
ilość książek w kategorii: 5021
![]() |
Mastering Gray Box Penetration Testing: Balancing Knowledge and Discovery
ISBN: 9798876825216 / Angielski / Miękka / 2024 / 184 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,01 |
![]() |
The Nmap Handbook: A Deep Dive into Network Mapping and Scanning
ISBN: 9798876904768 / Angielski / Miękka / 2024 / 168 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,01 |
![]() |
Mastering Nessus: A Comprehensive Guide to Cybersecurity Assessment
ISBN: 9798877008762 / Angielski / Miękka / 2024 / 216 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,01 |
![]() |
Mastering Metasploit: A Comprehensive Guide to Cybersecurity Penetration Testing
ISBN: 9798877123915 / Angielski / Miękka / 2024 / 196 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,01 |
![]() |
Mastering OpenVAS: A Comprehensive Guide to Cybersecurity Vulnerability Assessment
ISBN: 9798877361485 / Angielski / Miękka / 2024 / 166 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,01 |
![]() |
Car Hacking Playbook: Revving Up Cyber Defense
ISBN: 9798878275613 / Angielski / Miękka / 2024 / 128 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,01 |
![]() |
Mastering Windows Security: Unveiling Hacking Techniques and Penetration Strategies
ISBN: 9798878593151 / Angielski / Miękka / 2024 / 220 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,01 |
![]() |
The IT Auditor's Playbook: Expert Guidance for Auditing & Consulting in the Digital Era
ISBN: 9798878706117 / Angielski / Miękka / 2024 / 312 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,01 |
![]() |
Decoding Threat Intelligence: Unveiling Cybersecurity's Hidden Patterns
ISBN: 9798878825030 / Angielski / Miękka / 2024 / 184 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,01 |
![]() |
Cyber Security Risk Management Essentials: Safeguarding in the Digital Era
ISBN: 9798879051797 / Angielski / Miękka / 2024 / 154 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,01 |
![]() |
Journal of Cyber Security and Mobility 4-1: Resilient and Trustworthy IoT Systems
ISBN: 9788793237667 / Angielski / Miękka / 2015 / 96 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The internet of things (IoT) is by now nothing new, but widespread adoption and increasing dependence on IoT services mean that we must ensure that the IoT systems we design, develop, and deploy are resilient and trustworthy. Almost universal availability is expected, yet individual devices will routinely fail and/or be compromised. Despite this, the services should be resilient and trustworthy. The environments where the devices will be deployed will range from protected and controlled environments to potentially very hostile environments where the exposure is extreme.
The cyber security... The internet of things (IoT) is by now nothing new, but widespread adoption and increasing dependence on IoT services mean that we must ensure that th...
|
cena:
191,04 |
![]() |
Journal of Cyber Security and Mobility (4-2&3): Cybersecurity, Privacy and Trust
ISBN: 9788793379428 / Angielski / Miękka / 2015 / 154 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cybersecurity is a global issue with local impact. When cyber security breaches occur, it impacts on society at all levels: Users lose trust in digital platforms, companies lose money, and public institutions are discredited. Over the last years, cybersecurity as a concept has changed significantly and has become a broad area covering for example crime, espionage, privacy inva- sions, and technical solutions for prevention of attacks on users, individuals as well as industry/companies. Along with this, privacy has become a central element in the discussion mirroring the fact that users have...
Cybersecurity is a global issue with local impact. When cyber security breaches occur, it impacts on society at all levels: Users lose trust in digita...
|
cena:
191,04 |
![]() |
Windows Stack Exploitation 2
ISBN: 9781542405010 / Angielski / Miękka / 2017 / 120 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary for identifying stack overflow vulnerabilities in Windows applications. It also teaches how a reader should actually go about exploiting these vulnerabilities and bypass various Windows protections. Overall, this is a great tutorial for beginners as well as people who are inclined to understand the inner details of Windows protection mechanisms and bypass. In the second version, we have added how to create a fuzzer for network service and also...
This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary ...
|
cena:
191,04 |
![]() |
Church Privacy Team: Building a Trust-Centered Church by Protecting Members' Privacy and Complying with Privacy Laws and Regulations
ISBN: 9781736947814 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,04 |
![]() |
Navigating the Digital Maze: Social Media, Mental Health, and Safety
ISBN: 9781637657355 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,04 |
![]() |
Gray Hat Python
ISBN: 9781593271923 / Angielski / Miękka / 2009 / 216 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore. Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin... Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly,... |
cena:
191,18 |
![]() |
Mastering the Red Hat Certified Engineer (RHCE) Exam: Your complete guide to Linux administration, automation, and certification
ISBN: 9789365896800 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
191,32 |
![]() |
Destroy, Build, Secure: Readings on Pacification
ISBN: 9781926958347 / Angielski / Miękka / 2017 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Pacification is often thought of as a military strategy or a metaphor for social control. Destroy, Build, Secure goes beyond this common usage of the word and instead focuses on pacification as a category of analysis. The contributors demonstrate how pacification is simultaneously a repressive and productive strategy, mobilizing the concept to problematize the liberal boundaries of war and peace, military and civil spheres, as well as police and military operations across time and geography. From the nineteenth century to our... Pacification is often thought of as a military strategy or a metaphor for social control. Destroy, Build, Secure goes beyond thi... |
cena:
191,77 |
![]() |
Journal of Cyber Security and Mobility (5-3)
ISBN: 9788793609129 / Angielski / Miękka / 2016 / 350 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Aim Scope The journal covers security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications will also be published. The publication will take a holistic view. Some example topics are: security in mobile networks, security and mobility... Aim |
cena:
192,03 |
![]() |
Journal of Cyber Security and Mobility (5-4)
ISBN: 9788793609365 / Angielski / Miękka / 2016 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Aim Journal of Cyber Security and Mobility provides an in-depth and holistic view of security and solutions from practical to theoretical aspects. It covers topics that are equally valuable for practitioners as well as those new in the field.
Aim Journal of Cyber Security and Mobility provides an in-depth and holistic view of security and solutions from practical to theoretical aspects. It ...
|
cena:
192,03 |