
ilość książek w kategorii: 5023
![]() |
Network Security: Step by Step Tutorials
ISBN: 9781304764003 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
151,95 |
![]() |
Understanding Cyber Security Essentials: A Beginner's Guide
ISBN: 9781300802976 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
152,58 |
![]() |
Cloud Security Handbook for Architects: Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps
ISBN: 9789395968997 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
152,62 |
![]() |
Infrastructure Attack Strategies for Ethical Hacking
ISBN: 9788196994723 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
152,62 |
![]() |
Hacking: Basic Security, Penetration Testing and How to Hack
ISBN: 9781329463158 / Angielski / Twarda / 2015 / 148 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Do You Want To Learn How To Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking and successful at it? . This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever your hacking. Within this book's pages, you'll find the answers to these questions and more. Just some of the questions and topics covered include: Penetration Testing Grey Hat Hacking Basic Security Guidelines General Tips Of Computer Safety How to Hack This book...
Do You Want To Learn How To Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking...
|
cena:
152,66 |
![]() |
Social Engineering and Human Hacking: Strategies for the Prevention and Defense Against Manipulation Techniques in IT
ISBN: 9783662720837 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
152,93 |
![]() |
Perfect Password: Selection, Protection, Authentication
ISBN: 9781597490412 / Angielski / Miękka / 2005 / 182 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate...
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while s...
|
cena:
154,62 |
![]() |
Der OPNsense-Praktiker: Enterprise-Firewalls mit Open Source
ISBN: 9783769378498 / Niemiecki Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
154,82 |
![]() |
Enterprise Information Security Risk Assessment: Practical Guide, Techniques and Tools
ISBN: 9780578847993 / Angielski / Miękka / 2021 / 142 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
155,18 |
![]() |
Android Application Pentesting Handbook
ISBN: 9781530176977 / Angielski / Miękka / 2016 / 120 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android applications. The book does not waste time in talking about Android fundamentals and other things that are not relevant to actual hacking which most of the books on this material talk about. This is supposed to provide directions to anyone who is interested in learning the art of pentesting Andoroid applications.
This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android application...
|
cena:
155,22 |
![]() |
Red Team: An Attack Paradigm
ISBN: 9781542785068 / Angielski / Miękka / 2017 / 212 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
155,22 |
![]() |
Advanced Penetration Testing: Hacking AWS
ISBN: 9781723317620 / Angielski / Miękka / 2018 / 298 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
155,22 |
![]() |
101 Labs - CompTIA CySA+
ISBN: 9798859601288 / Angielski / Miękka / 2023 / 598 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
155,22 |
![]() |
Advanced Penetration Testing: Hacking Satellite Communication
ISBN: 9798884400924 / Angielski / Miękka / 2024 / 242 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
155,22 |
![]() |
Inside the Enemy's Computer Identifying Cyber-Attackers
ISBN: 9781849045544 / Angielski / Twarda / 2017 / 224 str. Termin realizacji zamówienia: ok. 30 dni roboczych. When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution
When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book ...
|
cena:
155,61 |
![]() |
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
ISBN: 9781801810210 / Angielski / Miękka / 2022 / 322 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public view Be a ghost on the web, use the web without leaving a trace, and master the art of invisibility Become proactive to safeguard your privacy while using the web Book DescriptionAs the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to...
Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public...
|
cena:
157,04 |
![]() |
Cloud Identity Patterns and Strategies: Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
ISBN: 9781801810845 / Angielski / Miękka / 2022 / 258 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key Features Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows Book DescriptionIdentity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However,...
Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key Features Learn all you need to know...
|
cena:
157,04 |
![]() |
The Vulnerability Researcher\'s Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
ISBN: 9781803238876 / Angielski / Miękka / 2023 / 260 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receiving credit for your work Key Features Build successful strategies for planning and executing zero-day vulnerability research Find the best ways to disclose vulnerabilities while avoiding vendor conflict Learn to navigate the complicated CVE publishing process to receive credit for your research Book DescriptionVulnerability researchers are in increasingly high demand as the number of security incidents related to crime continues to rise with...
Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receivin...
|
cena:
157,04 |
![]() |
Rust for Blockchain Application Development: Learn to build decentralized applications on popular blockchain technologies using Rust
ISBN: 9781837634644 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
157,04 |