Artboard 33Artboard 16Artboard 18Artboard 13Artboard 42Artboard 21Artboard 4Artboard 5Artboard 45Artboard 22Artboard 7Artboard 42Artboard 23Artboard 12Artboard 28Artboard 17?Artboard 28Artboard 43Artboard 49Artboard 47Artboard 15Artboard 32Artboard 6Artboard 22Artboard 5Artboard 25Artboard 1Artboard 42Artboard 11Artboard 41Artboard 11Artboard 23Artboard 10Artboard 4Artboard 9Artboard 6Artboard 8Artboard 7Artboard 3Artboard 12Artboard 25Artboard 34Artboard 43Artboard 44Artboard 16Artboard 24Artboard 13Artboard 5Artboard 24Artboard 31Artboard 1Artboard 12Artboard 27Artboard 30Artboard 36Artboard 44Artboard 9Artboard 17Artboard 6Artboard 27Artboard 30Artboard 29Artboard 26Artboard 2Artboard 20Artboard 35Artboard 15Artboard 14Artboard 50Artboard 26Artboard 14Artboard 40Artboard 21Artboard 10Artboard 37Artboard 46Artboard 33Artboard 8

Resultados para: hacking

Refinar por
157 produtos
  • Testes de Invasão - Uma Introdução Prática ao...

    Weidman,Georgia

    (2)

    (8259438)

    Os pentesters simulam ciberataques para descobrir vulnerabilidades de segurança em redes, em sistemas operacionais e em aplicações. Os especialistas em segurança da informação no mundo todo utilizam técnicas de testes de invasão para avaliar as...

  • Hacking Com Kali Linux

    Broad,James; Bindner,Andrew
    (7219616)

    Hacking com Kali Linux apresenta a distribuição mais recente da ferramenta que é o padrão de fato para testes de invasão Linux. Começando pelo uso do live CD do Kali Linux e prosseguindo para a instalação em discos rígidos, pen drives e cartões SD,...

  • e-book

    Hacking For Dummies

    Beaver,Kevin
    (9295079)

    Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your...

  • Hacking Para Leigos - Tradução da 3ª Ed. 2014

    Beaver,Kevin
    (7695484)

    Você pode ter sido encarregado de realizar um teste geral de invasão, ou pode querer realizar testes específicos, tais como quebra de senhas, ou, ainda, tentar conseguir acesso a um aplicativo da Web. Ou você pode estar realizando um teste de...

  • Hacking – a Proxima Geração

    Dhanjani,Nitesh
    (3527642)

    Vetores de ataque que já foram considerados algo fantasioso no passado, agora são realidade. Existem dois motivos para isso; primeiro, a necessidade de mobilidade dos equipamentos e de agilidade na tecnologia de acesso tornou o modelo tradicional de...

  • Google Hacking Para Pentest

    Long,Johnny
    (9354938)

    O Google é o mecanismo de busca mais popular já criado, e seus recursos de pesquisa são tão poderosos que às vezes encontram conteúdo que não deveria ser disponibilizado publicamente na web, o que inclui números de CPF, números de cartão de crédito,...

  • e-book

    Hacking the Hacker - Learn From the Experts...

    Grimes,Roger A.
    (9655530)

    Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this...

  • e-book

    Hacking the Code - Auditor'apos;s Guide to...

    Burnett,Mark
    (3024943)

    Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits,...

  • Introdução ao Hacking e Aos Testes de Invasão

    Patrick Engebretson
    (7013046)

    Introdução ao hacking e aos testes de invasão apresenta uma introdução aos passos necessários para realizar um teste de invasão ou um hack ético do início ao fim. Não é preciso ter nenhuma experiência anterior com hacking para entender e seguir os...

  • e-book

    Hacking Innovation - The New Growth Model...

    Linkner,Josh
    (9653873)

    Hackers are a global fascination with cybercrime representing our single biggest threat to national security. But putting their sinister motives aside, the dark underworld of hackers contains some of the most creative minds on the planet.

  • e-book

    Hacking Exposed Cisco Networks: Cisco...

    Gavrilenko,Konstantin; Vladimirov,Andrew; Mikhailovsky,Andrei
    (8101113)

    Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network...

  • e-book

    Hacking Wireless Networks For Dummies

    Davis,Peter T.; Beaver,Kevin
    (9295074)

    Become a cyber-hero - know the common wireless weaknesses 'Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.' --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP)...

  • e-book

    HACKING EXPOSED WEB APPLICATIONS, 3rd Edition

    Scambray,Joel; Sima,Caleb; Liu,Vincent
    (3165660)

    The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and...

  • e-book

    Hacking Exposed 7: Network Security Secrets...

    Scambray,Joel; Kurtz,George; Mcclure,Stuart,
    (8322614)

    The latest tactics for thwarting digital attacks 'Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such...

