
Nagios Core Administration Cookbook - Second Edition
¥90.46
Over 90 hands-on recipes that will employ Nagios Core as the anchor of monitoring on your networkAbout This BookMaster the advanced configuration techniques of Nagios Core to model your network better by improving hosts, services, and contactsFilter and improve the notifications that Nagios Core sends in response to failed checks, which can greatly assist you when diagnosing problemsPull Nagios Core's data into a database to write clever custom reports of your own deviseWho This Book Is ForIf you are a network or system administrator and are looking for instructions and examples on working with Nagios Core, then this book is for you. Some basic shell command-line experience is required, and some knowledge of *ing would be helpful when we discuss how plugins work.What You Will LearnManage the configuration of Nagios Core with advanced techniques to achieve fine detail in your checksFind, install, and even write your own check pluginsFilter notifications to send them to the right people or programs at the right timeWork around difficult network accessibility issues and delegate checks to other machinesTweak a Nagios Core server to achieve both high performance and redundancy in case of disasterProcess the results of checks performed by other machines to monitor backups and similar processesExtend Nagios Core to allow advanced *ing, reporting, and network visualization behaviorIn DetailNagios Core is an open source monitoring framework suitable for any network that ensures both internal and customer-facing services are running correctly and manages notification and reporting behavior to diagnose and fix outages promptly. It allows very fine configuration of exactly when, where, what, and how to check network services to meet both the uptime goals of your network and systems team and the needs of your users.This book shows system and network administrators how to use Nagios Core to its fullest as a monitoring framework for checks on any kind of network services, from the smallest home network to much larger production multi-site services. You will discover that Nagios Core is capable of doing much more than pinging a host or to see whether websites respond.The recipes in this book will demonstrate how to leverage Nagios Core's advanced configuration, *ing hooks, reports, data retrieval, and extensibility to integrate it with your existing systems, and to make it the rock-solid center of your network monitoring world.Style and approachEach chapter contains a set of step-by-step recipes to perform an example of a commonly performed task related to network administration. The book begins by focusing closely on the properties and configuration of Nagios Core itself, and gradually moves on to other pieces of software that can support, manage, and extend the system.

Moodle 3 Administration - Third Edition
¥90.46
An administrator’s guide to configuring, securing, customizing, and extending MoodleAbout This BookLearn how to plan, install, optimize, customize, and configure MoodleGuarantee a cutting-edge learning experience in a secure and customizable environment while optimizing your day-to-day workloadA one-stop guide with a problem-solution approach and a wide range of real-world examplesWho This Book Is ForIf you are a technician, systems administrator, or part of academic staff, this is the book for you. This book is ideal for anyone who has to administer a Moodle system. Whether you are dealing with a small-scale local Moodle system or a large-scale multi-site Virtual Learning Environment, this book will assist you with any administrative task. Some basic Moodle knowledge is helpful, but not essential.What You Will LearnInstall and update Moodle on multiple platforms manually and via CLI and GITManage courses and categories, users and cohorts, as well as rolesGet Moodle hooked up to repositories, portfolios, and open badgesConfigure Moodle for mobile usage, accessibility, localization, communication, and collaborationGuarantee backups, security and privacy, and achieve maximum performance via the Moodle Universal Cache and the new cron systemConfigure the Moodle events system to generate comprehensive reports, statistics, and learning analyticsNetwork Moodle with Mahara and extend it with third-party add-ons and via LTICustomize Moodle web services to enable mobile learning and integration with other IT systemsIn DetailMoodle is the de facto standard for open source learning platforms. However, setting up and managing a learning environment can be a complex task since it covers a wide range of technical, organizational, and pedagogical topics. This ranges from basic user and course management, to configuring plugins and design elements, all the way to system settings, performance optimization, events frameworks, and so on.This book concentrates on basic tasks such as how to set up and configure Moodle and how to perform day-to-day administration activities, and progresses on to more advanced topics that show you how to customize and extend Moodle, manage courses, cohorts, and users, and how to work with roles and capabilities. You’ll learn to configure Moodle plugins and ensure your VLE conforms to pedagogical and technical requirements in your organization. You’ll then learn how to integrate the VLE via web services and network it with other sites, including Mahara, and extend your system via plugins and LTI. By the end of this book, you will be able to set up an efficient, fully fledged, and secure Moodle system.Style and approachThe book takes a problem-solution approach to fall in line with your day-to-day operations. This is a one-stop reference for any task you will ever come across when administering a Moodle site of any shape and size.

