BeagleBone for Secret Agents

BeagleBone for Secret Agents

The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the BeagleBone Black to create…

Hacking Vim 7.2

Hacking Vim 7.2

This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapter covers a set of recipes, each of which follows a systematic approach with a self-contained description of the task it covers, how to…

Learning Metasploit Exploitation and Development

Learning Metasploit Exploitation and Development

Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack…

Database Anonymization

Database Anonymization

The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects…

Mastering Python Forensics

Mastering Python Forensics

Digital forensic analysis is the process of examining and extracting data digitally and examining it. Python has the combination of power, expressiveness, and ease of use that makes it an essential complementary tool to the traditional, off-the-shelf digital forensic tools. This book will teach you how to perform…

Metasploit Penetration Testing Cookbook, Second Edition

Metasploit Penetration Testing Cookbook, Second Edition

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is…

Handbook of Communications Security

Handbook of Communications Security

“Handbook of Communications Security” gives the reader information related to all aspects of communications security, from the fundamental concepts to the most advanced and updated. Communications represent a strategic sector for privacy protection and for personal, corporate, homeland, and international security. The interception, damage or loss of information…

Network Security Assessment, 3rd edition

Network Security Assessment, 3rd edition

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that professional security analysts use to identify and assess risks in government, military, and commercial networks. Armed with this book, you can work…

Immune Web: What makes the Internet Safe?

Immune Web: What makes the Internet Safe?

A personalized Internet Guide to protect your from everything unsafe on 21st century Web. Covering dozens of topic from simple passwords to complex dark internet. It’s the only thing you will ever need for your personal protection of your virtual briefcase.

Instant Penetration Testing

Instant Penetration Testing

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich screenshots for easy comprehension.This is a How-to guide, written with practicality in mind. Theory is…