Mastering NetScaler VPX(TM): Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques y
ISBN: 9781785281730 / Angielski / Miękka / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
240,82 zł |
Hacking: The Ultimate Beginners Guide
ISBN: 9781519592668 / Angielski / Miękka / 66 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Ultimate Computer Hacking Guide
Have you always wanted to hack? This book contains tons of tips and strategies on how to hack. The whole idea of "Hacking" seems hard, but in this step by step guide you will learn everything you need to know about hacking. Even if you are not a beginner, this book contains tons of new information on hacking. Become a hacking master today Here Is A Preview Of What You'll Learn... Hacking - The BasicsHow to Hack Computer Systems and NetworksHow to Gather Data About Your TargetHow to Scan the Data You CollectedHow to Crack PasswordsBackdoors and... The Ultimate Computer Hacking Guide
Have you always wanted to hack? This book contains tons of tips and strategies on how to hack. The whole idea... |
|
cena:
170,47 zł |
Hacking Secrets: What Hackers don't Want You to Know?
ISBN: 9781514701966 / Angielski / Miękka / 48 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
46,04 zł |
Python Web Penetration Testing Cookbook
ISBN: 9781784392932 / Angielski / Miękka / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
240,82 zł |
Mastering OAuth 2.0
ISBN: 9781784395407 / Angielski / Miękka / 238 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
240,82 zł |
Troubleshooting CentOS
ISBN: 9781785289828 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
162,17 zł |
Learning iOS Penetration Testing
ISBN: 9781785883255 / Angielski / Miękka / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
221,16 zł |
Network Security Attacks and Countermeasures
ISBN: 9781466687615 / Angielski / Twarda / 376 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Discusses the security and optimization of computer networks for use in a variety of disciplines and fields. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.
Discusses the security and optimization of computer networks for use in a variety of disciplines and fields. This edited compilation includes chapters...
|
|
cena:
1196,66 zł |
Linux Server Security: Hack and Defend
ISBN: 9781119277651 / Angielski / Miękka / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn how to attack and defend the world's most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform... Learn how to attack and defend the world's most popular web server platform Linux Server Security: Hack and Defend presents a detail... |
|
cena:
205,43 zł |
Preserving Electronic Evidence for Trial: A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation
ISBN: 9780128093351 / Angielski / Miękka / 198 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Preserving Electronic Evidence for Trial provides everyone connected with digital forensics investigation and litigation with a clear and practical hands-on guide to the best practices in preserving electronic evidence. Corporate management personnel (legal & IT) and outside counsel need reliable processes for the litigation hold - identifying, locating, and preserving electronic evidence. Preserving Electronic... The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory inve... |
|
cena:
261,94 zł |
IOS Forensics Cookbook
ISBN: 9781783988464 / Angielski / Miękka / 184 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
191,67 zł |
Making Passwords Secure: Fixing the Weakest Link in Cybersecurity
ISBN: 9781530164486 / Angielski / Miękka / 170 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ENTERPRISE CYBERSECURITY's most ignored risk is... User Authentication When end users are allowed to generate, know, remember, type and manage their own passwords, IT has inadvertently surrendered the job title Network Security Manager to employees - the weakest link in the cybersecurity chain. Passwords are not the problem. The management of passwords is the real security nightmare. Dovell Bonnett reveals the truth about the elephant in the room that no one wants to mention: Expensive backend...
ENTERPRISE CYBERSECURITY's most ignored risk is... User Authentication When end users are...
|
|
cena:
45,95 zł |
Cyber Security: Everything an Executive Needs to Know
ISBN: 9781988071206 / Angielski / Twarda / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A new age has dawned. One where the masked thieves are now replaced by extremely intelligent and savvy computer programmers who choose to steal, wreak havoc, and leave their lasting mark on your business through accessing your sensitive data and protected information. A cyber-breach could literally bring a healthy organization to its knees. Even if it recovers, the damage done is potentially irreversible. Armed with the knowledge that cyber-threats are now more common than ever, there are meaningful steps you and your organization can take to ensure you are not victimized by a hacker. In... A new age has dawned. One where the masked thieves are now replaced by extremely intelligent and savvy computer programmers who choose to steal, wr... |
|
cena:
122,85 zł |
Journal of Cyber Security and Mobility (4-2&3): Cybersecurity, Privacy and Trust
ISBN: 9788793379428 / Angielski / Miękka / 154 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cybersecurity is a global issue with local impact. When cyber security breaches occur, it impacts on society at all levels: Users lose trust in digital platforms, companies lose money, and public institutions are discredited. Over the last years, cybersecurity as a concept has changed significantly and has become a broad area covering for example crime, espionage, privacy inva- sions, and technical solutions for prevention of attacks on users, individuals as well as industry/companies. Along with this, privacy has become a central element in the discussion mirroring the fact that users have...
Cybersecurity is a global issue with local impact. When cyber security breaches occur, it impacts on society at all levels: Users lose trust in digita...
|
|
cena:
221,20 zł |
D/DoS: Denial of Service Attacks
ISBN: 9781530026883 / Angielski / Miękka / 154 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Denial of Service or Distributed Denial of Service attack is analogous to a group of people crowding the entry door or gate to a shop or business, and not letting legitimate parties enter into the shop or business, disrupting normal operations. Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks, credit card payment gateways; but motives of revenge, blackmail or activism can be behind other attacks.
A Denial of Service or Distributed Denial of Service attack is analogous to a group of people crowding the entry door or gate to a shop or business, a...
|
|
cena:
276,51 zł |
Cryptographic Attacks: Computer Security Exploits
ISBN: 9781530025299 / Angielski / Miękka / 330 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A cryptographic attack is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme.
A cryptographic attack is a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic pro...
|
|
cena:
276,51 zł |
Kali Linux Web Penetration Testing Cookbook
ISBN: 9781784392918 / Angielski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
270,31 zł |
Communication, Control and Security Challenges for the Smart Grid
ISBN: 9781785611421 / Angielski / Twarda / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Smart Grid is a modern electricity grid allowing for distributed, renewable intermittent generation, partly owned by consumers. This requires advanced control and communication technologies in order to provide high quality power supply and secure generation, transmission and distribution. This book outlines these emerging technologies.
This essential reading focuses specifically on security and control aspects of the smart grid. It covers various related topics including smart grid architecture; communications and networking features; measuring and sensing devices; and smart... The Smart Grid is a modern electricity grid allowing for distributed, renewable intermittent generation, partly owned by consumers. This requires adva...
|
|
cena:
899,75 zł |
Journal of Cyber Security and Mobility 4-4
ISBN: 9788793379732 / Angielski / Miękka / 102 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Aims: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable for practitioners as well as those new in the field. Scope: This journal covers security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications will also be published. The publication will take a holistic view. Some example topics are: security in mobile networks, security and mobility optimization, cyber security, cloud security, Internet of Things (IoT)...
Aims: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering topics that are equally valuable...
|
|
cena:
252,08 zł |
Learning Python for Forensics: Learn the art of designing, developing, and deploying innovative forensic solutions through Python
ISBN: 9781783285235 / Angielski / Miękka / 488 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
324,39 zł |