Hacking Exposed Unified Communications & Voip Security Secrets & Solutions, Second Edition
ISBN: 9780071798761 / Angielski / Miękka / 560 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The latest techniques for averting UC disaster
"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast "The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up... The latest techniques for averting UC disaster
"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. Th... |
|
cena:
265,17 zł |
Anti-Hacker Tool Kit, Fourth Edition
ISBN: 9780071800143 / Angielski / Miękka / 624 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to... Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit,... |
|
cena:
239,09 zł |
Hacking Exposed Mobile: Security Secrets & Solutions
ISBN: 9780071817011 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior... Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The autho... |
|
cena:
265,17 zł |
Computer Viruses for Dummies
ISBN: 9780764574184 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there's a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.
Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:
Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in comi...
|
|
cena:
55,18 zł |
Hacking Made Easy: Hack Your Way Through Life One Step at A Time - Discover The Revolutionary Hacking Secrets Of The 21st Century
ISBN: 9781532878763 / Angielski / Miękka / 88 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
68,42 zł |
You've Been Hacked: 15 Hackers You Hope Your Computer Never Meets
ISBN: 9781490369396 / Angielski / Miękka / 172 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
45,60 zł |
Android Security Cookbook
ISBN: 9781782167167 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions Overview * Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems* Develop custom vulnerability assessment tools using the Drozer Android Security Assessment Framework* Reverse-engineer Android applications for security vulnerabilities* Protect your Android application with up to date hardening techniques In Detail Android Security Cookbook discusses many common...
Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions Overv...
|
|
cena:
238,52 zł |
Targeted Cyber Attacks: Multi-Staged Attacks Driven by Exploits and Malware
ISBN: 9780128006047 / Angielski / Miękka / 158 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of... Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Ta... |
|
cena:
125,87 zł |
Optimizing IEEE 802.11i Resource and Security Essentials: For Mobile and Stationary Devices
ISBN: 9780128022221 / Angielski / Miękka / 72 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with... In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technolo... |
|
cena:
251,80 zł |
Corporate Security Crossroads: Responding to Terrorism, Cyberthreats, and Other Hazards in the Global Business Environment
ISBN: 9781440832857 / Angielski / Twarda / 242 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Multinational corporations are on the front lines of terrorism and cyberattacks--two of world's biggest threats to global security. How can corporate leaders mitigate their organizations' risks and develop an infrastructure that detects and deters a security menace before it happens? This timely reference lays out essential political context and historical background to help executives identify contemporary threats and understand the interconnections between threat dynamics in an increasingly dangerous international environment. This compelling work is organized into seven... Multinational corporations are on the front lines of terrorism and cyberattacks--two of world's biggest threats to global security. How can corpora... |
|
cena:
276,15 zł |
Advanced Malware Analysis
ISBN: 9780071819749 / Angielski / Miękka / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings
Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware. After explaining malware architecture and how it operates, the book describes how to create and configure a state-of-the-art malware research lab and gather samples for analysis. Then,... A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings
Advanced Malware Analy... |
|
cena:
347,76 zł |
Hacking: Hacking Essentials, What You Must Know About Hacking
ISBN: 9781511799218 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn the basics of hacking with this book Why we wrote this book? Hacking is a way of unblocking the blocked websites, Documents and accounts. It can be evil or a noble task with full of dignity. Depends on the sort of your aim, you can use hacking for various tremendous purposes. This book is a guide for the newbies at the way of hacking. In this book, you can come to know what hacking exactly is, how it works, how to hack the accounts and how to verify your hacked accounts. In this book you will come up with all the basics about the hacking. This book is calling "hacking" as an art of...
Learn the basics of hacking with this book Why we wrote this book? Hacking is a way of unblocking the blocked websites, Documents and accounts. It can...
|
|
cena:
31,82 zł |
Debugging with Fiddler: The complete reference from the creator of the Fiddler Web Debugger
ISBN: 9781511572903 / Angielski / Miękka / 370 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers, and enthusiasts to inspect traffic, set breakpoints, and "fiddle" with incoming or outgoing data. Fiddler includes powerful event-based scripting, and can be extended using any .NET language. FiddlerCore, the core proxy engine underlying Fiddler, is available to integrate into any .NET application.
Fiddler is a Web Debugging Proxy platform that monitors and modifies web traffic. This freeware tool enables developers, testers, and enthusiasts to i...
|
|
cena:
104,94 zł |
Safe Computing is Like Safe Sex: You have to practice it to avoid infection
ISBN: 9781943517008 / Angielski / Miękka / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. I'll bet you think your computer is safe from viruses and hackers. But is it really? Isn't it reasonable to expect your computer to be secure straight out-of-the-box? What does it mean to secure a system anyway? Huge security breaches have been all over the news lately. It sometimes seems that not a day goes by without another massive computer hack being announced. If huge corporations with multi-million dollar computer security budgets can get hacked, what hope is there for the ordinary person? If you are anything like me, you don't have huge amounts of money and time to spare to protect...
I'll bet you think your computer is safe from viruses and hackers. But is it really? Isn't it reasonable to expect your computer to be secure straight...
|
|
cena:
65,16 zł |
Hacking: Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide
ISBN: 9781512317589 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Welcome to your Cyber-Security Playground Guide ***3rd Edition***Free bonus inside (Right After Conclusion) - Get limited time offer, Get your BONUS right NOW Would you like to acquire an impressive online skill such as writing a VIRUS? Have you always wanted to understand how people get your information? Are you interested in increasing your personal security online or your hacking toolkit? If you can say 'yes' to any one of these questions, then Computer Hacking is the book for you. In this book, you will learn several skills and techniques that you need to acquire in order to become a...
Welcome to your Cyber-Security Playground Guide ***3rd Edition***Free bonus inside (Right After Conclusion) - Get limited time offer, Get your BONUS ...
|
|
cena:
37,52 zł |
Wireshark Network Security
ISBN: 9781784393335 / Angielski / Miękka / 138 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
214,17 zł |
Apoc@lypse: The End of Antivirus
ISBN: 9781514863671 / Angielski / Miękka / 136 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. www.facebook.com/apocalypseantivirus Terrifying, educational, informative, frightening, scary, real. Discover why you and the digital world are at risk. 150 antivirus companies have the same problem and they can destroy your data and hurt your business. Imagine your company losing customer data, products and suppliers. Imagine you losing your school work, years of his family photographs destroyed. Imagine being paralyzed governments. This threat is real and immediate. We openly report a didactic way for anyone and even including all codes. It's your chance to protect yourselves, present a...
www.facebook.com/apocalypseantivirus Terrifying, educational, informative, frightening, scary, real. Discover why you and the digital world are at ris...
|
|
cena:
28,76 zł |
Windows Malware Analysis Essentials
ISBN: 9781785281518 / Angielski / Miękka / 330 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
267,73 zł |
Leading Issues in Cyber Warfare and Security
ISBN: 9781910810644 / Angielski / Miękka / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes even destroyed. The prevalence of such stories reveals an overwhelming weakness in the security of the systems we increasingly rely on for everything: shopping, banking, health services, education, and even voting. That these problems persist even as the world rushes headlong into the Internet-of-Things and cloud based everything underscores the importance of understanding the current and potential aspects of information warfare, also known as cyberwarfare. Having passed...
Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes even destroyed. The prevalence...
|
|
cena:
153,36 zł |
Under Attack
ISBN: 9780996688703 / Angielski / Twarda / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
127,71 zł |