Libros UCLV { BETA }

Gran cantidad de libros a nuestro alcance

Tenemos :
1413 libros,
263398 descargas y
1106 contribuyentes !

Se han encontrado 23 Coincidencias

Web Penetration Testing with Kali Linux


109 Visitas | 233 Descargas | 2015-07-16 16:12:05 | efirvida

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux.

Nmap Essentials

Networking


59 Visitas | 114 Descargas | 2015-09-07 20:41:16 | cbustillo

Nmap is an extremely powerful network port scanner used to identify hosts on a network. Nmap is free, flexible, powerful, and easy to implement, which makes it a very convenient utility. This book demonstrates how to run basic and advanced scans, optimizing them to perform well in a variety of environments. Starting with an overview of Nmap, the reader will be guided through installation on popular operating systems. The book then explains how to use Nmap to run basic and advanced scans in addition to using the Nmap Scripting Engine (NSE). All this helps with optimizing Nmap performance in a variety of environments, eventually enabling the reader to integrate with other Nmap tools such as Nessus, Nikto, Burp Suite, and NSE versus NASL scanning. By the end of the book, the reader will have gained essential insights into network security analysis.

Software Networks

Networking


81 Visitas | 110 Descargas | 2015-11-27 14:27:55 | cbustillo

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network equipment. This architecture deals with mechanisms capable of controlling automatically the placement of all virtual resources within the physical network. In this book, we describe how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of resource. We will show how this architecture is compatible with new advances in SDN, new high-speed transport protocol like TRILL and LISP, NGN, IMS, Wi-Fi new generation, and 4G/5G networks. Finally, we introduce the Cloud of security and the virtualisation of secure elements (smartcard) that should definitely transform how to secure the Internet.