Chapter 1: Introduction to web application hacking Introduction Web application architecture components Complex web application software components Putting it all together The web application hacking methodology The history of web application hacking and the evolution of tools Chapter 2: Information Gathering Techniques Introduction The principles of automating searches Ap…
Table of Contents Dedication About the Authors Acknowledgments Introduction Chapter 1: Digital Reconnaissance and Surveillance Abstract Digital reconnaissance and surveillance Threat of digital reconnaissance and surveillance Why spy? Who spies? Legal and ethical principles Summary Chapter 2: Informa…
Table of Contents 1. Overview: The OS X operating system 2. Current and past threats 3. Vulnerabilities 4. Malicious Code 5. Exploit development and research 6. Rootkits 7. Defense and protection 8. Detecting malicious code; rootkits 9. Protecting against exploits 10. Locking down services and firewall policies 11. Future threats and mali…
Table of Contents I. TCP/IP. 1. IP Concepts. 2. Introduction to TCPdump and TCP. 3. Fragmentation. 4. ICMP. 5. Stimulus and Response. 6. DNS. II. TRAFFIC ANALYSIS. 7. Packet Dissection Using TCPdump. 8. Examining IP Header Fields. 9. Examining Embedded Protocol Header Fields. 10. Real-World Analysis. 11. Mystery Traffic. III. FILTERS/RULES FOR NETWORK MONITORING. 12. Writing …
Contents: Chapter 1—Foundations Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks Chapter 3—Basic Protocols Chapter 4—Intermediate Protocols Chapter 5—Advanced Protocols Chapter 6—Esoteric Protocols Part II—Cryptographic Techniques Chapter 7—Key Length Chapter 8—Key Management Chapter 9—Algorithm Types and Modes Chapter 10—Using Algorith…
Table of Contents Chapter 1: The Need for Information Systems Security Compliance Chapter 2: Overview of U.S. Compliancy Laws Chapter 3: What Is the Scope of an IT Compliance Audit? Chapter 4: Auditing Standards and Frameworks Chapter 5: Planning an IT Infrastructure Audit for Compliance Chapter 6: Conducting an IT Infrastructure Audit for Compliance Chapter 7: Writing the …
Contents: Chapter 1. What is Penetration Testing? Chapter 2. Reconnaissance Chapter 3. Scanning Chapter 4. Exploitation Chapter 5. Social Engineering Chapter 6. Web-Based Exploitation Chapter 7. Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter\ Chapter 8. Wrapping Up the Penetration Test
Contents: Chapter 1 Cyber security engineering: lifecycle assurance of systems and software 1.1 Intoduction 1.2 What do we mean by lifecycle assurance 1.3 Introducing principles for software assurance 1.4 Addressing lifecycle assurance 1.5 Case studies used in this book Chapter 2 Risk analysis-identifying and prioritizing needs 2.1 Risk management concepts 2.2 Mission risk 2.3 Mi…
Contents: 1 Cybersecurity & its origins 2 About the case studies 3 Case-study target 2013 4 The disciplines within cybersecurity 5 Case-study Edward snowden 2013 6 Basic cybersecurity concepts 7 Human factors 8 Technical cybersecurity 9 Evolting attack and defence methods 10 Case-study sony (2014) 11 The cybersecurity cold war 12 Risk-based cybersecurity & stacked risk 1…
Table of contents: Cyber as Deterrent Cybersecurity and Cyber Weapons: Is Nonproliferation Possible? Cyber Security for Nuclear Power Plants Cyber Security for Chemical Plants From Fortress to Resilience Cyber Security and Resilience of Industrial Control Systems and Critical Infrastructures