wyszukanych pozycji: 10
![]() |
iOS Application Pentesting Handbook
ISBN: 9781523460496 / Angielski / Miękka / 2016 / 84 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book provides the basics on hacking iOS applications. This book is supposed to help beginners learn the art of exploiting iOS applications. The book does not waste time in talking about iOS fundamentals and other things that most of the books on this material talk about. This is supposed to provide directions to anyone who is interested in learning the art of pentesting iOS applications.
This book provides the basics on hacking iOS applications. This book is supposed to help beginners learn the art of exploiting iOS applications. The b...
|
cena:
166,83 zł |
![]() |
iOS Application Pentesting Handbook 2
ISBN: 9781542307963 / Angielski / Miękka / 2017 / 104 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book provides the basics on hacking iOS applications. This book is supposed to help beginners learn the art of exploiting iOS applications. The book does not waste time in talking about iOS fundamentals and other things that most of the books on this material talk about. This is supposed to provide directions to anyone who is interested in learning the art of pentesting iOS applications.In the second version, the author adds more fundamentals that allow a security researcher to use runtime manipulation techniques and crack even the most difficult applications.
This book provides the basics on hacking iOS applications. This book is supposed to help beginners learn the art of exploiting iOS applications. The b...
|
cena:
192,50 zł |
![]() |
Embedded Device Security: Pwn the device 2
ISBN: 9781542329156 / Angielski / Miękka / 2017 / 160 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This second version of the book is an introduction for the reader into the wonderful world of embedded device exploitation. The book is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of "Internet of Things," such skill sets can be useful to hack from a simple intelligent light bulb to hacking into a car. In the second version, we also spend time looking at how to use the JTAG interface on these devices to pwn them.
This second version of the book is an introduction for the reader into the wonderful world of embedded device exploitation. The book is supposed to be...
|
cena:
192,50 zł |
![]() |
Embedded Device Security: Pwn the device
ISBN: 9781508553304 / Angielski / Miękka / 2015 / 126 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book is an introduction for the reader into the wonderful world of embedded device exploitation. The book is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of "Internet of Things," such skill sets can be useful to hack from a simple intelligent light bulb to hacking into a car.
This book is an introduction for the reader into the wonderful world of embedded device exploitation. The book is supposed to be a tutorial guide that...
|
cena:
205,33 zł |
![]() |
Windows Stack Exploitation
ISBN: 9781507821152 / Angielski / Miękka / 2015 / 102 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
205,33 zł |
![]() |
Embedded Device Security: Pwn Real Time Operating Systems
ISBN: 9781517782580 / Angielski / Miękka / 2015 / 112 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
384,99 zł |
![]() |
Embedded Device Security: Pwn Smart Home Controller
ISBN: 9781512013931 / Angielski / Miękka / 2015 / 110 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
205,33 zł |
![]() |
Windows Stack Exploitation 2
ISBN: 9781542405010 / Angielski / Miękka / 2017 / 120 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary for identifying stack overflow vulnerabilities in Windows applications. It also teaches how a reader should actually go about exploiting these vulnerabilities and bypass various Windows protections. Overall, this is a great tutorial for beginners as well as people who are inclined to understand the inner details of Windows protection mechanisms and bypass. In the second version, we have added how to create a fuzzer for network service and also...
This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary ...
|
cena:
205,33 zł |
![]() |
Android Application Pentesting Handbook
ISBN: 9781530176977 / Angielski / Miękka / 2016 / 120 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android applications. The book does not waste time in talking about Android fundamentals and other things that are not relevant to actual hacking which most of the books on this material talk about. This is supposed to provide directions to anyone who is interested in learning the art of pentesting Andoroid applications.
This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android application...
|
cena:
166,83 zł |
![]() |
Android Application Pentesting Handbook 2
ISBN: 9781542309158 / Angielski / Miękka / 2017 / 144 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android applications. The book does not waste time in talking about Android fundamentals and other things that are not relevant to actual hacking which most of the books on this material talk about. This is supposed to provide directions to anyone who is interested in learning the art of pentesting Andoroid applications.In the second version, the author adds more fundamentals that allow a security researcher to use runtime manipulation techniques and crack even...
This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android application...
|
cena:
192,50 zł |