Search:

Becoming an ethical hacker / by Rivlin, Gary,author.(CARDINAL)729346;
"It's impossible to ignore the critical role cybersecurity plays within our society, politics, and the global order. In Becoming an Ethical Hacker, investigative reporter Gary Rivlin offers an easy-to-digest primer on what white hat hacking is, how it began, and where it's going, while providing vivid case studies illustrating how to become one of these "white hats" who specializes in ensuring the security of an organization's information systems. He shows how companies pay these specialists to break into their protected systems and networks to test and assess their security. Readers will learn how these white hats use their skills to improve security by exposing vulnerabilities before malicious hackers can detect and exploit them. Weaving practical how-to advice with inspiring case studies, Rivlin provides concrete, practical steps anyone can take to pursue a career in the growing field of cybersecurity."--Amazon.
Subjects: Handbooks and manuals.; Penetration testing (Computer security); Computer security; Hackers.;
Available copies: 6 / Total copies: 7
unAPI

White and black hat hackers / by Porterfield, Jason,author.(CARDINAL)669658;
Includes bibliographical references and index.Hacking's early days -- The shady side of security -- Mischief and threats -- Attack and counterattack -- Gathering in the shadows.Explains the differences between white hat, black hat, and gray hat hackers and examines the origin and history of hacker culture.Age 7-12.
Subjects: Penetration testing (Computer security); Computer security; Computer crimes; Computer crimes;
Available copies: 1 / Total copies: 1
unAPI

Ethical hacker / by Loh-Hagan, Virginia.(CARDINAL)617541;
Includes bibliographical references and index.Helpful hackers -- Thinking like the enemy -- Inspired to hack -- History of hacking -- The fine line.520LAccelerated Reader AR
Subjects: Computer crimes; Computer networks; Penetration testing (Computer security);
Available copies: 1 / Total copies: 2
unAPI

Helpful hackers / by Hudak, Heather C.,1975-author.(CARDINAL)463468;
Includes bibliographical references (page 31) and index.Stretching the boundaries of technology -- How to become a hacker -- Black hats vs. white hats -- Stopping security threats -- Hacker history -- Intent to harm -- Hacker attack -- Hacker revolution -- Timeline.Learn what it means to be a hacker. Explore the history of hacking as your are introduced to those who have used their skills for both good and bad.880LAccelerated Reader AR
Subjects: Juvenile works.; Debugging in computer science; Hackers; Occupations; Penetration testing (Computer security);
Available copies: 1 / Total copies: 1
unAPI

CompTIA PenTest+ certification for dummies / by Clarke, Glen E.,author.(CARDINAL)543358;
Subjects: Study guides.; Examinations.; Penetration testing (Computer security); Computer security; Computer networks; Electronic data processing personnel;
Available copies: 2 / Total copies: 2
unAPI

CEH v11 certified ethical hacker study guide / by Messier, Ric,author.;
Subjects: Study guides.; Computer networks; Computer networks; Electronic data processing personnel; Computer security; Penetration testing (Computer security); Hackers; Electronic data processing personnel;
Available copies: 1 / Total copies: 1
unAPI

CEH, certified ethical hacker : exam guide / by Walker, Matthew,author.;
Includes bibliographical references and index.Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Up-to-date coverage of every topic on the CEH v10 exam. Thoroughly updated for CEH v10 exam objectives, this integrated self-study system offers complete coverage of the EC-Council's Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference. Covers all exam topics, including: *Ethical hacking fundamentals *Reconnaissance and footprinting *Scanning and enumeration *Sniffing and evasion *Attacking a system *Hacking web servers and applications *Wireless network hacking *Security in cloud computing *Trojans and other attacks *Cryptography *Social engineering and physical security *Penetration testing. Digital content includes: *300 practice exam questions *Test engine that provides full-length practice exams and customized quizzes by chapter.
Subjects: Computer security; Penetration testing (Computer security); Hackers; Computer networks; Electronic data processing personnel;
Available copies: 1 / Total copies: 1
unAPI

