Sunday, January 19, 2014

BackTrack 5 Wireless Penetration Testing

The world’s most infamous hacker offers an insider’s view of the low-tech threats to high-tech securityKevin Mitnick’s exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world’s most notorious hacker gives new meaning to the old adage, “It takes a thief to catch a thief.”
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

THE ART OF DECEPTION: CONTROLLING THE HUMAN ELEMENT OF SECURITY


This book will teach you how to:
1. Program computers using C, assembly language, and shell scripts
2. Corrupt system memory to run arbitrary code using buffer overflows and format strings

3. Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening4. Outsmart common security measures like nonexecutable stacks and intrusion detection systems

5. Gain access to a remote server using port-binding or connect-back shellcode, and alter a server’s logging behavior to hide your presence
6. Redirect network traffic, conceal open ports, and hijack TCP connections
7. Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix

HACKING: THE ART OF EXPLOITATION, 2ND EDITION

If you want to build your site’s frontend with the single-page application (SPA) model, this hands-on book shows you how to get the job done with Backbone.js. You’ll learn how to create structured JavaScript applications, using Backbone’s own flavor of model-view-controller (MVC) architecture.
Start with the basics of MVC, SPA, and Backbone, then get your hands dirty building sample applications—a simple Todo list app, a RESTful book library app, and a modular app with Backbone and RequireJS. Author Addy Osmani, an engineer for Google’s Chrome team, also demonstrates advanced uses of the framework.
Learn how Backbone.js brings MVC benefits to the client-side
Write code that can be easily read, structured, and extended
Work with the Backbone.Marionette and Thorax extension frameworks
Solve common problems you’ll encounter when using Backbone.js
Organize your code into modules with AMD and RequireJS
Paginate data for your Collections with the Backbone.Paginator plugin
Bootstrap a new Backbone.js application with boilerplate code
Use Backbone with jQuery Mobile and resolve routing problems between the two
Unit-test your Backbone apps with Jasmine, QUnit, and SinonJS
DOWNLOAD LINK:

DEVELOPING BACKBONE.JS APPLICATIONS

This is a comprehensive essential guide to WordPress security written in a light style, which converts learning a really serious topic to an enjoyable read. It is packed with copy-paste solutions to security to suit all levels of security know-how. Just as WordPress is used by a broad spectrum of website owners, with varying degrees of security know-how, so WordPress 3 Ultimate Security is written to be understood by security novices and web professionals alike. From site and server owners and administrators to members of their contributing team, this essential A to Z reference takes a complex and, let’s face it, frankly dull subject and makes it accessible, encouraging, and sometimes even fun. Even if you are a total newbie to security, you can transform an insecure site into an iron-clad fortress, safeguarding your site users, your content and, sooner or later, your stress level.
DOWNLOAD LINK:

WORDPRESS 3 ULTIMATE SECURITY

WORDPRESS 3 ULTIMATE SECURITY