
ilość książek w kategorii: 5045
![]() |
Hacking: 3 Manuscripts - Bitcoin, Tor, Hacking With Python
ISBN: 9781544601120 / Angielski / Miękka / 2017 / 234 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Do you want to learn how to use Python to Hack? Do you want to learn how to conceal your IP Address and block NSA Spying? Do you want to learn how to invest in the revolutionary cryptocurrency that is Bitcoin? If you answered yes, then this book is right for you The simple term "Bitcoin" can be intimidating to some people, especially those who have never purchased a Bitcoin or have ever dealt in the currency before. There are many options when it comes to Bitcoin, and you need to make sure that you are getting the most out of the investment process. Anyone who is considering investing in...
Do you want to learn how to use Python to Hack? Do you want to learn how to conceal your IP Address and block NSA Spying? Do you want to learn how to ...
|
cena:
99,99 |
![]() |
EARLY WARNING and PREDICTION of INTERNET ATTACKS and EXPLOITS
ISBN: 9781544618159 / Angielski / Miękka / 2017 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A safe, secure and functional information network is vital in today's Air Force net centric environment. Information is more critical today than it has ever been. As more operational functions are placed in cyber space and greater computing power becomes available to everyone, keeping these networks safe and secure is an almost unattainable task. Network security entails Intrusion Detection Security, but another form of security or -insecurity- is quickly gaining attention. Honeypots allow the black hat community to attack and penetrate non-production systems. By monitoring and studying these...
A safe, secure and functional information network is vital in today's Air Force net centric environment. Information is more critical today than it ha...
|
cena:
53,11 |
![]() |
Hacking with Python: Beginner's Guide to Ethical Hacking, Basic Security, Penetration Testing, and Python Hacking
ISBN: 9781544722191 / Angielski / Miękka / 2017 / 106 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Hacking and Python Made Easy
The world of hacking is an interesting study. It allows you the opportunity to learn more about your computer system, work with different programs, and even protects your computer and your network against black hat hackers. There are many different attacks that a hacker can use against your network, but you can use the countermeasures and even some of the same kinds of hacks to find the vulnerabilities in your system and keep things safe.
Hacking and Python Made Easy
The world of hacking is an interesting study. It allows you the opportunity to learn more about your computer s... |
cena:
69,68 |
![]() |
Mastering Modern Web Penetration Testing
ISBN: 9781785284588 / Angielski / Miękka / 2016 / 298 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does About This Book This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications Penetrate and secure your web application using various techniques Get this comprehensive reference guide that provides advanced tricks and tools of the trade for seasoned penetration testers Who This Book Is For This book is for security professionals and penetration testers...
Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does About This Book This book cover...
|
cena:
214,32 |
![]() |
Building Virtual Pentesting Labs for Advanced Penetration Testing, Second Edition
ISBN: 9781785883491 / Angielski / Miękka / 2016 / 524 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
288,69 |
![]() |
Disaster Recovery using VMware vSphere Replication and vCenter Site Recovery Manager: Second Edition
ISBN: 9781785886096 / Angielski / Miękka / 2016 / 208 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
170,57 |
![]() |
Kali Linux 2 - Assuring Security by Penetration Testing, Third Edition: Achieve the gold standard in penetration testing with Kali using this masterpi
ISBN: 9781785888427 / Angielski / Miękka / 2016 / 572 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
214,32 |
![]() |
Mastering Metasploit, Second Edition
ISBN: 9781786463166 / Angielski / Miękka / 2016 / 440 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
240,57 |
![]() |
Mobile Forensics - Advanced Investigative Strategies: Master powerful strategies to acquire and analyze evidence from real-life scenarios
ISBN: 9781786464484 / Angielski / Miękka / 2016 / 412 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Master powerful strategies to acquire and analyze evidence from real-life scenarios About This Book A straightforward guide to address the roadblocks face when doing mobile forensics Simplify mobile forensics using the right mix of methods, techniques, and tools Get valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experience Who This Book Is For This book is for forensic analysts and law enforcement and IT security officers who have to deal with digital evidence as part of their daily job. Some basic familiarity with digital forensics is...
