
ilość książek w kategorii: 5045
![]() |
The Cybersecurity Dilemma: Network Intrusions, Trust and Fear in the International System
ISBN: 9781849047135 / Angielski / Miękka / 2019 / 296 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. Reveals the pressure points for international relations precipitated by states' use of cyber espionage.
Reveals the pressure points for international relations precipitated by states' use of cyber espionage.
|
cena:
152,73 |
![]() |
Android Application Pentesting Handbook
ISBN: 9781530176977 / Angielski / Miękka / 2016 / 120 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android applications. The book does not waste time in talking about Android fundamentals and other things that are not relevant to actual hacking which most of the books on this material talk about. This is supposed to provide directions to anyone who is interested in learning the art of pentesting Andoroid applications.
This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android application...
|
cena:
159,52 |
![]() |
Hacking: Beginners Ultimate Expert Guide
ISBN: 9781541314948 / Angielski / Miękka / 2016 / 76 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Beginners Ultimate Expert Guide
If you are wanting to learn all the basics of hacking, you have come to the right place. This book will have all the information you need to practice basic hacking skills. In this book you will find information on the history of hacking, how to hack, what systems are best to start out on, and why you would need to know how to hack. Remember, this book is for informational purposes only, and is not to be used for any illicit activity. All in affiliation with this book do not take responsibility for any illegal activities based upon the writing in these... Beginners Ultimate Expert Guide
If you are wanting to learn all the basics of hacking, you have come to the right place. This book will have all ... |
cena:
40,87 |
![]() |
Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript: Beginners Guide to Learn Data Analytics, Predictive Analytics and Data Scien
ISBN: 9781541333307 / Angielski / Miękka / 2016 / 262 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is a 3 book bundle related to data analytics and hacking computers and hacking mobile devices, apps, and game consoles
Three manuscripts for the price of one Data Analytics Practical Data Analysis and Statistical Guide to Transform and Evolve Any Business, Leveraging the power of Data Analytics, Data Science, and Predictive Analytics for... This is a 3 book bundle related to data analytics and hacking computers and hacking mobile devices, apps, and game consoles |
cena:
81,61 |
![]() |
Android Application Pentesting Handbook 2
ISBN: 9781542309158 / Angielski / Miękka / 2017 / 144 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android applications. The book does not waste time in talking about Android fundamentals and other things that are not relevant to actual hacking which most of the books on this material talk about. This is supposed to provide directions to anyone who is interested in learning the art of pentesting Andoroid applications.In the second version, the author adds more fundamentals that allow a security researcher to use runtime manipulation techniques and crack even...
This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android application...
|
cena:
184,07 |
![]() |
Hacking SCADA/Industrial Control Systems: The Pentest Guide
ISBN: 9781533022066 / Angielski / Miękka / 2016 / 142 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The book delves into specific details and methodology of how to perform secuity assessments against the SCADA and Industrial control systems. The goal of this book is to provide a roadmap to the security assessors such as security analysts, pentesters, security architects, etc. and use the existing techniques that they are aware about and apply them to perform security asessments against the SCADA world. The book shows that the same techniques used to assess IT environments can be used for assessing the efficacy of defenses that protect the ICS/SCADA systems as well.
The book delves into specific details and methodology of how to perform secuity assessments against the SCADA and Industrial control systems. The goal...
|
cena:
147,25 |
![]() |
Blue Team Field Manual (BTFM)
ISBN: 9781541016361 / Angielski / Miękka / 2017 / 134 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five cor...
|
cena:
61,31 |
![]() |
Windows Stack Exploitation 2
ISBN: 9781542405010 / Angielski / Miękka / 2017 / 120 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary for identifying stack overflow vulnerabilities in Windows applications. It also teaches how a reader should actually go about exploiting these vulnerabilities and bypass various Windows protections. Overall, this is a great tutorial for beginners as well as people who are inclined to understand the inner details of Windows protection mechanisms and bypass. In the second version, we have added how to create a fuzzer for network service and also...
This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary ...
|
cena:
196,33 |
![]() |
How to Bullet Proof Your LinkedIn Profile: 10 Security Issues to Avoid
ISBN: 9781542407724 / Angielski / Miękka / 2017 / 86 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn these 10 LinkedIn Security Principles and much more. To create a strong password and use an email address that is only used for LinkedIn.com. No other online accounts should use this email address How to set up two step verification. Important point is to use a cell phone you do not have listed on your LinkedIn profile How much is your data worth? How to remove your birthdate from your profile. How to turn off your profile being public on search engines Phishing - how to recognize a phishing attempt and what LinkedIn does to protect their LinkedIn members Login with less devices. This...
Learn these 10 LinkedIn Security Principles and much more. To create a strong password and use an email address that is only used for LinkedIn.com. No...
|
cena:
57,14 |
![]() |
Mobile Biometrics
ISBN: 9781785610950 / Angielski / Twarda / 2017 / 488 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Mobile biometrics aim to achieve conventional functionality and robustness while also supporting portability and mobility, bringing greater convenience and opportunity for deployment in a wide range of operational environments. Achieving these aims brings new challenges, such as issues around algorithm complexity, device memory limitations and security. This book, the first substantial survey of its kind, brings together high quality research addressing the new challenges of mobile biometrics.