Kali Linux Web Penetration Testing Cookbook
¥90.46
Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2About This BookFamiliarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of themSet up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploitsLearn how to prevent vulnerabilities in web applications before an attacker can make the most of itWho This Book Is ForThis book is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. You should know the basics of operating a Linux environment and have some exposure to security technologies and tools.What You Will LearnSet up a penetration testing laboratory in a secure wayFind out what information is useful to gather when performing penetration tests and where to look for itUse crawlers and spiders to investigate an entire website in minutesDiscover security vulnerabilities in web applications in the web browser and using command-line toolsImprove your testing efficiency with the use of automated vulnerability scannersExploit vulnerabilities that require a complex setup, run custom-made exploits, and prepare for extraordinary scenariosSet up Man in the Middle attacks and use them to identify and exploit security flaws within the communication between users and the web serverCreate a malicious site that will find and exploit vulnerabilities in the user's web browserRepair the most common web vulnerabilities and understand how to prevent them becoming a threat to a site's securityIn DetailWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform and operating system that provides a huge array of testing tools, many of which can be used specifically to execute web penetration testing.This book will teach you, in the form step-by-step recipes, how to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and ultimately buffer attackable surfaces so applications are more secure, for you and your users.Starting from the setup of a testing laboratory, this book will give you the skills you need to cover every stage of a penetration test: from gathering information about the system and the application to identifying vulnerabilities through manual testing and the use of vulnerability scanners to both basic and advanced exploitation techniques that may lead to a full system compromise. Finally, we will put this into the context of OWASP and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively. By the end of the book, you will have the required skills to identify, exploit, and prevent web application vulnerabilities.Style and approachTaking a recipe-based approach to web security, this book has been designed to cover each stage of a penetration test, with de*ions on how tools work and why certain programming or configuration practices can become security vulnerabilities that may put a whole system, or network, at risk. Each topic is presented as a sequence of tasks and contains a proper explanation of why each task is performed and what it accomplishes.

Mobile Application Penetration Testing
¥90.46
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them About This Book Gain insights into the current threat landscape of mobile applications in particular Explore the different options that are available on mobile platforms and prevent circumventions made by attackers This is a step-by-step guide to setting up your own mobile penetration testing environment Who This Book Is For If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then this book is for you. This book will provide you with all the skills you need to get started with Android and iOS pen-testing. What You Will Learn Gain an in-depth understanding of Android and iOS architecture and the latest changes Discover how to work with different tool suites to assess any application Develop different strategies and techniques to connect to a mobile device Create a foundation for mobile application security principles Grasp techniques to attack different components of an Android device and the different functionalities of an iOS device Get to know secure development strategies for both iOS and Android applications Gain an understanding of threat modeling mobile applications Get an in-depth understanding of both Android and iOS implementation vulnerabilities and how to provide counter-measures while developing a mobile app In Detail Mobile security has come a long way over the last few years. It has transitioned from "should it be done?" to "it must be done!"Alongside the growing number of devises and applications, there is also a growth in the volume of Personally identifiable information (PII), Financial Data, and much more. This data needs to be secured. This is why Pen-testing is so important to modern application developers. You need to know how to secure user data, and find vulnerabilities and loopholes in your application that might lead to security breaches. This book gives you the necessary skills to security test your mobile applications as a beginner, developer, or security practitioner. You'll start by discovering the internal components of an Android and an iOS application. Moving ahead, you'll understand the inter-process working of these applications. Then you'll set up a test environment for this application using various tools to identify the loopholes and vulnerabilities in the structure of the applications. Finally, after collecting all information about these security loop holes, we'll start securing our applications from these threats. Style and approach This is an easy-to-follow guide full of hands-on examples of real-world attack simulations. Each topic is explained in context with respect to testing, and for the more inquisitive, there are more details on the concepts and techniques used for different platforms.

