var adfly_protocol = 'https';

samedi 14 janvier 2017

Ransomware: Defending Against Digital Extortion 1st Edition







The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.


Download this ebook :


CLICK HERE

mercredi 21 décembre 2016

HTML, CSS & JavaScript Web Publishing in One Hour a Day, Sams Teach Yourself

 Covering HTML5, CSS3, and jQuery (7th Edition)

 

 
 
 
Thoroughly revised and updated with examples rewritten to conform to HTML5, CSS3, and contemporary web development practices, this easy-to-understand, step-by-step tutorial helps you quickly master the basics of HTML and CSS before moving on to more advanced topics such as graphics, video, and interactivity with JavaScript and jQuery. 

In just one hour a day, you’ll learn the skills you need to design, create, and maintain a professional-looking website. 
  • No previous experience required. By following each short, one-hour lesson in this book, anyone can learn the basics of web development.
  • Learn at your own pace. You can work through each lesson sequentially to make sure you thoroughly understand all the concepts and methodologies, or you can focus on specific lessons to learn the techniques that interest you most.
  • Test your knowledge. Each lesson ends with a Workshop section filled with questions, answers, and exercises for further study.
Learn how to...
  • Fully implement the HTML5 and CSS3 standards
  • Work with text and create links
  • Add images and graphics to your page
  • Use CSS to style a site and position elements on a page
  • Structure a page with HTML5 
  • Use responsive web design to make your pages look good on different-sized screens
  • Use JavaScript to add dynamic elements and interactivity on your pages
  • Leverage jQuery to add JavaScript features to your pages
  • Design for the mobile web
  • Get your site online and let people know it’s there
  • Optimize your site for search engines


Download it here :


CLICK HERE


OR


CLICK HERE

mardi 20 décembre 2016

Basic Security Testing with Kali Linux 2







Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do.
In Basic Security Testing with Kali Linux 2, you will learn basic examples of how hackers find out information about your company, find weaknesses in your security and how they gain access to your system.
 
Completely updated for 2016, this step-by-step guide covers:
  • Kali Linux Introduction and Overview
  • Shodan (the “Hacker’s Google”)
  • Metasploit Tutorials
  • Exploiting Windows and Linux Systems
  • Escalating Privileges in Windows
  • Cracking Passwords and Obtaining Clear Text Passwords
  • Wi-Fi Attacks
  • Kali on a Raspberry Pi
  • Securing your Network
  • And Much More!
Though no computer can be completely “Hacker Proof” knowing how an attacker works will help put you on the right track of better securing your network!



Download it here :

CLICK HERE


OR


CLICK HERE

vendredi 9 décembre 2016

Mastering Modern Web Penetration Testing

Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!

 



Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques with an enhanced knowledge of web application security.
We will cover web hacking techniques so you can explore the attack vectors during penetration tests. The book encompasses the latest technologies such as OAuth 2.0, Web API testing methodologies and XML vectors used by hackers. Some lesser discussed attack vectors such as RPO (relative path overwrite), DOM clobbering, PHP Object Injection and etc. has been covered in this book.
We'll explain various old school techniques in depth such as XSS, CSRF, SQL Injection through the ever-dependable SQLMap and reconnaissance.
Websites nowadays provide APIs to allow integration with third party applications, thereby exposing a lot of attack surface, we cover testing of these APIs using real-life examples.
This pragmatic guide will be a great benefit and will help you prepare fully secure applications.

What You Will Learn

  • Get to know the new and less-publicized techniques such PHP Object Injection and XML-based vectors
  • Work with different security tools to automate most of the redundant tasks
  • See different kinds of newly-designed security headers and how they help to provide security
  • Exploit and detect different kinds of XSS vulnerabilities
  • Protect your web application using filtering mechanisms
  • Understand old school and classic web hacking in depth using SQL Injection, XSS, and CSRF
  • Grasp XML-related vulnerabilities and attack vectors such as XXE and DoS techniques
  • Get to know how to test REST APIs to discover security issues in them


Download this new ebook here :



OR




jeudi 24 novembre 2016

PHP and MySQL Web Development, Fifth Edition

The definitive guide to building database-driven Web applications with PHP and MySQL

 


 


PHP and MySQL are popular open-source technologies that are ideal for quickly developing database-driven Web applications. PHP is a powerful scripting language designed to enable developers to create highly featured Web applications quickly, and MySQL is a fast, reliable database that integrates well with PHP and is suited for dynamic Internet-based applications.

