Ethical Hacking (EH) Module 1: Introduction to Ethical Hacking

Module Objectives Understanding the importance of security Introducing ethical hacking and essential terminology for the module Understanding the different phases involved in an exploit by a hacker Overview of attacks and identification of exploit categories Comprehending ethical hacking Legal implications of hacking Hacking, law and punishment Download ...
Read more ...

Stealing the Network: How to Own a Shadow

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress' ground breaking, best-selling, Stealing the Network series....
Read more ...

JavaScript Bible

JavaScript™ Bible 3rd Edition Survey of third-party authoring tools included! If JavaScript can do it, you can do it too … Create Web pages brimming with interactive content. Integrate Java applets without taxing your server. Deploy Dynamic HTML applications. With the expert advice of today's premier JavaScript authority and teacher, you'll quickly find out how to leverage the full power of JavaScript....
Read more ...

Manupulating microsoft sql server using sql injection

This paper will not cover basic SQL syntax or SQL Injection. It is assumed that the reader has a strong understanding of these topics already. This paper will focus on advanced techniques that can be used in an attack on a (web) application utilizing Microsoft SQL Server as a backend. These techniques demonstrate how an attacker could use a SQL Injection vulnerability to retrieve the database content...
Read more ...