experiences.


    Saturday, October 15, 2011

    CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

    CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone Review



    Learn to secure Web sites built on open source CMSs

    Web sites built on Joomla!, WordPress, Drupal, or Plone face some unique security threats. If you’re responsible for one of them, this comprehensive security guide, the first of its kind, offers detailed guidance to help you prevent attacks, develop secure CMS-site operations, and restore your site if an attack does occur. You’ll learn a strong, foundational approach to CMS operations and security from an expert in the field.

    • More and more Web sites are being built on open source CMSs, making them a popular target, thus making you vulnerable to new forms of attack
    • This is the first comprehensive guide focused on securing the most common CMS platforms: Joomla!, WordPress, Drupal, and Plone
    • Provides the tools for integrating the Web site into business operations, building a security protocol, and developing a disaster recovery plan
    • Covers hosting, installation security issues, hardening servers against attack, establishing a contingency plan, patching processes, log review, hack recovery, wireless considerations, and infosec policy

    CMS Security Handbook is an essential reference for anyone responsible for a Web site built on an open source CMS.


    Thursday, October 13, 2011

    Lexicon of Online and Distance Learning

    Lexicon of Online and Distance Learning Review



    Lexicon of Online and Distance Learning, a desktop resource, focuses specifically on distance education for researchers and practitioners. It provides key information about all levels of education (that is, K–12, higher education, proprietary education, and corporate training), allowing for comprehensive coverage of the discipline of distance education.

    The book offers a comprehensive index of distance learning terms; cross-references to synonyms and, when appropriate, online web links to encourage further exploration. Each lexicon entry is categorized by its root terminology—general, education, technology, instructional technology, or distance education—and provides the actual definition and complete exploration of the term along with specific references that include related books, volumes, and available manuscripts.