1.

Record Nr.

UNINA9910459155103321

Autore

Broad James

Titolo

Hacking with Kali : practical penetration testing techniques / / James Broad, Andrew Bindner

Pubbl/distr/stampa

Waltham, MA : , : Syngress, , 2014

ISBN

0-12-407883-4

Edizione

[First edition.]

Descrizione fisica

1 online resource (238 p.)

Altri autori (Persone)

BindnerAndrew

Disciplina

238

Soggetti

Penetration testing (Computer security)

Computer networks - Security measures

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Front Cover; Hacking with Kali; Copyright Page; Dedication; Contents; 1 Introduction; Book Overview and Key Learning Points; Book Audience; Technical Professionals; Security Engineers; Students in Information Security and Information Assurance Programs; Who This Book Is Not for; Diagrams, Figures, and Screen Captures; Welcome; Penetration Testing Lifecycle; Terms; Penetration Testing, Pentesting; Red Team, Red Teaming; Ethical Hacking; White Hat; Black Hat; Grey Hat; Vulnerability Assessment, Vulnerability Analysis; Security Controls Assessment; Malicious User Testing, Mal User Testing

Social Engineering Phishing; Spear Phishing; Dumpster Diving; Live CD, Live Disk, or LiveOS; Kali History; References; 2 Download and Install Kali Linux; Chapter Overview and Key Learning Points; Kali Linux; System Information; Selecting a Hardware Platform for Installation; Hard Drive Selection; Partitioning the Hard Drive; Security During Installation; Downloading Kali; Hard Drive Installation; Booting Kali for the First Time; Installation-Setting the Defaults; Installation-Initial Network Setup; Passwords; Configuring the System Clock; Partitioning Disks; Configure the Package Manager

Installing the GRUB Loader Completing the Installation; Thumb Drive Installation; Windows (Nonpersistent); Linux (Persistent); SD Card Installation; Summary; 3 Software, Patches, and Upgrades; Chapter Overview and Key Learning Points; APT Package Handling Utility;



Installing Applications or Packages; Update; Upgrade; Distribution Upgrade; Remove; Auto Remove; Purge; Clean; Autoclean; Putting It All Together; Debian Package Manager; Install; Remove; Checking for Installed Package; Tarballs; Creation of a Tarball; Extracting Files from a Tarball; Compressing a Tarball

A Practical Guide to Installing Nessus Update and Clean the System Prior to Installing Nessus; Install and Configure Nessus; Conclusion; 4 Configuring Kali Linux; Chapter Overview and Key Learning Points; About This Chapter; The Basics of Networking; Private Addressing; Default Gateway; Name Server; DHCP; Basic Subnetting; Kali Linux Default Settings; Using the Graphical User Interface to Configure Network Interfaces; Using the Command Line to Configure Network Interfaces; Starting and Stopping the Interface; DHCP from the Command Prompt; Using the GUI to Configure Wireless Cards

Connection Name Connect Automatically Checkbox; Wireless Tab; Service Set Identifier; Mode; Basic Service Set Identification; Device MAC Address; Cloned MAC Address; Maximum Transmission Unit; Wireless Security Tab; Security Drop Down; Wired Equivalent Privacy; Lightweight Extensible Authentication Protocol; WiFi Protected Access; Passwords and Keys; IPv4 Settings Tab; Save; Web Server; Using the GUI to Start, Stop, or Restart the Apache Server; Starting, Stopping, and Restarting Apache at the Command Prompt; The Default Web Page; FTP Server; SSH Server; Generate SSH Keys

Managing the SSH Service from the Kali GUI

Sommario/riassunto

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services.    Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration



2.

Record Nr.

UNINA9910229339903321

Titolo

History and Digest of the International Arbitrations to Which the United States Has Been a Party

Pubbl/distr/stampa

Washington, : GPO

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

3.

Record Nr.

UNINA9910970637003321

Autore

Cheek Pamela

Titolo

Sexual antipodes : enlightenment globalization and the placing of sex / / Pamela Cheek

Pubbl/distr/stampa

Stanford, : Stanford University Press, 2003

ISBN

9780804780308

0804780307

Edizione

[1st ed.]

Descrizione fisica

1 online resource (260 p.)

Disciplina

820.9/3538

Soggetti

English literature - 18th century - History and criticism

Erotic literature, English - History and criticism

Sex in literature

French literature - 18th century - History and criticism

Travelers' writings, English - History and criticism

Travelers' writings, French - History and criticism

Erotic literature, French - History and criticism

Comparative literature - English and French

Comparative literature - French and English

Globalization - History - 18th century

Imperialism in literature

Sex customs in literature

Colonies in literature

Enlightenment

Oceania In literature

Lingua di pubblicazione

Inglese



Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references (p. [195]-236) and index.

