Artboard 33 Artboard 16 Artboard 18 Artboard 15 Artboard 21 Artboard 1 Artboard 2 Artboard 5 Artboard 45 Artboard 45 Artboard 22 Artboard 9 Artboard 23 Artboard 17? Artboard 28 Artboard 43 Artboard 49 Artboard 47 Artboard 38 Artboard 32 Artboard 8 Artboard 22 Artboard 5 Artboard 25 Artboard 1 Artboard 42 Artboard 11 Artboard 41 Artboard 13 Artboard 23 Artboard 10 Artboard 4 Artboard 9 Artboard 20 Artboard 6 Artboard 11 Artboard 7 Artboard 3 Artboard 3 Artboard 12 Artboard 25 Artboard 34 Artboard 39 Artboard 24 Artboard 13 Artboard 19 Artboard 7 Artboard 24 Artboard 31 Artboard 4 Artboard 14 Artboard 27 Artboard 30 Artboard 36 Artboard 44 Artboard 12 Artboard 17 Artboard 17 Artboard 6 Artboard 27 Artboard 19 Artboard 30 Artboard 29 Artboard 29 Artboard 26 Artboard 18 Artboard 2 Artboard 20 Artboard 35 Artboard 15 Artboard 14 Artboard 48 Artboard 50 Artboard 26 Artboard 16 Artboard 40 Artboard 21 Artboard 29 Artboard 10 Artboard 37 Artboard 3 Artboard 3 Artboard 46 Artboard 8

Resultados para: hacking

119 produtos
  • Hacking Com Kali Linux

    Broad, James; Bindner,Andrew
    (7219616)

    Hacking com Kali Linux apresenta a distribuição mais recente da ferramenta que é o padrão de fato para testes de invasão Linux. Começando pelo uso do live CD do Kali Linux e prosseguindo para a instalação em discos rígidos, pen drives e cartões SD,...

  • Hacking Para Leigos - Tradução da 3ª Ed. 2014

    Beaver, Kevin
    (7695484)

    Você pode ter sido encarregado de realizar um teste geral de invasão, ou pode querer realizar testes específicos, tais como quebra de senhas, ou, ainda, tentar conseguir acesso a um aplicativo da Web. Ou você pode estar realizando um teste de...

  • Hacking – a Proxima Geração

    Dhanjani, Nitesh
    (3527642)

    Vetores de ataque que já foram considerados algo fantasioso no passado, agora são realidade. Existem dois motivos para isso; primeiro, a necessidade de mobilidade dos equipamentos e de agilidade na tecnologia de acesso tornou o modelo tradicional de...

  • e-book

    Hacking the Hacker - Learn From the Experts...

    Grimes, Roger A.
    (9655530)

    Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this...

  • e-book

    Hacking Exposed Malware& Rootkits - Security...

    Sean M. Bodmer; Michael A. Davis
    (9434235)

    Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramatically improve your organization'apos;s security posture using the proven defense strategies in this thoroughly updated guide. Hacking...

  • e-book

    Hacking with Kali - Practical Penetration...

    Broad, James
    (9756185)

    Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James...

  • e-book

    HACKING EXPOSED WEB APPLICATIONS, 3rd Edition

    Scambray, Joel; Sima,Caleb; Liu,Vincent
    (3165660)

    The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and...

  • e-book

    Hacking Exposed Mobile - Security Secrets&...

    Mike Stanfield; Neil Bergman; Jason Rouse
    (9553581)

    Proven security tactics for today'apos;s mobile apps, devices, and networks'quot;A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter.'quot; --...

  • e-book

    Hacking Wireless Networks For Dummies

    Davis,Peter T.; Beaver, Kevin
    (9295074)

    Become a cyber-hero - know the common wireless weaknesses 'Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.' --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP)...

  • e-book

    Social Engineering - The Art of Human Hacking

    Hadnagy, Christopher
    (9307001)

    The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world...

  • e-book

    Hacking Exposed Computer Forensics, Second...

    Davis, Chris; Philipp,Aaron; Cowen, David
    (3023004)

    'Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the...

  • e-book

    Hacking Exposed Windows - Microsoft Windows...

    Scambray, Joel
    (8322623)

    The latest Windows security attack and defense strategies'quot;Securing Windows begins with reading this book.'quot; --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed...

  • e-book

    Hacking a Terror Network: The Silent Threat...

    Rogers,Russ; Devost,Matthew G
    (3025277)

    Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic 'insider's look' into...

  • e-book

    Hacking Exposed 7: Network Security Secrets...

    Scambray, Joel; Kurtz,George; Mcclure,Stuart,
    (8322614)

    The latest tactics for thwarting digital attacks 'Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such...

  • e-book

    Hacking Vim - A Cookbook to get the Most out...

    Schulz Kim
    (8293232)

    This is a cookbook packed with ready-to-use hacks that give solutions for some of the commonest problems users of the Vim editor encounter during their daily use. Each recipe follows a systematic approach with a self-contained description of the task...

  • e-book

    Hacking Exposed Linux - Linux Security...

    Isecom
    (3022891)

    The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way,...