PHP and MySQL Web Development shows how to use these tools together to produce effective, interactive Web applications. It clearly describes the basics of the PHP language, explains how to set up and work with a MySQL database, and then shows how to use PHP to interact with the database and the server.

This practical, hands-on book consistently focuses on real-world applications, even in the introductory chapters. The authors cover important aspects of security and authentication as they relate to building a real-world website and show you how to implement these aspects in PHP and MySQL. They also introduce you to the integration of front-end and back-end technologies by using JavaScript in your application development.

The final part of this book describes how to approach real-world projects and takes the reader through the design, planning, and building of several projects, including:
  • User authentication and personalization
  • Web-based email
  • Social media integration
The fifth edition of PHP and MySQL Web Development has been thoroughly updated, revised, and expanded to cover developments in PHP through versions 5.6 and 7, as well as features introduced in recent stable releases of MySQL.


Download it here :


OR
 

mardi 22 novembre 2016

CCNA Security (210-260) Portable Command Guide 2nd Edition






Preparing for the latest CCNA Security exam? Here are all  the CCNA Security (210-260) commands you need in one condensed, portable resource. Filled with valuable, easy-to-access information, the CCNA Security Portable Command Guide, is portable enough for you to use whether you’re in the server room or the equipment closet.

Completely updated to reflect the new CCNA Security 210-260 exam, this quick reference summarizes relevant Cisco IOS® Software commands, keywords, command arguments, and associated prompts, and offers tips and examples for applying these commands to real-world security challenges. Configuration examples, throughout, provide an even deeper understanding of how to use IOS to protect networks.

Topics covered include

  • Networking security fundamentals: concepts, policies, strategy
  •  Protecting network infrastructure: network foundations, security management planes/access; data planes (Catalyst switches and IPv6)
  •  Threat control/containment: protecting endpoints and content; configuring ACLs, zone-based firewalls, and Cisco IOS IPS
  •  Secure connectivity: VPNs, cryptology, asymmetric encryption, PKI, IPsec VPNs, and site-to-site VPN configuration
  •  ASA network security: ASA/ASDM concepts; configuring ASA basic settings, advanced settings, and VPNs
 Access all CCNA Security commands: use as a quick, offline resource for research and solutions

  • Logical how-to topic groupings provide one-stop research
  • Great for review before CCNA Security certification exams
  • Compact size makes it easy to carry with you, wherever you go
  •  “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs
  •  “What Do You Want to Do?” chart inside the front cover helps you to quickly reference specific tasks


Download it here :


CLICK HERE


OR


CLICK HERE

vendredi 18 novembre 2016

Hacking, sécurité et tests d'intrusion avec Metasploit ( Version Française )





Le framework Metasploit, qui permet de découvrir et d'exploiter les failles de sécurité, est l’un des outils les plus utilisés par les professionnels de la sécurité informatique. Avec ce livre, les lecteurs débutants apprendront les bases de la sécurité informatique et du test d’intrusion, les conventions du framework Metasploit et la prise en main de son interface. Ils seront également en mesure de moduler, personnaliser et automatiser des attaques simultanées. Les lecteurs plus expérimentés trouveront le détail de toutes les techniques avancées : la reconnaissance réseau et l’énumération, les attaques côté client, les attaques sans fil et l’ingénierie sociale.

Grâce cet ouvrage :
• Découvrez et maîtrisez les fondements de Metasploit.
• Trouvez et exploitez des systèmes non maintenus, mal configurés ou pas à jour.
• Effectuez des reconnaissances et trouvez des informations utiles sur votre cible.
• Contournez les antivirus et les systèmes de contrôle (IDS/IPS).
• Intégrez Nmap, NeXpose, et Nessus dans Metasploit pour automatiser le processus de découverte.
• Maîtrisez les utilitaires Metasploit, les outils tiers et les plug-ins.
• Écrivez vos propres modules Metasploit et scripts de post-exploitation.
• Découvrez les modules pour la recherche de failles «0-day», l’écriture d’un fuzzer, le portage d’exploits existants vers le framework, masquez vos traces.