Cisco UCS Cookbook
¥90.46
Over 40 practical recipes to get your hands dirty with the powerful Cisco UCS and overcome various challenges About This Book Master the skills of minimizing cost, enabling your business to work faster by reducing cycle times for reporting and improving overall revenue Work through hands-on recipes for efficient deployment approaches, see computing techniques, and explore new operational models with UCS Render a better work-flow management, ensure effective monitoring, and learn new deployment paradigms for the operational infrastructure with the help of this book Who This Book Is For This book is for competent system/network or storage administrators who are working with Cisco UCS, but now want to learn new ways to compute UCS. What You Will Learn Familiarize yourself with information on the latest information on memory management practices, virtualization architectures, and the specific technical advantages of UCS Get a concrete understanding of integrating processes and techniques to ensure effective convergence of LAN/SAN Get to know the best practices of Cisco UCS, EMC Storage, and VMware vSphere Master migrating data from other band servers or Blade to Cisco UCS Comprehend how to replicate and back up UCS to remote sites UCS Assimilate innovative techniques to deploy UCS to leverage its full potential Gather information on installing and configuring automatic and manual Pinning Discover ways to integrate a system in Cisco UCS In Detail Cisco Unified Computing System (UCS) is a data center server platform that is used for computing, deploying, and storing resources in data center environments. This cookbook aims to teach you about various tasks you can implement to improve your existing method of configuring and deploying UCS. You will start by learning how to upgrade your firmware on Brocade and Cisco Fibre Channel Switch and will move on to enhance your knowledge of LAN connectivity. We will then discuss how to configure Windows 2008 and 2012 local boot in Cisco UCS. Next, you will learn how to install the operating system on Cisco UCS and use Cisco UCS Power Calculator to calculate the UCS consumption. Finally, we’ll take a look at backup solutions. By the end of the book, you will know several ways to build and compute in data center environment using Cisco UCS. Style and approach This guide explains every task in a conversational and easy-to-follow style. You can open this book up to the task you want to learn and will be able to perform that task by the end of the recipe.

Mastering Wireshark
¥90.46
Analyze data network like a professional by mastering Wireshark - From 0 to 1337 About This Book Master Wireshark and train it as your network sniffer Impress your peers and get yourself pronounced as a network doctor Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network anomalies Who This Book Is For Are you curious to know what’s going on in a networkDo you get frustrated when you are unable to detect the cause of problems in your networksThis is where the book comes into play. Mastering Wireshark is for developers or network enthusiasts who are interested in understanding the internal workings of networks and have prior knowledge of using Wireshark, but are not aware about all of its functionalities. What You Will Learn Install Wireshark and understand its GUI and all the functionalities of it Create and use different filters Analyze different layers of network protocols and know the amount of packets that flow through the network Decrypt encrypted wireless traffic Use Wireshark as a diagnostic tool and also for network security analysis to keep track of malware Troubleshoot all the network anomalies with help of Wireshark Resolve latencies and bottleneck issues in the network In Detail Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form. Mastering Wireshark will help you raise your knowledge to an expert level. At the start of the book, you will be taught how to install Wireshark, and will be introduced to its interface so you understand all its functionalities. Moving forward, you will discover different ways to create and use capture and display filters. Halfway through the book, you’ll be mastering the features of Wireshark, analyzing different layers of the network protocol, looking for any anomalies. As you reach to the end of the book, you will be taught how to use Wireshark for network security analysis and configure it for troubleshooting purposes. Style and approach Every chapter in this book is explained to you in an easy way accompanied by real-life examples and screenshots of the interface, making it easy for you to become an expert at using Wireshark.