  • e-book

    Hacking Android

    Mohammed A. Imran; Srinivasa Rao Kotipalli
    (9544007)

    Explore every nook and cranny of the Android OS to modify your device and guard it against security threatsAbout This Book• Understand and counteract against offensive security threats to your applications• Maximize your device's power and potential...

  • e-book

    Asterisk Hacking

    (3028757)

    Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone...

  • e-book

    Hacking For Dummies

    Beaver, Kevin
    (9295079)

    Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your...

  • e-book

    Hacking For Dummies

    Beaver, Kevin
    (9448164)

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better...

  • e-book

    Hacking For Dummies

    Beaver, Kevin
    (9448321)

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better...

  • e-book

    Hacking Vim 7.2

    (8322618)

    This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapter covers a set of recipes, each of which follows a systematic approach with a self-contained...

  • e-book

    Hacking Point of Sale - Payment Application...

    Gomzin, Slava
    (9446510)

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many...

  • e-book

    Hacking Point of Sale - Payment Application...

    Gomzin, Slava
    (9446444)

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many...

  • e-book

    Hacking Hot Potatoes - The Cookbook

    Mr Stan Bogdanov
    (9437067)

    This book is dedicated to extending the capabilities of a powerful suite of Web authoring tools - Hot Potatoes, by Half-Baked Software Inc. and the University of Victoria Humanities Computing and Media Centre. It is intended to help you make the best...

  • e-book

    Hacking the Code - Auditor'apos;s Guide to...

    Burnett, Mark
    (3024943)

    Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits,...

  • e-book

    Hacking Exposed Cisco Networks: Cisco...

    Gavrilenko, Konstantin; Vladimirov, Andrew; Mikhailovsky,Andrei
    (8101113)

    Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network...

  • e-book

    Hacking Web Apps - Detecting and Preventing...

    (4902067)

    How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the...

  • e-book

    Google Hacking for Penetration Testers

    Long, Johnny; Gardner, Bill; Brown, Justin
    (9740800)

    Google is the most popular search engine ever created, but Google'apos;s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit...

  • e-book

    Job Reconnaissance - Using Hacking Skills to...

    More, Josh
    (9767513)

    There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people'apos;s limiting factor in their ability to get better jobs is not technical skills or even the soft skills...

  • e-book

    Hacking Innovation - The New Growth Model...

    Linkner, Josh
    (9653873)

    Hackers are a global fascination with cybercrime representing our single biggest threat to national security. But putting their sinister motives aside, the dark underworld of hackers contains some of the most creative minds on the planet.

  • e-book

    Hacking Para Leigos - Tradução da 3ª Ed. 2014

    Beaver, Kevin
    (8158025)

    Você pode ter sido encarregado de realizar um teste geral de invasão, ou pode querer realizar testes específicos, tais como quebra de senhas, ou, ainda, tentar conseguir acesso a um aplicativo da Web. Ou você pode estar realizando um teste de...

  • e-book

    Professional Penetration Testing - Volume 1:...

    Wilhelm, Thomas
    (3033001)

    Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering,...

  • e-book

    Chained Exploits - Advanced Hacking Attacks...

    Whitaker, Andrew; Evans, Keatron; Jack Voth
    (9745899)

    The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them   Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of...

  • e-book

    Google Hacking for Penetration Testers

    Long, Johnny
    (3024932)

    Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice...

  • e-book

    Ethical Hacking and Computer Securities for...

    Elaiya Iswera Lallan
    (9609309)

    This book is written based on practical usage and research on computer security and networks. Basically everyone has strong concern about computer security networks where by it can sabotage the business and operations. It will be worse if the entire...

  • e-book

    Ninja Hacking - Unconventional Penetration...

    Wilhelm, Thomas; Andress, Jason; Andress, Jason
    (3129515)

    Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques,...

  • e-book

    Google Hacking for Penetration Testers

    Long,Johnny; Gardner, Bill; Brown, Justin
    (3025199)

    A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading...

  • e-book

    Hardware Hacking: Have Fun while Voiding your...

    Russell, Ryan; Mitnick,Kevin D.; Grand, Joe
    (3024951)

    'If I had this book 10 years ago, the FBI would never have found me!' -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed 'gadget geek.' Take an ordinary...

  • e-book

    Kismet Hacking

    Thornton, Frank; Haines, Brad; Schearer, Michael J.
    (3029010)

    Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in...

  • e-book

    Wireless Hacking

    (3025188)

    Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN...

  • Hacking And Penetration Testing Ultimate CD

    "beale,Jay; Haines, Brad; Kanclirz, Jan; Lon
    (3053660)

    Hacking and Penetration Testing Ultimate CD contains six of our best-selling titles.  This collection of ebooks provides the IT security professional with easy access to loads of information on a single CD.  It contains over 2300 pages of techniques...

    sob encomenda
  • Hacking The Code

    Burnett, Mark; Foster,James C.
    (904245)

    Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits,...

    sob encomenda
  • e-book

    Gray Hat Hacking The Ethical Hacker'apos;s...

    Harper, Allen; Harris, Shon; Allen, Harper,; Daniel Regalado
    (9613306)

    Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The...

Busca por