Télécharger ce livre ici :

CLIQUER ICI


OU BIEN


CLIQUER ICI

Metasploit: The Penetration Tester's Guide 1st Edition (English Version and The Original Edition )

"The best guide to the Metasploit Framework."—HD Moore, Founder of the Metasploit Project





The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.
Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.
Learn how to:
  • Find and exploit unmaintained, misconfigured, and unpatched systems
  • Perform reconnaissance and find valuable information about your target
  • Bypass anti-virus technologies and circumvent security controls
  • Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
  • Use the Meterpreter shell to launch further attacks from inside the network
  • Harness standalone Metasploit utilities, third-party tools, and plug-ins
  • Learn how to write your own Meterpreter post exploitation modules and scripts
You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.


Download this ebook here


CLICK HERE


OR


CLICK HERE

Kali Linux 2 Assuring Security by Penetration Testing - Third Edition






 Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.

Kali Linux 2 is considered as the most significant release of Kali since 2013. You can use it to practice reconnaissance, social engineering, exploitation, and maintain access to your target. You can also document and report verified test results as well as perform a complete Kali Linux testing methodology.

In the third edition of this book, we focus on the use of Kali Linux 2, a free Linux distribution that contains a number of tools related to penetration testing. This book will provide you with the skills needed so you can conduct penetration testing effectively. We’ll start by showing you how to install Kali Linux then walk you through the steps of using Kali Linux to penetration test, and finally guide you through proper reporting.

What you will learn

  • Find out to download and install your own copy of Kali Linux
  • Properly scope and conduct the initial stages of a penetration test
  • Conduct reconnaissance and enumeration of target networks
  • Exploit and gain a foothold on a target system or network
  • Obtain and crack passwords
  • Use the Kali Linux NetHunter install to conduct wireless penetration testing
  • Create proper penetration testing reports

Download this ebook here :

CLICK HERE

OR

CLICK HERE

Murach's SQL Server 2016 for Developer






If you’re an application developer, or you’re training to be one, this 2016 edition of Murach’s classic SQL Server book is made for you.
To start, it presents the SQL statements that you need to retrieve and update the data in a database. These are the SQL statements that you’ll use every day. Then, it shows you how to design a database, how to implement that design, and how to work with database features like views, scripts, stored procedures, functions, triggers, transactions, security, XML data, BLOB data with FILESTREAM storage, and the CLR integration feature.
The result? You’ll be able to create database applications that are thoroughly professional. You’ll be familiar with the DBA-related issues that let you work far more effectively than most of your colleagues. And you’ll have a handy reference at your side to answer questions and handle new challenges as they come up.


Download it here :


CLICK HERE


OR


CLICK HERE

C# 6 for Programmers 6th Edition

The professional programmer’s Deitel® guide to C# 6 and object-oriented development for Windows®








Written for programmers with a background in high-level language programming, this book applies the Deitel signature live-code approach to teaching programming and explores Microsoft’s C# 6 and .NET in depth. Concepts are presented in the context of 170+ fully coded and tested apps, complete with syntax shading, code highlighting, code walkthroughs, program outputs and hundreds of savvy software-development tips.

Start with an introduction to C# using an early classes and objects approach, then rapidly move on to more advanced topics, including LINQ, asynchronous programming with async and await and more. You’ll enjoy the treatment of object-oriented programming and an object-oriented design/UML® ATM case study, including a complete C# implementation. When you’ve mastered the book, you’ll be ready to start building industrial-strength, object-oriented C# apps.


Download this ebook (mediafire Links) :
 
 
OR
 
 
 

Mastering Hyper-V 2012 R2 with System Center and Windows Azure





This book will help you understand the capabilities of Microsoft Hyper-V, architect a Hyper-V solution for your datacenter, plan a deployment/migration, and then manage it all using native tools and System Center. Coverage also includes hybrid cloud scenarios specifically with Windows Azure to complete the full virtualization piece of providing data both on premise and off premise.

In addition, you will explore the Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities, how seamless management is possible with PowerShell and System Center, plus how Azure Storage can play a part in a company’s complete solution.

Key topics covered include: virtualization fundamentals, network virtualization, storage configuration, Hyper-V management and maintenance, failover clustering and migration, Hyper-V replica and cloud orchestration, private cloud implementation, Azure IaaS, Azure storage, managing with PowerShell, Hyper-V decoding, and Windows Server 2012 R2 integration.


