Artboard 33atençãoArtboard 18atualizarconectividadeArtboard 42boletocarrinhocartãoArtboard 45cartão SaraivacelularArtboard 42Artboard 23checkArtboard 28Artboard 17?compararcompartilharcompartilhar ativoArtboard 28Artboard 43Artboard 49Artboard 47ver-detalhesArtboard 15Artboard 32ebookArtboard 22Artboard 5Artboard 25Artboard 1Artboard 42Artboard 11fecharfilmesArtboard 23gamesArtboard 4Artboard 9Artboard 6hqimportadosinformáticaArtboard 7Artboard 3Artboard 12Artboard 25Artboard 34Artboard 43Artboard 44curtirArtboard 24Artboard 13livrosArtboard 24Artboard 31menumúsicaArtboard 27Artboard 30Artboard 36Artboard 44outrospapelariaArtboard 17Artboard 6Artboard 27Artboard 30Artboard 29Artboard 26Artboard 2Artboard 20Artboard 35estrelaestrela ativorelógiobuscaArtboard 50Artboard 26toda saraivaArtboard 40Artboard 21Artboard 10Artboard 37usuárioArtboard 46Artboard 33Artboard 8seta

Resultados para: hacking

Refinar por
136 produtos
  • Hacking Para Leigos - Tradução da 3ª Ed. 2014

    Beaver,Kevin
    (7695484)

    Você pode ter sido encarregado de realizar um teste geral de invasão, ou pode querer realizar testes específicos, tais como quebra de senhas, ou, ainda, tentar conseguir acesso a um aplicativo da Web. Ou você pode estar realizando um teste de...

  • Hacking Growth - A Estratégia De Marketing...

    Ellis,Sean; Brown,Morgan
    (9883356)

    O livro definitivo dos pioneiros do growth hacking, uma das melhores metodologias de negócios no Vale do Silício. Parece difícil de acreditar, mas houve um momento em que o Airbnb era o segredo mais bem-guardado de couchsurfers, o LinkedIn era uma...

  • Hacking – a Proxima Geração

    Dhanjani,Nitesh
    (3527642)

    Vetores de ataque que já foram considerados algo fantasioso no passado, agora são realidade. Existem dois motivos para isso; primeiro, a necessidade de mobilidade dos equipamentos e de agilidade na tecnologia de acesso tornou o modelo tradicional de...

  • e-book

    Hacking the Hacker - Learn From the Experts...

    Grimes,Roger A.
    (9655530)

    Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this...

  • e-book

    Hacking Innovation - The New Growth Model...

    Linkner,Josh
    (9653873)

    Hackers are a global fascination with cybercrime representing our single biggest threat to national security. But putting their sinister motives aside, the dark underworld of hackers contains some of the most creative minds on the planet.

  • e-book

    Hacking For Dummies

    Beaver,Kevin
    (9295079)

    Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your...

  • e-book

    Hacking For Dummies

    Beaver,Kevin
    (9448321)

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better...

  • e-book

    Hacking Exposed Mobile - Security Secrets&...

    Mike Stanfield; Neil Bergman; Jason Rouse
    (9553581)

    Proven security tactics for today'apos;s mobile apps, devices, and networks'quot;A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter.'quot; --...

  • e-book

    Hacking Exposed Web Applications, Third...

    Scambray, Joel; Sima, Caleb; Liu, Vincent
    (3165660)

    The latest Web app attacks and countermeasures from world-renowned practitionersProtect your Web applications from malicious attacks by mastering the weapons and thought processes of today'apos;s hacker. Written by recognized security practitioners...

  • e-book

    Hacking Exposed Web 2.0: Web 2.0 Security...

    Dwivedi, Himanshu; Cannings,Rich; Lackey,Zane
    (8096859)

    Lock down next-generation Web services 'This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats.' --Max Kelly, CISSP, CIPP...

  • e-book

    Hacking Exposed Computer Forensics, Second...

    Davis,Chris; Philipp,Aaron; Cowen,David
    (3023004)

    'Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the...

  • e-book

    Hacking Exposed Cisco Networks: Cisco...

    Gavrilenko,Konstantin; Vladimirov,Andrew; Mikhailovsky,Andrei
    (8101113)

    Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network...

  • e-book

    Hacking Exposed 7: Network Security Secrets...

    Scambray, Joel; Kurtz,George; Mcclure,Stuart,
    (8322614)

    The latest tactics for thwarting digital attacks 'Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such...

  • e-book

    Hacking Point of Sale - Payment Application...

    Gomzin,Slava
    (9446444)

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many...

  • e-book

    Hacking Exposed

    Scambray,Joel; Kurtz,George; McClure,Stuart
    (9841226)

    This one-of-a-kind book provides in-depth expert insight into how hackers infiltrate e-business, and how they can be stopped.

  • e-book

    Hacking For Dummies

    Beaver,Kevin
    (9448164)

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better...

  • e-book

    Hacking For Dummies

    Beaver, Kevin
    (10279402)

    Stop hackers before they hack you!  In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his...

  • e-book

    Hacking Point of Sale - Payment Application...

    Gomzin,Slava
    (9446510)

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many...

  • e-book

    Hacking Hot Potatoes - The Cookbook

    Bogdanov,Mr Stan
    (9437067)

    This book is dedicated to extending the capabilities of a powerful suite of Web authoring tools - Hot Potatoes, by Half-Baked Software Inc. and the University of Victoria Humanities Computing and Media Centre. It is intended to help you make the best...

  • e-book

    Hacking Wireless Networks For Dummies

    Davis,Peter T.; Beaver,Kevin
    (9295074)

    Become a cyber-hero - know the common wireless weaknesses 'Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.' --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP)...

