ICS515.4 Threat and Environment Manipulation
فهرست مطالب:
Case Study: BlackEnergy2
ICS Threat and Environment Manipulation Goals and Considerations
Analyzing Acquired Evidence
Case Study: Ukraine Power Grid Attack 2015
Malware Analysis Methodologies
Case Study: CRASHOVERRIDE
Documenting Knowledge
Case Study: TRISIS
Linux Essentials for Cybersecurity
فهرست مطالب:
Introduction
Part I: Introducing Linux
Part II: User and Group Accounts
Part III: File and Data Storage
Part IV: Automation
Part V: Networking
Part VI: Process and Log Administration
Part VII: Software Management
Part VIII: Security Tasks
Appendix A: Answers to Review Questions
Appendix B: Resource Guide
Glossary
Index
Mastering Kali Linux for Advanced Penetration Testing
فهرست مطالب:
Title Page
Copyright and Credits
Dedication
About Packt
Contributors
Preface
Goal-Based Penetration Testing
Open Source Intelligence and Passive Reconnaissance
Active Reconnaissance of External and Internal Networks
Vulnerability Assessment
Advanced Social Engineering and Physical Security
Wireless Attacks
Exploiting Web-Based Applications
Client-Side Exploitation
Bypassing Security Controls
Exploitation
Action on the Objective and Lateral Movement
Privilege Escalation
Command and Control
Embedded Devices and RFID Hacking
Other Books You May Enjoy