Download this ebook :

jeudi 17 novembre 2016

MCSA Windows Server 2012 R2 Complete Study Guide: Exams 70-410, 70-411, 70-412, and 70-417

Prepare for the MCSA Windows Server 2012 R2 Exams






Microsoft's new version of the MCSA certification for Windows Server 2012 R2 requires passing three exams (or one Upgrade exam if you have your MCSA or MCITP in Windows Server 2008). This value-priced study guide includes more than 1,000 pages of quality exam-prep content, covering 100% of the objective domains of all three exams (as well as the Upgrade exam, 70-417).
In addition, you get access to an interactive practice test environment with more than 500 questions, electronic flashcards, and videos showing how to perform the more difficult tasks. Both first-time MCSA candidates and those wishing to upgrade from Server 2008 certification will benefit from this complete test-prep guide.
  • Completely updated to cover the Windows Server 2012 R2 Exams
  • Provides a comprehensive study guide for all three MCSA Windows Server 2012 R2 exams: 70-410, 70-411, and 70-412, as well as the Upgrade exam: 70-417
  • Covers installing and configuring Windows Server 2012; deploying and configuring DNS service; administratrice Active Directory; creating and managing Group Policy Objects; and configuring server roles and features, Hyper-V, and core networking services
  • Explains basic networking concepts, DHCP, deploying and maintaining servers, configuring a network policy server infrastructure and high availability in Windows Server 2012, and much more
  • Features real-world scenarios, hands-on exercises, practice exam questions, electronic flashcards, and over an hour of video demonstrations
  • Covers all exam objectives
MCSA Windows Server 2012 R2 Complete Study Guide arms you with all the information you must master to achieve MCSA certification on Windows Server 2012 R2.


Download this ebook ;

CLICK HERE

OR

CLICK HERE

mercredi 16 novembre 2016

SQL pour Oracle

Applications avec Java, PHP et XML : optimisation des requêtes et schémas : avec 50 exercices corrigés

 

 

Cet ouvrage permet d'acquérir les notions essentielles d'Oracle, leader des systèmes de gestion de bases de données. Concis et de difficulté progressive, il est émaillé de nombreux exemples et de 50 exercices corrigés qui illustrent tous les aspects fondamentaux de SQL. Couvrant les versions 9i à 12c d'Oracle, il permet de se familiariser avec ses principales fonctionnalités, ainsi qu'avec les API les plus utilisées (JBDC, PHP et XML). La septième édition de cet ouvrage a été entièrement mise à jour avec la version 12c d'Oracle.


Télécharger ce livre ici :

CLIQUER ICI

 OR

CLIQUER ICI

 

 

 

CCNA 200-125 Workbook - Sikandar Shaik






CCNA Routing and Switching 200-125 Official Cert Guide Library, Academic Edition is a comprehensive textbook and study package that provides you with an introduction to foundational networking concepts and hands-on application. The two books contained in this package, CCENT/CCNA ICND1 100-105 Official Cert Guide, Academic Edition and CCNA Routing and Switching ICND2 200-105 Official Cert Guide, Academic Edition, present you with a detailed overview of network configuration and troubleshooting. Best-selling author and expert instructor Wendell Odom shares study hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

· A test-preparation routine proven to help you pass the exams

· Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section

· Chapter-ending and part-ending exercises, which help you drill on key concepts you must know thoroughly

· Troubleshooting sections, which help you master the complex scenarios you will face on the exam

· The powerful Pearson IT Certification Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports

· A free copy of the CCNA ICND1 and ICND2 Network Simulator Lite software, complete with meaningful lab exercises that help you hone your hands-on skills with the command-line interface for routers and switches

· Links to a series of hands-on config labs developed by the author

· Online interactive practice exercises that help you hone your knowledge

· More than 2 hours of video mentoring from the author

· A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies

· Study plan suggestions and templates to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, these official study guides help you master the concepts and techniques that ensure your exam success.

These official study guides help you master all the topics on the CCNA exams, including

· Networking fundamentals

· Implementing basic Ethernet LANs

· Ethernet LANs: design, VLANs, and troubleshooting

· IPv4 addressing and subnetting

· Implementing IPv4

· IPv4 design and troubleshooting

· IPv4 services: ACLs, NAT, and QoS

· IPv4 routing protocols and routing

· Wide area networks

· IPv6

· Network management, SDN, and cloud computing



Download this ebook (Google Drive link) :

CLICK HERE


OR (Dropbox link)

CLICK HERE