wyszukanych pozycji: 4
![]() |
Attack Vectors
ISBN: 9798868817083 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity's evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry. It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet's defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role... From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybers... |
cena:
211,90 |
![]() |
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
ISBN: 9781484236260 / Angielski / Miękka / 2018 / 371 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
173,37 |
![]() |
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
ISBN: 9781484259139 / Angielski / Miękka / 2020 / 384 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Beginning-Intermediate user level
Beginning-Intermediate user level
|
cena:
301,89 |
![]() |
Identity Attack Vectors
ISBN: 9798868802324 / Angielski / Miękka / 2024 Termin realizacji zamówienia: ok. 16-18 dni roboczych. Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities—whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives. This book details the risks associated with poor identity security hygiene, the techniques... Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistica... |
cena:
231,17 |