CentOS 7 Linux Server Cookbook - Second Edition
¥90.46
Over 80 recipes to get up and running with CentOS 7 Linux serverAbout This BookA practical guide to install, configure, administer and maintain CentOS 7 serversAn in-depth guide to the CentOS 7 operating system, exploring its various new features and changes in server administrationPresents tricks and solutions to tackle common server issues with the help of practical examples and real-life scenariosWho This Book Is ForThis book is targeted at beginner and more experienced system administrators alike who want to use CentOS as their server solution. Readers do not need much pre-knowledge or experience at all to work with this book.What You Will LearnInstall and configure CentOS 7 Linux server system from scratch using normal and advanced methodsMaintain a performance-based and secure server solution by deploying expert configuration advice and managing software packagesMonitor, manage and develop your server's file system to maintain a stable performanceGain best practice methods on sharing files and resources through a networkInstall and configure common standard services such as web, mail, FTP, database and domain name server technologiesIntroduce you to the world of operating-system-level virtualization using the Docker platform.Understand the fundamentals of the Security-Enhanced Linux access control architectureMonitor your IT infrastructure using NagiosIn DetailThis book will provide you with a comprehensive series of starting points that will give you direct access to the inner workings of the latest CentOS version 7 and help you trim the learning curve to master your server.You will begin with the installation and basic configuration of CentOS 7, followed by learning how to manage your system, services and software packages. You will then gain an understanding of how to administer the file system, secure access to your server and configure various resource sharing services such as file, printer and DHCP servers across your network. Further on, we cover advanced topics such as FTP services, building your own DNS server, running database servers, and providing mail and web services. Finally, you will get a deep understanding of SELinux and you will learn how to work with Docker operating-system virtualization and how to monitor your IT infrastructure with Nagios.By the end of this book, you will have a fair understanding of all the aspects of configuring, implementing and administering CentOS 7 Linux server and how to put it in control.Style and approachThis book is a practical reference guide with hands-on examples and solutions to real-world administration problems. It covers in-depth and comprehensive information on CentOS 7 and its new features.

Mastering Puppet - Second Edition
¥90.46
Master Puppet for configuration management of your systems in an enterprise deploymentAbout This BookThis book is an advanced guide to using and deploying Puppet 4 in your organization with a special focus on issues faced in larger enterprise deploymentsFrom an experienced author, learn to deal with scaling, performance, and multiple developers with the help of real-world examplesThis is the most up-to-date guide on Puppet, and covers the advanced concepts of Puppet 4Who This Book Is ForThis book is for those who have intermediate knowledge of Puppet and are looking to deploy it in their environment. Some idea how to write simple modules for configuration management with Puppet is a prerequisite for this book.What You Will LearnScale out your Puppet infrastructure using proxying techniquesAutomate your code promotion workflow using Git and r10kSolve real-world problems using public modules from the Puppet ForgeUse Hiera to separate the data of your configuration from the code of your configurationWrite your own custom facts in RubyExtend Puppet with your own custom facts, modules, and typesUse exported resources to orchestrate change between machinesDebug a puppetserver using Java techniquesIn DetailPuppet is a configuration management system and a language. It was written for and by system administrators to manage large numbers of systems efficiently and prevent configuration drifts.Mastering Puppet deals with the issues faced when scaling out Puppet to handle large numbers of nodes. It will show you how to fit Puppet into your enterprise and allow many developers to work on your Puppet code simultaneously. In addition, you will learn to write custom facts and roll your own modules to solve problems. Next, popular options for performing reporting and orchestration tasks will be introduced in this book. Moving over to troubleshooting techniques, which will be very useful. The concepts presented are useful to any size organization.By the end of the book, you will know how to deal with problems of scale and exceptions in your code, automate workflows, and support multiple developers working simultaneously.Style and approachThis book is a step-wise guide packed with examples to help you configure complex systems in Puppet.

Spring Roo 1.1 Cookbook
¥90.46
This is a cookbook full of recipes with the essential code explained clearly and comprehensively. The recipes are organized so well that you will have no problems in using this cookbook as a reference too. Spring Roo 1.1 Cookbook is for developers new to the Spring Roo tool but with experience developing applications using Spring framework, AspectJ, JPA, GWT, and technologies/frameworks supported by Spring Roo. If you are new to the Spring framework, then it is recommended to refer to a text covering Spring, before reading this Cookbook.

Microsoft SharePoint 2010 Development with Visual Studio 2010: Expert Cookbook
¥90.46
This book follows a step-by-step approach to learning the building blocks of SharePoint application development. This book focuses on SharePoint 2010 development using Visual studio 2010. The book provides a hands-on approach to solving problems and creating business solutions for enhancing SharePoint 2010 environment. This book is for .NET developers to understand the building blocks for SharePoint 2010. Although the book can be used by beginners, it is recommended to have understanding of the previous versions of SharePoint. Developing SharePoint solutions needs solid understanding of ASP.NET architecture. The book assumes that the reader is familiar with ASP.NET technology and development concepts.

