![]() |
Practical Packet Analysis, 3rd Edition
ISBN: 9781593278021 / Angielski / Miękka / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network? Updated to cover Wireshark 2.x, the third edition of Practical Packet Analysis will teach you to make sense of your packet captures so that you can better troubleshoot network problems. You'll find added coverage of IPv6 and SMTP, a new chapter on the powerful command line packet analyzers tcpdump and TShark, and an appendix on how to read and reference packet values using a...
It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those ...
|
cena:
241,50 |
![]() |
Cyber Frauds, Scams and Their Victims
ISBN: 9781138931190 / Angielski / Twarda / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include:
Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be pe... |
cena:
710,17 |
![]() |
Introduction to Computer Security
ISBN: 9780321512949 / Angielski / Twarda / 556 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals. It is ideal for computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the...
Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals. It is ideal for computer-securi...
|
cena:
1157,14 |
![]() |
Business Analytics and Cyber Security Management in Organizations
ISBN: 9781522509028 / Angielski / Twarda / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book compiles innovative research from international professionals discussing the opportunities and challenges of the new era of online business and outlining updated discourse for business analytics techniques, strategies for data storage, and encryption in emerging markets"--
"This book compiles innovative research from international professionals discussing the opportunities and challenges of the new era of online business...
|
cena:
1098,12 |
![]() |
Security Solutions and Applied Cryptography in Smart Grid Communications
ISBN: 9781522518297 / Angielski / Twarda / 492 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is designed for academics, researchers, engineers and students.
Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a rang...
|
cena:
1101,91 |
![]() |
Cybersecurity Exposed: The Cyber House Rules
ISBN: 9781911452096 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Mind the gap...between the actual level of cybersecurity and the amount required to protect you. Mind the gap...between the actual level of cybersecurity and the amount required to protect you. |
cena:
56,06 |
![]() |
Instant Traffic Analysis with Tshark How-to
ISBN: 9781782165385 / Angielski / Miękka / 68 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
116,49 |
![]() |
Building Virtual Pentesting Labs for Advanced Penetration Testing, Second Edition
ISBN: 9781785883491 / Angielski / Miękka / 524 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
284,81 |
![]() |
Penetration Testing with Raspberry Pi - Second Edition: A portable hacking station for effective pentesting
ISBN: 9781787126138 / Angielski / Miękka / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
189,86 |
![]() |
Instant Windows PowerShell
ISBN: 9781849688741 / Angielski / Miękka / 54 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
129,43 |
![]() |
Wireshark 101: Essential Skills for Network Analysis
ISBN: 9781893939752 / Angielski / Miękka / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Wireshark is the world's most popular network analyzer tool with over 1 million downloads per month. As the Founder of Wireshark University, Laura Chappell is undoubtedly one of the best Wireshark instructors around. In this updated book, Laura offers step-by-step instructions on the key functions and features of Wireshark, including:
Wireshark is the world's most popular network analyzer tool with over 1 million downloads per month. As the Founder of Wireshark University, Laura ... |
cena:
275,77 |
![]() |
Windows Security Monitoring: Scenarios and Patterns
ISBN: 9781119390640 / Angielski / Miękka / 648 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Go deep into Windows security tools to implement more robust protocols and processes
Windows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Microsoft security program manager, DEFCON organizer and CISSP, this book digs deep into the underused tools that help you keep Windows systems secure. Expert guidance brings you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful native tools, while scenario-based... Go deep into Windows security tools to implement more robust protocols and processes
Windows Security Monitoring goes beyond Windows ... |
cena:
192,68 |
![]() |
Cybersecurity Exposed: The Cyber House Rules
ISBN: 9781911452195 / Angielski / Twarda / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Mind the gap...between the actual level of cybersecurity and the amount required to protect you. Psychology meets technology as this book explores how the rapid progression of technology is luring us all forwards at a pace that outstrips the human comfort zone. Is security fixable? Or are we... Mind the gap...between the actual level of cybersecurity and the amount required to protect you. |
cena:
107,86 |
![]() |
Black Hat Go: Go Programming For Hackers and Pentesters
ISBN: 9781593278656 / Angielski / Miękka / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. In Black Hat Go, you'll learn how to write powerful and effective penetration testing tools in Go, a language revered for its speed and scalability. Start off with an introduction to Go fundamentals like data types, control structures, and error handling; then, dive into the deep end of Go's...
Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection...
|
cena:
226,40 |
![]() |
Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents
ISBN: 9781787288683 / Angielski / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Suitable for information security professionals, forensics practitioners, and students, this title guides them through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization.
Suitable for information security professionals, forensics practitioners, and students, this title guides them through the entire spectrum of tasks as...
|
cena:
211,44 |
![]() |
User-Centric Privacy and Security in Biometrics
ISBN: 9781785612077 / Angielski / Twarda / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book covers the major and critical system security challenges, developments, techniques and applications for biometric systems (confidentiality, authenticity, integrity, privacy, reliability, convenience, usability).
This book covers the major and critical system security challenges, developments, techniques and applications for biometric systems (confidentiality, ...
|
cena:
681,67 |
![]() |
Kali Linux Cookbook - Second Edition: Effective penetration testing solutions
ISBN: 9781784390303 / Angielski / Miękka / 438 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
366,81 |
![]() |
Real-World Bug Hunting: A Field Guide to Web Hacking
ISBN: 9781593278618 / Angielski / Miękka / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
226,40 |
![]() |
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
ISBN: 9781593278557 / Angielski / Miękka / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
191,18 |
![]() |
Malware Data Science: Attack, Detection, and Attribution
ISBN: 9781593278595 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
271,70 |