Filteren
Trefwoord
Pagina 2 van
54 resultaten
paperbackEngels248 blz.9781593278557
1e druk
15-11-2018
Using Kali Linux, an advanced penetration testing distribution of Linux, you’ll learn the basics of using the Linux operating system and acquire the tools and techniques you’ll need to take control of a Linux environment. Meer
gebondenEngels548 blz.9781032447179
1e druk
30-8-2024
This book, penned by an expert in the field, ventures beyond traditional approaches, offering a unique blend of real-world penetration testing insights and comprehensive research. Meer
paperbackEngels1141 blz.9781493224258
1e druk
24-8-2023
Uncover security vulnerabilities and harden your system against attacks! With this guide you'll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Meer
paperbackEngels102 blz.9781367590496
1e druk
2-10-2019
Covering tools within Kali Linux. Also contains some IP networking charts, Powershell guide as well as IP header info, Full list of Kali commands, etc. Meer
paperbackEngels384 blz.9781597492157
1e druk
31-3-2008
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America. Meer
paperbackEngels724 blz.9781394186921
1e druk
14-5-2023
The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions. Meer
paperbackEngels464 blz.9781119650799
1e druk
17-12-2020
Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. Meer
paperbackEngels9781119825395
1e druk
25-11-2021
paperbackEngels205 blz.9781484272572
1e druk
28-8-2021
You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. Meer
paperbackEngels300 blz.9780134173269
1e druk
28-6-2017
paperbackEngels416 blz.9781119872191
7e druk
13-6-2022
Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. Meer
gebondenEngels288 blz.9780393866667
1e druk
24-3-2023
A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. Meer
e-bookEngels720 blz.9780071780292
23-7-2012
Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Meer
paperbackEngels601 blz.9780071800143
4e druk
1-3-2014
In deze uitgave vindt u de belangrijkste nieuwe hulpmiddelen waarmee u uw netwerk kunt beveiligen tegen indringers. Meer
paperbackNederlands200 blz.9789490969356
1e druk
6-9-2021
Dit boek is een opslagplaats van verhalen over verschijnselen en ontwikkelingen van de cyber. Technieken veranderen, maar mensen blijven mensen en hun motieven door de eeuwen heen nagenoeg hetzelfde. Meer
gebondenEngels389 blz.9783319685106
1e druk
7-12-2017
This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. Meer
paperbackEngels294 blz.9781484216811
2e druk
1-9-2020
This book shows you how to best design and develop Android apps with security in mind: explore concepts that you can use to secure apps and how you can use and incorporate these security features into your apps. Meer
paperbackEngels320 blz.9781484242995
1e druk
3-10-2019
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. Meer
paperbackEngels470 blz.9781491910955
3e druk
30-12-2016
How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. Meer
gebondenEngels627 blz.9780789756916
2e druk
28-4-2017
Learn, prepare, and practice for CEH v8 exam success with Certified Ethical Hacker (CEH) Cert Guide from Pearson IT Certification, a leader in IT certification. Meer