Johnny has written or contributed to several books, including Google Hacking for Penetration Testers, InfoSec Career Hacking,Aggressive Network Self-Defense, Stealing the Network: How to Own an Identity, and OS X for Hackers at Heart, ...
Before we move on, there are a few other options that can be used with Nmap to test enterprise applications. One of the common traits of enterprise applications is that the application is often configured to run on ports which differ ...
Digital. Forensics. Most people today are using some type of electronic device, be it a cell phone, ... A variety of open source forensic tools, some of which are included in Backtrack, have been developed to perform some of the same ...
Provides information on penetration testing and how to keep a computer and a computer network secure.
This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible.
... security, network design, large enterprise applications, and project management. Jeremy was a Contributing Author to ... Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring (ISBN: 978-1-59749-173-0) ...