Filteren
Trefwoord
Pagina 2 van
50 resultaten
Trefwoord: Hack
paperbackEngels464 blz.9781119650799
1e druk
17-12-2020
Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. Meer
paperbackEngels320 blz.9781119433385
2e druk
13-7-2018
Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks. Meer
paperbackEngels285 blz.9781098127244
2e druk
14-7-2024
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. Meer
paperbackEngels1141 blz.9781493224258
1e druk
24-8-2023
Uncover security vulnerabilities and harden your system against attacks! With this guide you'll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Meer
paperbackEngels460 blz.9781718500907
1e druk
19-11-2020
Whether you’re a security researcher, IT team member, or hacking hobbyist, you’ll find Practical IoT Hacking indispensable in your efforts to... Meer
gebondenEngels389 blz.9783319685106
1e druk
7-12-2017
This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. Meer
paperbackEngels272 blz.9781541724426
1e druk
11-7-2019
The Cult of the Dead Cow is the story of the oldest, most respected and most famous hacking group of all time. Meer
paperbackEngels320 blz.9781484242995
1e druk
3-10-2019
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. Meer
paperbackEngels102 blz.9781367590496
1e druk
2-10-2019
Covering tools within Kali Linux. Also contains some IP networking charts, Powershell guide as well as IP header info, Full list of Kali commands, etc. Meer
paperbackEngels304 blz.9781398613706
1e druk
6-10-2025
Discover the strategies, secrets and stories behind the cyber attacks that target businesses and individuals across the world and learn how you can safeguard yourself against them. Meer
paperbackEngels300 blz.9781593278748
1e druk
21-12-2021
Become a master hacker with this expert-written deep dive into hardware attacks on embedded systems. Meer
paperbackEngels294 blz.9781484216811
2e druk
1-9-2020
This book shows you how to best design and develop Android apps with security in mind: explore concepts that you can use to secure apps and how you can use and incorporate these security features into your apps. Meer
paperbackEngels205 blz.9781484272572
1e druk
28-8-2021
You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. Meer
paperbackEngels470 blz.9781491910955
3e druk
30-12-2016
How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. Meer
paperbackEngels384 blz.9781597492157
1e druk
31-3-2008
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America. Meer
paperbackEngels251 blz.9781491920879
1e druk
22-9-2015
With this practical guide, Owen Yamauchi-a member of Facebook’s core Hack and HHVM teams-shows you how to get started with these battle-tested open-source tools. Meer
paperbackEngels416 blz.9781259589713
1e druk
1-9-2016
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks with the tried-and-true Hacking Exposed way. Meer
paperbackEngels640 blz.9781260108415
5e druk
18-5-2018
This fully updated, industry-standard security resource shows how to fortify computer networks by learning and effectively applying ethical hacking techniques. Meer
paperbackEngels556 blz.9781260454550
4e druk
16-4-2019
Thoroughly updated for CEH V10 exam objectives, this integrated self-study system offers complete coverage of the EC-Council’s Certified Ethical Hacker exam. Meer
paperbackEngels272 blz.9781119491804
1e druk
16-4-2020
'Hacking Connected Cars' deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Meer