Category
Recent Comments
Popular
-
Gem Stone King 925 Sterling Silver Black Sapphire and Black Diamond Women Ring
Rated 0 out of 5$70.00$30.00 -
Xiaomei Clear and Exquisite 925 Sterling Silver Cube Diamond Drill Cz Diamond Engagement Bride Jewelry Ring
Rated 0 out of 5$12.00$5.00 -
Ten Fit Jewelry 3 Carat VVS1 Simulated Diamond Engagement Ring for Women Silver Wedding Jewelry
Rated 0 out of 5$12.00$7.00 -
Sterling Silver CZ Ring Zircon Ring Imitation Diamond ring Crystal Wedding ring New 925 Silver White Sapphire Birthstone Engagement Wedding Jewelry Ring Size 5-10
Rated 0 out of 5$15.00$8.00 -
Managerial Accounting R.H. Garrison, E. W. Noreen & P. C. Brewer- Hill International Edition 13th
Rated 0 out of 5$55.00$6.00

Category: E-book Library
E-book Library
Showing 1–16 of 19 results
-
Advanced Penetration Testing Hacking 2017
$31.00$10.00Add to cartProduct Short info:
Product Format PDF Format Audience Level Intermediate to Advanced Content Length 269 Pages Author Wil Allsop Pub Date March 2017 Imprint Wiley Product Description Includes advanced coverage of the latest penetration testing techniques with content on creating attack vectors, moving unseen through a target enterprise, employing social engineering strategies, establishing a robust command-and-control structure, using advanced data exfiltration techniques, escalating privilege, operating systems using harvested credentials, and creating custom code with VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more -
Begin Ethical Hacking with Python
$25.00$8.00Add to cartProduct Format: PDF Format
Shipping Charge: Free
Paperback: 255 Page
Product Short Description:
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.
Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.
What You Will Learn
- Discover the legal constraints of ethical hacking
- Work with virtual machines and virtualization
- Develop skills in Python 3
- See the importance of networking in ethical hacking
- Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more
Who This Book Is For:
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language. -
CEH v9 Certified Ethical Hacker Version 9
$45.00$10.00Add to cartProduct details:
Product Format: PDF Format
Development Editor: Kim Wimpsett
Technical Editors: Raymond Blockmon, Jason McDowell, Tom Updegrove
Production Editor: Rebecca Anderson
Copy Editor: Linda Recktenwald
Editorial Manager: Mary Beth Wakefield
Production Manager: Kathleen Wisor
Executive Editor: Jim Minatel
Media Supervising Producer: Rich Graves
Book Designers: Judy Fung and Bill Gibson
Proofreader: Nancy Carrasco
Indexer: J & J Indexing
Project Coordinator, Cover: Brent Savage
Cover Designer: Wiley
Cover Image: ©Getty Images Inc./Jeremy Woodhouse
Copyright © 2016 by John Wiley & Sons, Inc., Indianapolis, Indiana
Publisher : simultaneously in Canada; 3rd edition (May 2, 2016)
Language : English
Paperback : 761 pages
ISBN: 978-1-119-25224-5
ISBN: 978-1-119-25227-6 (ebk.)
ISBN: 978-1-119-25225-2 (ebk.)
Item Weight : 2.39 pounds
Dimensions : 7.3 x 1.4 x 9.1 inches -
Certified Ethical Hacker 2016
$35.00$15.00Add to cartProduct details
- Product Format: PDF Format
- Publisher : Apress; 1st ed. edition (December 1, 2016)
- Language : English
- Paperback : 207 pages
- ISBN-10 : 1484223241
- ISBN-13 : 978-1484223246
- Item Weight : 9.46 pounds
- Dimensions : 7.01 x 0.51 x 10 inches
- Covers essential concepts which are necessary from a hacking and security perspective
- Covers all the concepts required to take the CEH course and exam in very simple, to-the-point, and digestible format
- Simple do-it-yourself exercises in every chapter to get hands-on knowledge
- A complete information primer on various career paths available after CEH certification along with how to stay updated and ahead of the competition
- A set of interview questions related to information security and ethical hacking to aid the reader in job interviews
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.
The book explains the concepts with the help of practical real-world scenarios and examples. You’ll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.
What You Will Learn- Gain the basics of hacking (apps, wireless devices, and mobile platforms)
- Discover useful aspects of databases and operating systems from a hacking perspective
- Develop sharper programming and networking skills for the exam
- Explore the penetration testing life cycle
- Bypass security appliances like IDS, IPS, and honeypots
- Grasp the key concepts of cryptography
- Discover the career paths available after certification
- Revise key interview questions for a certified ethical hacker
Who This Book Is ForBeginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification. -
CompTIA Cybersecurity 2017
$29.00$12.00Add to cartProduct details:
Senior Acquisitions Editor: Kenyon Brown
Development Editor: David Clark
Technical Editor: Robin Abernathy
Production Editor: Rebecca Anderson
Copy Editor: Elizabeth Welch
Editorial Manager: Mary Beth Wakefield
Production Manager: Kathleen Wisor
Executive Editor: Jim Minatel
Book Designers: Judy Fung and Bill Gibson
Proofreader: Kim Wimpsett
Indexer: Ted Laux
Project Coordinator, Cover: Brent Savage
Cover Designer: Wiley
Cover Image: ©Getty Images Inc./Jeremy Woodhouse
Copyright © 2017 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-119-34897-9
ISBN: 978-1-119-34991-4 (ebk.)
