Hacking VoIP

Hacking VoIP

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it’s notoriously lacking in security. With minimal effort, hackers can eavesdrop…

Hacking, 2nd Edition

Hacking, 2nd Edition

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how…

Web Security Testing Cookbook

Web Security Testing Cookbook

Among the tests you perform on web applications, security testing is perhaps the most important, yet it’s often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression…

555ebf363b0f1.jpg

Hacking Exposed Web 2.0

Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 – based services, and reveals detailed countermeasures and defense techniques. You’ll learn how…

Hacking Exposed Windows, 3rd Edition

Hacking Exposed Windows, 3rd Edition

Meet the challenges of Windows security with the exclusive Hacking Exposed “attack-countermeasure” approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows…

Network Security Assessment, 2nd Edition

Network Security Assessment, 2nd Edition

Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to…

Rootkits For Dummies

Rootkits For Dummies

A rootkit is a type of malicious software that gives the hacker root or administrator access to your network. They are activated before your system’s operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user…

Securing Ajax Applications

Securing Ajax Applications

Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them…

Securing VoIP Networks

Securing VoIP Networks

In Securing VoIP Networks,two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security…