Microsoft Windows Communication Foundation 4.0 Cookbook for Developing SOA Appli
¥90.46
The recipes in this book are easy to understand and follow as the author discusses real-world scenarios. The range of topics covered in this book will bring out the forward-thinking WCF developer in you. It is not a comprehensive reference to the whole of WCF, but a practical guide that boosts proficiency when working with the various features of WCF. The examples are supported by relevant background information for ease of understanding. If you work with Windows Communication Foundation 4.0 and you want to be efficient when working with WCF features such as interoperability, proxy generation, and security, you will find this book very useful. With this book you will be able to find quick and handy solutions for various kinds of service development scenarios using Microsoft Windows Communication Foundation 4.0. To follow the recipes you will need to be comfortable with .NET Framework, C# programming, and the basics of SOA and how to develop them.

Silverlight 4 User Interface Cookbook
¥90.46
Written in a Cookbook style, this book offers learning and techniques through recipes. It contains step-by-step instructions for designers and developers who want to learn about how to design and implement numerous user interface patterns with Silverlight. It will take you a step further by providing you with professional and proven user interface and user experience guidelines wherever possible. The book is designed in such a way that you can explore it chapter-by-chapter, or read it in any order. Written in a Cookbook style, this book offers learning and techniques through recipes. It contains step-by-step instructions for designers and developers who want to learn about how to design and implement numerous user interface patterns with Silverlight. It will take you a step further by providing you with professional and proven user interface and user experience guidelines wherever possible. The book is designed in such a way that you can explore it chapter-by-chapter, or read it in any order.

Microsoft Dynamics AX 2009 Administration
¥90.46
A practical tutorial, this book shows you how to set up and configure Dynamics AX 2009 and then how to improve and maintain its performance with clear step-by-step instructions, enabling Dynamics AX to fit your company's needs. If you are a network administrator or IT personnel charged with setting up and configuring Dynamics AX 2009 in your company, then this book is for you. A basic knowledge of Dynamics AX 2009 and general Windows Server Administration is required and familiarity with maintaining a SQL Server database server. Additionally, if you are a VAR tasked with implementing Dynamics AX into companies, then this book will provide you with a good overview and details of the whole Dynamics AX 2009 system.

Oracle Database 11g – Underground Advice for Database Administrators
¥90.46
This book is designed to cover the problems that novice DBAs particularly struggle with. This handbook covers a minimal amount of theoretical information before showing you how to overcome common problems through the use of real-life examples. It covers both Oracle 11g R1 and 11g R2 in examples, with material applicable to all versions of Oracle. This book is for you if you find yourself in charge of an Oracle database. It can be easy to feel overwhelmed. Whether you are a single employee or the DBA manager of several employees, whether you are taking over an existing position or taking up a newly created one – this book is designed to be a sanity check. If you need guidance for migrating to 11g or implementing Oracle's Maximum Availability Architecture, you will find this book very helpful.

Flash Multiplayer Virtual Worlds
¥90.46
This is a step-by-step, hands-on guide that is filled with examples and screenshots of building a multiplayer virtual world. The virtual world is built gradually; each chapter in the book sequentially develops the virtual world. The author explains the fundamentals with examples from existing virtual worlds such as Club Penguin, Mole, Dofus, and World of Warcraft. If you are a Flash or an ActionScript developer who wants to build powerful and immersive multiplayer games, this book is for you. This book assumes that you have some experience with ActionScript 3.0.

ColdFusion 9 Developer Tutorial
¥90.46
This book is a fast-paced tutorial to developing ColdFusion applications, with an emphasis on real-world skills. Packed with examples and careful explanations, the book leads you through all the topics relevant to today's ColdFusion developer. This book is for web developers working with ColdFusion 9. If your goal is to get a good grounding in the basics of the language as quickly as possible and put a site together quickly, this book is ideal for you. This book will also help you if you want to learn more about professional programming of ColdFusion. No prior knowledge of ColdFusion is expected, but basic knowledge of general web and software development skills is assumed.