Master powerful strategies to acquire and analyze evidence from real-life scenarios About This Book A straightforward guide to address the roadblocks ...
|
cena:
240,57 |
![]() |
Python: Penetration Testing for Developers: Penetration Testing for Developers: Execute effective tests to identify software v
ISBN: 9781787128187 / Angielski / Miękka / 2017 / 666 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
441,53 |
![]() |
Instant Citrix Security How-to
ISBN: 9781849686723 / Angielski / Miękka / 2013 / 74 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
118,07 |
![]() |
Instant Java Password and Authentication Security
ISBN: 9781849697767 / Angielski / Miękka / 2013 / 38 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
131,20 |
![]() |
Wireshark 101: Essential Skills for Network Analysis
ISBN: 9781893939752 / Angielski / Miękka / 2017 / 408 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Wireshark is the world's most popular network analyzer tool with over 1 million downloads per month. As the Founder of Wireshark University, Laura Chappell is undoubtedly one of the best Wireshark instructors around. In this updated book, Laura offers step-by-step instructions on the key functions and features of Wireshark, including:
Wireshark is the world's most popular network analyzer tool with over 1 million downloads per month. As the Founder of Wireshark University, Laura ... |
cena:
279,45 |
![]() |
Cybersecurity and Privacy - Bridging the Gap
ISBN: 9788793519664 / Angielski / Twarda / 2017 / 238 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The huge potential in future connected services hinges on the precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is appearing increasingly on the agenda at both the company and individual level.
Cybersecurity and Privacy - Bridging the Gap addresses two very complex fields of the digital world: cybersecurity and privacy. These multifaceted and multidisciplinary issues are usually understood and valued differently by different individuals, data holders, and legal bodies, but a change in one field immediately... The huge potential in future connected services hinges on the precondition that privacy and security needs are dealt with in order for new services to...
|
cena:
356,18 |
![]() |
Private Security and the Law
ISBN: 9781138738751 / Angielski / Twarda / 2017 / 756 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Private Security and the Law, 5th Edition provides analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority. This book describes the legal requirements faced in the area of private security. The author takes you step by step through the analysis of case law as it applies to situation commonly faced in the private security practice, providing a solid introduction to the legal and ethical standards that shape the industry. Private Security and the Law, 5th Edition provides analysis of practices in the security industry as they relate to law, regulation, licensure, and... |
cena:
618,45 |
![]() |
Hacking: Top Online Handbook in Exploitation of Computer Hacking, Security, and Penetration Testing
ISBN: 9781544801513 / Angielski / Miękka / 2017 / 26 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Hacking: Top Online Handbook in Exploitation of Computer Hacking, Security, and Penetration Testing Want to learn Hacking Online? Need to learn it? Want to develop the skills quick and easy? All the tips you need for planning Spoofing Attacks or Getting Passwords PG Wizards gives you a walk through for mapping out your hacking from the beginning Plus free now as a bonus Hacking Internet Connections You will get all your basic information as well for all new hackers Whether your just starting out or looking to reinforce your current...
Hacking: Top Online Handbook in Exploitation of Computer Hacking, Security, and Penetration Testing Want to learn Hacking Online? Need to l...
|
cena:
122,18 |
![]() |
How to Erase Yourself from the Internet Completely: How to Remain Anonymous Online
ISBN: 9781544855806 / Angielski / Miękka / 2017 / 108 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. How to Erase Yourself from the Internet Completely
How to Use TOR & How to Remain Anonymous Online When we look at the internet we can look at two broad categories:
The surface web is where most of your information is easily searchable. But the deep web is a bit more cloaked. This is where service providers like Facebook, twitter, google, and yahoo comes in. They hold more than just personal attributes about yourself, but they have information about who your close personal... How to Erase Yourself from the Internet Completely
How to Use TOR & How to Remain Anonymous Online When we ... |
cena:
44,50 |
![]() |
Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The Shield Methodology
ISBN: 9781138042759 / Angielski / Twarda / 2018 / 456 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
915,31 |
![]() |
Build a Better Password: Create and Save Strong, Secure Passwords the Fun & Easy Way!
ISBN: 9781544263267 / Angielski / Miękka / 2017 / 64 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
40,97 |
![]() |
Darkweb Cyber Threat Intelligence Mining
ISBN: 9781107185777 / Angielski / Twarda / 2017 / 146 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book describes techniques and results in cyber threat intelligence from the center of the malicious hacking underworld - the dark web.
This book describes techniques and results in cyber threat intelligence from the center of the malicious hacking underworld - the dark web.
|
cena:
296,91 |