Nota di contenuto

Front matter -- Contents -- Acknowledgments -- Introduction -- PART I. METROPOLITAN ALLEGORIES -- 1. National Character, Publicity and Sex -- 2. Public Women in the French Body Politic -- 3. Public Life in Enlightenment Pornography -- PART 2. ANTIPODES -- 4. The Sexual Nature of South Sea Islands -- 5. British Encounter: Recognizing Sensibility -- 6. French Encounter: Crafting Transparency -- Notes -- Index

Sommario/riassunto

Sexual Antipodes is about how Enlightenment print culture built modern national and racial identity out of images of sexual order and disorder in public life. It examines British and French popular journalism, utopian fiction and travel accounts about South Sea encounter, pamphlet literature, and pornography, as well as more traditional literary sources on the eighteenth century, such as the novel and philosophical essays and tales. The title refers to a premise in utopian and exoticist fiction about the southern portion of the globe: sexual order defines the character of the state. The book begins by examining how the idea of sexual order operated as the principle for explaining national differences in eighteenth-century contestation between Britain and France. It then traces how, following British and French encounters with Tahiti, the comparison of different national sexual orders formed the basis for two theories of race: race as essential character and race as degeneration.



4.

Record Nr.

UNINA9910973680003321

Autore

Koç Doğan

Titolo

Strategic defamation of Fethullah Gülen : English vs. Turkish / / Doğan Koç

Pubbl/distr/stampa

Lanham, Md., : University Press of America, Inc., c2012

ISBN

0-7618-8709-1

1-282-13399-3

9786613806574

0-7618-5931-4

Descrizione fisica

1 online resource (145 p.)

Disciplina

297.092

Soggetti

Libel and slander - Turkey

English language

Turkish language

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references.

Nota di contenuto

STraTeGIC DeFamaTIon of FeTHuLLaH GüLen; Contents; CHAPTER I: Introduction; CHAPTER 2. Fethullah Gülen and the Hizmet Movement; 2.1. Biography of Fethullah Gülen; 2.2. History of the Hizmet Movement; 2.2.1. Islam; 2.2.2. Education; 2.2.3. Dialogue; 2.2.4. Science and Modernity; 2.2.5. Politics; CHAPTER 3. Defamation of Gülen in Turkish; 3.1.1. American Puppet: Big Middle East Project; 3.1.2. Moderate Islam: Pope's Secret Cardinal; 3.1.3. Zionist Connections; 3.1.4. Destroying Islam: Gülen is not a Muslim; CHAPTER 4. Defamation of Gülen in English

4.1. Islam's Trojan Horse: Moderate Islam as Taqiyya4.2. America's Khomeini: Same Evil Different Beard; 4.3. Overthrowing Turkish Secular Government and Establishing an Islamic State; 4.4. Resurrection of New Ottoman Empire, and Universal Caliphate; 4.5. Infiltration into the United States; 4.6. Training Islamist Militia in the United States; CHAPTER 5: Data Analysis; 5.1. Data and Coding; 5.2. Data Analysis and the Results; CHAPTER 6. Who are they? Analysis of These Groups; 6.1. Turkish; 6.1.1. Ulusalci Group; Hikmet Cetinkaya: A Career Dedicated to Gülen's Defamation



Ergun Poyraz: Turkish Defamation MachineDogu Perincek (Aydinlik Group); 6.1.2. Radical Islamist Group; Aziz Karaca and the Yeni Mesaj Group; Ahmet Akgul and the Milli Cozum Group; 6.2. English; 6.2.1. Middle East Forum; 6.2.2. The Last Crusade/Paul Williams: A Defamation Machine; 6.2.3. Kurdish Aspect: Aland Mizell; 6.3. Common Tactics; CHAPTER 7. An Example: Fethullah Gülen's Grand Ambition: An Example of Biased, Misleading, Mispresented, and Miscalculated Article; 7.1. Issues Regarding the References in Sharon-Krespin (2009); 7.2. Data Manipulations; 7.3. Selective Information

7.4. Contradictions and Ambiguities in Sharon-Krespin (2009)CHAPTER 8. Concluding Remarks; Bibliography; Appendix

Sommario/riassunto

In recent years, a defamation campaign has been launched against Fethullah Gülen, a moderate Turkish Muslim scholar, and the Hizment Movement he inspired. Dogan Koç analyzes approximately 500 defamation articles, books, and other texts to show these defamations are not random and that they appear according to their respective audiences.