Moodle 1.9: The English Teacher's Cookbook
¥90.46
This book follows a cookbook style, which will help you achieve outstanding results using ready-to-use recipes for reading comprehension, writing, and composition holding hands with Moodle 1.9 in the Web 2.0 Era. Each recipe is unique; some deal with similar teaching techniques, but they show how to develop the same technique using different software, situations, or topics. Images, videos, poems, songs, artists, classic stories, cartoons, superheroes, painting, the environment, and comics are inserted into the Moodle course, in order to be used as either prewriting or writing activities. If you are an English teacher who wants to discover practical, funny, and engaging activities to insert in your course, this is a perfectly designed book for you. It will help you to use different techniques in the teaching of reading comprehension, writing, and composition using a great variety of resources from the free and open source software available in the Web and interesting websites as well as social networks. You need basic experience with Moodle 1.9 or 1.9.5, as well as installation and configuration procedures.

Tcl 8.5 Network Programming
¥90.46
The book is written so that both experienced and novice Tclers can find useful information inside. It starts with quick introduction to Tcl and its networking support for those who are less familiar with them. Authors focus on showing practical, yet simple examples for each module and command described so that reader understands how to use them when solving the real life problems. The examples given are useful programs that try to solve real-world needs. All sample programs are clear and concise yet nothing essential is left out and the programming style focuses on readability rather than on stylistic rigor or efficiency. This book is for Tcl developers with basic network programming concepts, who want to add networking capabilities to their applications. Working knowledge of Tcl and basic experience of network protocols will be useful. The reader should be familiar with basic concepts used in modern networking – keywords like TCP, HTTP or XML should not be a mystery. The book does not require advanced knowledge of Tcl – the first chapters will swiftly introduce the reader into it, allowing refreshing the information or gaining a quick overview of the Tcl language abilities.

Cisco ACI Cookbook
¥90.46
Over 90 recipes to maximize automated solutions and policy-drive application profiles using Cisco ACI About This Book ? Confidently provision your virtual and physical infrastructure for application deployment ? Integrate Cisco ACI with hypervisors and other third party devices ? Packed with powerful recipes to automate your IT operations Who This Book Is For If you are a network administrator, system administrator, or engineer and are aware of the basics of Cisco ACI but want to start using it to automate your tasks, then this book is for you What You Will Learn ? Master the Cisco ACI architecture ? Discover the ACI fabric with easy-to-follow steps ? Set up quality of service within ACI ? Configure external networks with Cisco ACI ? Integrate with VMware and track VMware virtual machines ? Configure apply and verify access policies ? Extend or migrate a VMware virtual-machine LAN inside the ACI fabric ? Monitor ACI with third party tools and troubleshoot issues In Detail Cisco Application Centric Infrastructure (ACI) is a tough architecture that automates IT tasks and accelerates data-center application deployments. This book focuses on practical recipes to help you quickly build, manage, and customize hybrid environment for your organization using Cisco ACI. You will begin by understanding the Cisco ACI architecture and its major components. You will then configure Cisco ACI policies and tenants. Next you will connect to hypervisors and other third-party devices. Moving on, you will configure routing to external networks and within ACI tenants and also learn to secure ACI through RBAC. Furthermore, you will understand how to set up quality of service and network programming with REST, XML, Python and so on. Finally you will learn to monitor and troubleshoot ACI in the event of any issues that arise. By the end of the book, you will gain have mastered automating your IT tasks and accelerating the deployment of your applications. Style and approach A set of exciting recipes to automate your IT operations related to datacenters, the Cloud, and networking tasks