ISBN: 978-1-119-34988-4 (ebk.)
Manufactured in the United States of AmericaLearning Objectives
In this course, you will assess and respond to security threats and operate a systems and network security analysis platform you will…
- Assess information security risk in computing and network environments.
- Analyze reconnaissance threats to computing and network environments.
- Analyze attacks on computing and network environments.
- Analyze post-attack techniques on computing and network environments.
- Implement a vulnerability management program.
- Collect cybersecurity intelligence.
- Analyze data collected from security and event logs.
- Perform active analysis on assets and networks.
- Respond to cybersecurity incidents.
- Investigate cybersecurity incidents.
- Address security issues with the organization’s technology architecture.
-
Computer Security Fundamentals
$30.00$15.00Add to cartProduct details:
- Product Format: PDF Format
- Publisher : Pearson IT Certification; 3rd edition (June 28, 2016)
- Language : English
- Paperback : 447 pages
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY:
Clearly explains core concepts, terminology, challenges, technologies, and skills
Covers today&;s latest attacks and countermeasures
The perfect beginner&;s guide for anyone interested in a computer security career
Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.
Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you&;ve learned.
Whether you&;re a student, a professional, or a manager, this guide will help you protect your assets&;and expand your career options.
Learn how to
·         Identify and prioritize potential threats to your network
·         Use basic networking knowledge to improve security
·         Get inside the minds of hackers, so you can deter their attacks
·         Implement a proven layered approach to network security
·         Resist modern social engineering attacks
·         Defend against today&;s most common Denial of Service (DoS) attacks
·         Halt viruses, spyware, worms, Trojans, and other malware
·         Prevent problems arising from malfeasance or ignorance
·         Choose the best encryption methods for your organization
·         Compare security technologies, including the latest security appliances
·         Implement security policies that will work in your environment
·         Scan your network for vulnerabilities
·         Evaluate potential security consultants
·         Master basic computer forensics and know what to do if you&;re attacked
·         Learn how cyberterrorism and information warfare are evolving
 
-
Cyber-Physical Attack Recovery
$28.00$13.00Add to cartProduct details:
- Product Format: PDF Format
- Publisher : Apress; 1st ed. edition (June 8, 2016)
- Publication date : June 8, 2016
- Language : English
- File size : 7,855 KB
- Text-to-Speech : Enabled
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Not Enabled
- Print length : 117 pages
- Lending : Not Enabled
This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time—even from the other side of the planet.
Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won’t suspect it was a hacker—until you see a pattern. The building control system (BCS) will act “squirrelly” and you will know—it really is a cyber-physical attack.
Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives.
The book contains:
- A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs.
- Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps
- Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more.
What you’ll learn:
- Possible ways hackers can cause building equipment to fail.
- How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack.
- How to restore equipment operation without doing any more damage.
Who This Book Is For:
Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.
-
Essential Skills for Hackers
$48.00$15.00Add to cartProduct details
- Product Format: PDF Format
- Publisher : Syngress; 1st edition (December 30, 2015)
- Language : English
- Paperback : 42 pages
- Item Weight : 3.17 ounces
- Dimensions : 5.98 x 0.12 x 9.02 inches
Essential Skills for Hackers is about the skills you need to be in the elite hacker family.
The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.
-
Financial Statement Analysis, 10th Edition by K. R. Subramanyam, John Wild
$30.00$5.00Add to cartEditorial Reviews
About the Author
John J. Wild is Professor of Business and Vilas Research Scholar at The University of Wisconsin at Madison, where he also received his Ph.D. He has received numerous teaching awards at Wisconsin as well as from Michigan State University. He is a frequent speaker at universities and national and international conferences.University of Southern California
Product details
- Publisher : McGraw-Hill Education; 10th edition (May 19, 2008)
- Product Categories : PDF Formats
- Language : English
- Hardcover : 784 pages
- ISBN-10 : 0073379433
- ISBN-13 : 978-0073379432
- Item Weight : 3.54 pounds
- Dimensions : 8.4 x 1.4 x 10.3 inches
-
From Hacking to Report Writing
$30.00$11.00Add to cartProduct details:
- Product Format: PDF Format
- Publisher : Apress; 1st ed. edition (November 4, 2016)
- Publication date : November 4, 2016
- Language : English
- File size : 3167 KB
- Text-to-Speech : Enabled
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Not Enabled
- Print length : 204 pages
- Lending : Not Enabled
Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally report security weaknesses using techniques such as SQL-injection, denial-of-service attacks, and password hacking.