Hacking / by Beaver, Kevin M.,author.;
pt. I. Building the foundation for security testing. Introduction to vulnerability and penetration testing ; Cracking the hacker mindset ; Developing your security testing plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux and macOS -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging your security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources.Includes bibliographical references and index.
Subjects: Computer security.; Computer networks; Hackers.;
Available copies: 2 / Total copies: 5
unAPI

Defensive security handbook : best practices for securing infrastructure / by Brotherston, Lee,author.; Berlin, Amanda,author.;
Includes bibliographical references and index.Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. Learn fundamentals of starting or redesigning an InfoSec program Create a base set of policies, standards, and procedures Plan and design incident response, disaster recovery, compliance, and physical security Bolster Microsoft and Unix systems, network infrastructure, and password management Use segmentation practices and designs to compartmentalize your network Explore automated process and tools for vulnerability management Securely develop code to reduce exploitable errors Understand basic penetration testing concepts through purple teaming Delve into IDS, IPS, SOC, logging, and monitoring
Subjects: Computer networks; Data protection.; Internet;
Available copies: 1 / Total copies: 1
unAPI

Networking all-in-one / by Lowe, Doug,1959-author.(CARDINAL)324610;
Introduction -- Book 1: Getting started with networking. Welcome to networking ; Network infrastructure ; Switches, routers, and VLANs ; Cybersecurity ; Servers and visualization ; Cloud computing -- Book 2: Understanding network protocols. Network protocols and standards ; TCP/IP and the internet ; IP addresses ; Routing ; DHCP ; DNS ; TCP/IP tools and commands -- Book 3: Planning a network. Local area networks ; Wide area networks ; Server architecture ; Virtualization architecture ; Storage architecture ; Backup architecture ; Hyperconverged infrastructure -- Book 4: Implementing a network. Network hardware ; Wireless networks ; Windows clients ; Mac networking ; Network printers ; Virtual private networks -- Book5: Implementing virtualization. Hyper-V ; VMware ; Azure ; Amazon Web Services ; Desktop visualization -- Book 6: Implementing Windows Server 2025. Installing Windows Server 2025 ; Configuring Windows Server 2025 ; Configuring Active Directory ; Configuring user accounts ; Configuring a file server ; Using Group Policy ; Commandeering Windows commands ; Using PowerShell -- Book 7: Administering Microsoft 365. Getting started with Microsoft 365 administration ; Configuring Exchange Online ; Administering Teams -- Book 8: Implementing Linux. Installing a Linux server ; Linux administration ; Basic Linux network configuration ; Running DHCP and DNS ; Linux commands -- Book 9: Managing a network. Welcome to network administration ; Managing remotely ; Managing network assets ; Solving network problems -- Book 10: Securing your users ; Managing firewalls and virus protection ; Dealing with spam ; Managing disaster recovery and business continuity planning ; Planning for cybersecurity incident response ; Penetration testing."The essentials you need to learn about networking--10 books in one! With over 900 pages of clear and trustworthy information, Networking All-in-One For Dummies is the perfect beginner's guide AND the perfect professional reference book. Small networks, large networks, business networks, cloud networks--it's all covered. Learn how to set up a network and keep it functioning, using Windows Server, Linux, and related technologies. This book also covers best practices for security, managing mobile devices, and beyond. Maybe you're just getting started with networking, or maybe you know what you're doing and need a resource with all the knowledge in one place. Either way, you've found what you need with this Dummies All-in-One -- Plan a network from scratch and learn how to set up all the hardware and software you'll need -- Find explanations and examples of important networking protocols -- Build remote and cloud-based networks of various sizes -- Administer networks with Windows Server and other versions -- Secure your network with penetration testing and planning for cybersecurity incident responses -- Every network administrator needs a copy of Networking All-in-One For Dummies, the comprehensive learning resource and reliable desk reference."--
Subjects: Handbooks and manuals.; Computer networks.; Computer networks;
Available copies: 6 / Total copies: 11
unAPI