Mobile biometrics aim to achieve conventional functionality and robustness while also supporting portability and mobility, bringing greater convenienc...
|
cena:
636,47 |
![]() |
Information Security for the Busy Entrepreneur or Manager: What you need to know, minus the paranoia
ISBN: 9781532957826 / Angielski / Miękka / 2017 / 122 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information Security is a hot topic today -- and there are many competing voices. Most Information Security courses and certification study guides are hundreds of pages, and for good reason; the topic is both wide and deep. This book is aimed at the business owner, manager, board member or any other professional with either an interest in security or the need to get an understanding of the basics quickly. We all face the challenge of dealing with "I don't know what I don't know." After reading this book, the reader will have an understanding of where they stand with respect to Information...
Information Security is a hot topic today -- and there are many competing voices. Most Information Security courses and certification study guides are...
|
cena:
40,87 |
![]() |
Security Testing with Kali Nethunter
ISBN: 9781539820994 / Angielski / Miękka / 2017 / 182 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Testing with Kali NetHunter
Kali Linux NetHunter is an Ethical Hacking platform that allows you to run a mobile version of Kali Linux on a supported Android device. In Security Testing with Kali NetHunter, you will see the basic usage of NetHunter as we walk through the entire NetHunter tool menu, and learn by doing with hands on step-by-step tutorials. Topics Include:
Security Testing with Kali NetHunter
Kali Linux NetHunter is an Ethical Hacking platform that allows you to run a mobile version of Kali Lin... |
cena:
89,05 |
![]() |
Tor: Tor and the Deep Web: A Guide to Become Anonymous Online, Conceal Your IP Address, Block NSA Spying and Hack!
ISBN: 9781542745376 / Angielski / Miękka / 2017 / 58 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Want to learn how to hide your I.P address? Tired of the NSA spying on you? Want to learn how to hack? This Book Will Teach You How To be Anonymous Online Today The Internet is a wonderful resource which has allowed people to access a fountain of knowledge with the simple click of a button. The internet has grown considerably fast in the last decade, and it is still expanding at extraordinary rates. But with this incredible tool comes a danger The government has been using our vast resource to spy on individuals and businesses, overstepping their role as an entity that exists to serve the...
Want to learn how to hide your I.P address? Tired of the NSA spying on you? Want to learn how to hack? This Book Will Teach You How To be Anonymous On...
|
cena:
71,09 |
![]() |
Convergence Security: Journal Volume 1 - 2016
ISBN: 9788793519534 / Angielski / Miękka / 2017 / 62 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Convergence security can be defined as the security created by merging the physical and information security or the combining security with other non-IT technologies. Convergence Security Journal is an open access journal dedicated to the publication and discussion of research articles, short communications, and review papers on all areas of convergence security. The primary objective is to publish a high-quality journal with free Internet-based access for researchers and other interested people throughout the world. Papers published by the journal represent important advances of... Convergence security can be defined as the security created by merging the physical and information security or the combining security with other n... |
cena:
147,25 |
![]() |
Hacking: The No-Nonsense Guide: Learn Ethical Hacking Within 12 Hours!
ISBN: 9781542793674 / Angielski / Miękka / 2017 / 92 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. LIMITED TIME OFFER: Hacking eBook: $4.99 NOW $2.99 Hacking Paperback: $23.23 NOW $13.23 Learn How To Become An Ethical Hacker In Only 12 Hours... What if you could learn how to stop attackers from hacking into your website or personal accounts. Imagine finding leaks inside large corporate companies and you can help them protecting their data and make money]. What if you had access to everything on the internet by leveraging your superior hacking skills? Sounds good? This is just a fraction of what you could do with Ethical Hacking in Kali Linux and we would love to...
LIMITED TIME OFFER: Hacking eBook: $4.99 NOW $2.99 Hacking Paperback: $23.23 NOW $13.23 Learn How To Become An Ethical Hacker ...
|
cena:
95,01 |
![]() |
Agenda delle password: Agenda degli indirizzi web e delle password di accesso - Copertina gatto "cucù"
ISBN: 9781542796262 / Włoski / Miękka / 2017 / 104 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
32,69 |
![]() |
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa peekaboo
ISBN: 9781542901437 / Portugalski / Miękka / 2017 / 104 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
32,69 |
![]() |
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa gatinho ruivo a relaxar
ISBN: 9781542901543 / Portugalski / Miękka / 2017 / 104 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
32,69 |
![]() |
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa gatinho brincalhão
ISBN: 9781542901550 / Portugalski / Miękka / 2017 / 104 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
32,69 |
![]() |
Agenda de passwords: Agenda para endereços electrónicos e passwords - Capa gatinho de olhos azuis
ISBN: 9781542901567 / Portugalski / Miękka / 2017 / 104 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
32,69 |