  • e-book

    Google Hacking for Penetration Testers

    Gardner, Bill; Long,Johnny; Gardner,Bill; Brown,Justin
    (3025199)

    A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading...

  • e-book

    Hacking Exposed Linux - Linux Security...

    (3022891)

    The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way,...

  • e-book

    Hacking Vim 7.2

    Schulz Kim
    (8322618)

    This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapter covers a set of recipes, each of which follows a systematic approach with a self-contained...

  • e-book

    Hardware Hacking: Have Fun while Voiding your...

    Russell,Ryan; Mitnick,Kevin D.; Grand,Joe
    (3024951)

    'If I had this book 10 years ago, the FBI would never have found me!' -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed 'gadget geek.' Take an ordinary...

  • e-book

    Ethical Hacking and Computer Securities for...

    Lallan,Elaiya Iswera
    (9609309)

    This book is written based on practical usage and research on computer security and networks. Basically everyone has strong concern about computer security networks where by it can sabotage the business and operations. It will be worse if the entire...

  • e-book

    Kismet Hacking

    Thornton,Frank; Haines,Brad; Schearer, Michael J.
    (3029010)

    Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in...

  • e-book

    Hacking Android

    Mohammed A. Imran; Srinivasa Rao Kotipalli
    (9544007)

    Explore every nook and cranny of the Android OS to modify your device and guard it against security threatsAbout This Book• Understand and counteract against offensive security threats to your applications• Maximize your device's power and potential...

  • e-book

    Hacking Exposed Malware& Rootkits - Security...

    Bodmer, Sean M.; Elisan, Christopher C.; Davis, Michael A.
    (9434235)

    Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramatically improve your organization'apos;s security posture using the proven defense strategies in this thoroughly updated guide. Hacking...

  • e-book

    Hacking a Terror Network: The Silent Threat...

    Rogers,Russ; Devost,Matthew G
    (3025277)

    Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic 'insider's look' into...

  • e-book

    CHFI Computer Hacking Forensic Investigator...

    Brooks, Charles L.
    (9841753)

    An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-CouncilGet complete coverage of all the material included on version 8 of the EC-Council'apos;s Computer Hacking Forensic Investigator exam from...

  • e-book

    Basic Wifi Hacking

    Mad76e
    (9473749)

    This book contains interesting information for those who are interested in Ethical hacking. This book is written from a hackers point of view, pentesting our most popular wireless communication in our home This book was created to help and teach...

  • e-book

    InfoSec Career Hacking: Sell Your Skillz, Not...

    Hurley,Chris; Long,Johnny; Bayles,Aaron W
    (3025288)

    'InfoSec Career HackingÂ? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The...

  • e-book

    Low Tech Hacking: Street Smarts for Security...

    Wiles,Jack; Gudaitis, Terry; Jabbusch,Jennifer
    (3737920)

    Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are...

  • e-book

    Advanced Persistent Threat Hacking - The Art...

    Wrightson, Tyler
    (9650811)

    Master the tactics and tools of the advanced persistent threat hackerIn this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat...

  • e-book

    A First Course In Ethical Hacking

    Herman van Heerden
    (9612730)

    As a youngster, the romance of hacking took hold of my imagination.  Computers were always my passion, and the myth (legend?) of kids who moved a satellite by messing around were well known and the subject of daydreaming. But where to begin?  While...

  • e-book

    Social Engineering - The Science of Human...

    Hadnagy, Christopher
    (10279427)

    Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and...

  • e-book

    Facebook Guide - Everything You Need to Know...

    Dave Bennet
    (9480576)

    What No One Will Tell YouFirst of all, Facebook is a social networking website that was primarily designed for use for Ivy League college students. However, because of the interactive tools that it can offer, it is now widely available for many...

  • - -
    audio livro

    Hacking Culture

    (ubook-227000)

    In-depth interviews with open source and free software advocates.

    (Assinatura Mensal com Conteúdo Ilimitado)
  • - -
    audio livro

    Hacking the Pacific

    (ubook-226609)

    Hacking the Pacific is the podcast where we talk about building software and a company across the Pacific Ocean. Hiro is in Japan and Bryan is on the west coast of the US.

    (Assinatura Mensal com Conteúdo Ilimitado)
  • e-book

    Hacking Your LEGO Mindstorms EV3 Kit

    Kelly,James Floyd; Baichtal, John
    (9464511)

    EV3 without limits!   Build 5 amazing robotics projects that take DIY to a whole new level!   You can do way more with your LEGO Mindstorms EV3 kit than anyone ever told you! In this full-color, step-by-step tutorial, top-maker and...

  • e-book

    Hacking the Human - Social Engineering...

    Ian Mr Mann
    (9790558)

    Ian Mann's Hacking the Human highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Offering more than a simple checklist to follow, the book provides a rich mix...

  • e-book

    Hacking Your LEGO Mindstorms EV3 Kit

    Kelly,James Floyd; Baichtal, John
    (9848920)

    EV3 without limits!   Build 5 amazing robotics projects that take DIY to a whole new level!   You can do way more with your LEGO Mindstorms EV3 kit than anyone ever told you! In this full-color, step-by-step tutorial, top-maker and...

  • e-book

    Hacking Raspberry Pi

    Warner,Timothy L.
    (9513870)

    DIY hardware hacking...easy as Pi ®! Raspberry Pi is taking off like a rocket! You can use this amazing, dirt-cheap, credit card-sized computer to learn powerful hardware hacking techniques as you build incredibly creative and useful...

  • e-book

    Hacking Exposed Windows - Microsoft Windows...

    (8322623)

    The latest Windows security attack and defense strategies'quot;Securing Windows begins with reading this book.'quot; --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed...

Busca por