Kali Linux Network Scanning Cookbook - Second Edition
¥90.46
Over 100 practical recipes that leverage custom *s and integrated tools in Kali Linux to help you effectively master network scanning About This Book ? Learn the fundamentals behind commonly used scanning techniques ? Deploy powerful scanning tools that are integrated into the Kali Linux testing platform ? The practical recipes will help you automate menial tasks and build your own * library Who This Book Is For This book is for information security professionals and casual security enthusiasts alike. It provides foundational principles if you’re a novice, but will also introduce *ing techniques and in-depth analysis if you’re more advanced. Whether you are brand new to Kali Linux or a seasoned veteran, this book will help you both understand and ultimately master many of the most powerful and useful scanning techniques in the industry. It is assumed that you have some basic security testing experience. What You Will Learn ? Develop a network-testing environment to test scanning tools and techniques ? Understand the principles of network-scanning tools by building *s and tools ? Identify distinct vulnerabilities in web apps and remote services and learn how they are exploited ? Perform comprehensive scans to identify listening on TCP and UDP sockets ? Get started with different Kali desktop environments--KDE, MATE, LXDE, and Xfce ? Use Sparta for information gathering, port scanning, fingerprinting, vulnerability scanning, and more ? Evaluate DoS threats and learn how common DoS attacks are performed ? Learn how to use Burp Suite to evaluate web applications In Detail With the ever-increasing amount of data flowing in today’s world, information security has become vital to any application. This is where Kali Linux comes in. Kali Linux focuses mainly on security auditing and penetration testing. This step-by-step cookbook on network scanning trains you in important scanning concepts based on version 2016.2. It will enable you to conquer any network environment through a range of network scanning techniques and will also equip you to * your very own tools. Starting with the fundamentals of installing and managing Kali Linux, this book will help you map your target with a wide range of network scanning tasks, including discovery, port scanning, fingerprinting, and more. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment. The book offers expanded coverage of the popular Burp Suite and has new and updated *s for automating scanning and target exploitation. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. You will cover the latest features of Kali Linux 2016.2, which includes the enhanced Sparta tool and many other exciting updates. This immersive guide will also encourage the creation of personally *ed tools and the skills required to create them. Style and approach This step-by-step guide is full of recipes that will help you use integrated scanning tools in Kali Linux and develop custom *s to make new and unique tools of your own.

Nmap: Network Exploration and Security Auditing Cookbook - Second Edition
¥90.46
Over 100 practical recipes related to network and application security auditing using the powerful Nmap About This Book ? Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers. ? Learn the latest and most useful features of Nmap and the Nmap Scripting Engine. ? Learn to audit the security of networks, web applications, databases, mail servers, Microsoft Windows servers/workstations and even ICS systems. ? Learn to develop your own modules for the Nmap Scripting Engine. ? Become familiar with Lua programming. ? 100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments de*ion Who This Book Is For The book is for anyone who wants to master Nmap and its *ing engine to perform real life security auditing checks for system administrators and penetration testers. This book is also recommended to anyone looking to learn about network security auditing. Finally, novice Nmap users will also learn a lot from this book as it covers several advanced internal aspects of Nmap and related tools. What You Will Learn ? Learn about Nmap and related tools, such as Ncat, Ncrack, Ndiff, Zenmap and the Nmap Scripting Engine ? Master basic and advanced techniques to perform port scanning and host discovery ? Detect insecure configurations and vulnerabilities in web servers, databases, and mail servers ? Learn how to detect insecure Microsoft Windows workstations and scan networks using the Active Directory technology ? Learn how to safely identify and scan critical ICS/SCADA systems ? Learn how to optimize the performance and behavior of your scans ? Learn about advanced reporting ? Learn the fundamentals of Lua programming ? Become familiar with the development libraries shipped with the NSE ? Write your own Nmap Scripting Engine *s In Detail This is the second edition of 'Nmap 6: Network Exploration and Security Auditing Cookbook'. A book aimed for anyone who wants to master Nmap and its *ing engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security auditing tasks for local and remote networks, web applications, databases, mail servers, Microsoft Windows machines and even ICS SCADA systems are explained step by step with exact commands and argument explanations. The book starts with the basic usage of Nmap and related tools like Ncat, Ncrack, Ndiff and Zenmap. The Nmap Scripting Engine is thoroughly covered through security checks used commonly in real-life scenarios applied for different types of systems. New chapters for Microsoft Windows and ICS SCADA systems were added and every recipe was revised. This edition reflects the latest updates and hottest additions to the Nmap project to date. The book will also introduce you to Lua programming and NSE * development allowing you to extend further the power of Nmap. Style and approach This book consists of practical recipes on network exploration and security auditing techniques, enabling you to get hands-on experience through real life scenarios.