Although From Hacking to Report Writing will give you the technical know-how needed to carry out advanced security tests, it also offers insight into crafting professional looking reports describing your work and how your customers can benefit from it. The book will give you the tools you need to clearly communicate the benefits of high-quality security and penetration testing to IT-management, executives and other stakeholders.
Embedded in the book are a number of on-the-job stories that will give you a good understanding of how you can apply what you have learned to real-world situations.
We live in a time where computer security is more important than ever. Staying one step ahead of hackers has never been a bigger challenge. From Hacking to Report Writing clarifies how you can sleep better at night knowing that your network has been thoroughly tested.
What you’ll learn:
- Clearly understand why security and penetration testing is important
- Find vulnerabilities in any system using the same techniques as hackers do
- Write professional looking reports
- Know which security and penetration testing method to apply for any given situation
- Successfully hold together a security and penetration test project
Who This Book Is For:
Aspiring security and penetration testers, security consultants, security and penetration testers, IT managers, and security researchers.
-
Hackers Beware
$50.00$20.00Add to cartProduct details:
- Product Format: PDF Format
- Publisher : Sams; 1st edition (August 1, 2001)
- Language : English
- Paperback : 817 pages
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested “in how they do that” – the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.
-
Hacking the Hacker 2017
$28.00$16.00Add to cartHacking the Hacker: Learn from the Experts Who Take Down Hackers
- Publisher : Wiley; 1st edition (April 21, 2017)
- Product Format: PDF Format
- Language : English
- Paperback : 284 pages
- Copyright © 2017 by John Wiley & Sons, Inc., Indianapolis, Indiana
- Published simultaneously in Canada
- ISBN: 978-1-119-39621-5
- ISBN: 978-1-119-39623-9 (ebk)
- ISBN: 978-1-119-39622-2 (ebk)
- Manufactured in the United States of America
-
Honeypots and Routers Collecting Internet Attacks
Read moreProduct Descriptions:
- Product Name: Honeypots and Routers Collecting Internet Attacks
- Publisher : Auerbach Publications; 1st edition (December 2, 2015)
- Publication date : December 2, 2015
- Language : English
- File size : 9348 KB
- Simultaneous device usage : Up to 4 simultaneous devices, per publisher limits
- Text-to-Speech : Not enabled
- Enhanced typesetting : Not Enabled
- X-Ray : Not Enabled
- Word Wise : Not Enabled
- Print length : 198 pages
- Lending : Not Enabled
-
Managerial Accounting R.H. Garrison, E. W. Noreen & P. C. Brewer- Hill International Edition 13th
$55.00$6.00Add to cartProduct details
- Publisher : McGraw-Hill/Irwin; 13th edition (July 17, 2009)
- Language : English
- ISBN-10 : 0077387880
- ISBN-13 : 978-0077387884
- Item Weight : 4.4 pounds
- Dimensions : 9 x 1.1 x 11 inches
As the long-time best-seller, Garrison has helped guide close to 3 million students through managerial accounting since it was first published. It identifies the three functions managers must perform within their organizations—plan operations, control activities, and make decisions—and explains what accounting information is necessary for these functions, how to collect it, and how to interpret it. Garrison’s Managerial Accounting, is known for its accuracy and rigor. It is also unique in that the authors write the most important supplements that accompany the book: solutions manual, test bank, instructor’s manual, and study guide.
-
Modern Web Penetration Testing 2016
$35.00$17.00Add to cartProduct details:
- Product Format: PDF Format
- Publisher : Packet Publishing; 1st edition (October 28, 2016)
- Publication date : October 28, 2016
- Language : English
- File size : 15,589 KB
- Text-to-Speech : Enabled
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Not Enabled
- Print length : 298 pages
- Lending : Not Enabled
-
Penetration Testing Basics
$25.00$12.00Add to cart- Product Format: PDF Format
- Publisher : Apress; 1st ed. edition (July 22, 2016)
- Publication date : July 22, 2016
- Language : English
- File size : 13,102 KB
- Text-to-Speech : Enabled
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Not Enabled
- Print length : 127 pages
- Lending : Not Enabled
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you’ll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible.
What You Will Learn:- Identify security vulnerabilities
- Use some of the top security tools to identify holes
- Read reports from testing tools
- Spot and negate common attacks
- Identify common Web-based attacks and exposures as well as recommendations for closing those holes
Who This Book Is For:
Anyone who has some familiarity with computers and an interest in information security and penetration testing.
Archives
Categories
Best offers
Join Risk Free
30 days refund
100% Safe
Secure Shopping
24x7 Support
Online 24 hours
Best Offers
Grab Now
Free Shiping
On all order over
Know Us

Neque viverra justo nec ultrices dui sapien eget. Gravida cum sociis natoque penatibus. Imperdiet proin fermentum leo vel orci porta non
Read MoreStore Updates



Product Showcase