  • e-book

    Hacking Exposed

    Scambray,Joel; Kurtz,George; McClure,Stuart
    (9841226)

    This one-of-a-kind book provides in-depth expert insight into how hackers infiltrate e-business, and how they can be stopped.

  • e-book

    Hacking and Penetration Testing with Low...

    Polstra,Philip
    (9654824)

    Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might...

  • e-book

    Hacking Exposed Web 2.0: Web 2.0 Security...

    Dwivedi,Himanshu; Cannings,Rich; Lackey,Zane
    (8096859)

    Lock down next-generation Web services 'This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats.' --Max Kelly, CISSP, CIPP...

  • e-book

    Hacking For Dummies

    Beaver,Kevin
    (9448321)

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better...

  • e-book

    Hacking Point of Sale - Payment Application...

    Gomzin,Slava
    (9446510)

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many...

  • e-book

    Hacking For Dummies

    Beaver,Kevin
    (9448164)

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better...

  • e-book

    Hacking Exposed Mobile - Security Secrets&...

    Mike Stanfield; Neil Bergman; Jason Rouse
    (9553581)

    Proven security tactics for today'apos;s mobile apps, devices, and networks'quot;A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter.'quot; --...

  • e-book

    Hacking Point of Sale - Payment Application...

    Gomzin,Slava
    (9446444)

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many...

  • e-book

    Hacking Hot Potatoes - The Cookbook

    Bogdanov,Mr Stan
    (9437067)

    This book is dedicated to extending the capabilities of a powerful suite of Web authoring tools - Hot Potatoes, by Half-Baked Software Inc. and the University of Victoria Humanities Computing and Media Centre. It is intended to help you make the best...

  • Introdução ao Web Hacking - Ferramentas e...

    Pauli,Josh
    (6855675)

    Explore os campos de batalha, os combatentes, as ferramentas e as técnicas presentes nos conflitos digitais atuais. Se você for totalmente iniciante na área de web hacking, este livro ensinará as ferramentas e técnicas básicas necessárias para...

  • e-book

    Hardware Hacking: Have Fun while Voiding your...

    Russell,Ryan; Mitnick,Kevin D.; Grand,Joe
    (3024951)

    'If I had this book 10 years ago, the FBI would never have found me!' -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed 'gadget geek.' Take an ordinary...

  • e-book

    Wireless Hacking

    Barken,Lee
    (3025188)

    Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN...

  • e-book

    Google Hacking for Penetration Testers

    Long,Johnny; Gardner,Bill; Brown,Justin
    (3025199)

    A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading...

  • e-book

    Ninja Hacking - Unconventional Penetration...

    Wilhelm,Thomas; Andress, Jason
    (3129515)

    Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques,...

  • e-book

    Ethical Hacking and Computer Securities for...

    Lallan,Elaiya Iswera
    (9609309)

    This book is written based on practical usage and research on computer security and networks. Basically everyone has strong concern about computer security networks where by it can sabotage the business and operations. It will be worse if the entire...

  • e-book

    Kismet Hacking

    Thornton,Frank; Haines,Brad; Schearer, Michael J.
    (3029010)

    Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in...

  • e-book

    Game Console Hacking - Xbox, PlayStation,...

    Grand,Joe; Yarusso,Albert
    (3027204)

    The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed...

  • e-book

    Basic Wifi Hacking

    Mad76e
    (9473749)

    This book contains interesting information for those who are interested in Ethical hacking. This book is written from a hackers point of view, pentesting our most popular wireless communication in our home This book was created to help and teach...

  • e-book

    CHFI Computer Hacking Forensic Investigator...

    Brooks,Charles L.
    (9841753)

    An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-CouncilGet complete coverage of all the material included on version 8 of the EC-Council'apos;s Computer Hacking Forensic Investigator exam from...

  • e-book

    No Tech Hacking - A Guide to Social...

    LONG ,JOHNNY
    (3029015)

    Johnny Long'apos;s last book sold 12,000 units worldwide. Kevin Mitnick'apos;s last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world'apos;s information is...

  • e-book

    InfoSec Career Hacking: Sell Your Skillz, Not...

    Hurley,Chris; Long,Johnny; Bayles,Aaron W
    (3025288)

    'InfoSec Career HackingÂ? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The...

  • e-book

    Low Tech Hacking: Street Smarts for Security...

    Wiles,Jack; Gudaitis, Terry; Jabbusch,Jennifer
    (3737920)

    Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are...

  • e-book

    Gray Hat Hacking The Ethical Hacker'apos;s...

    Harper,Allen; Harris,Shon; Allen,Harper,; Daniel Regalado
    (9613306)

    Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The...

  • e-book

    The Basics of Hacking and Penetration Testing...

    Patrick Engebretson
    (3654679)

    The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy - no prior...

  • e-book

    The Basics of Hacking and Penetration Testing...

    Patrick Engebretson
    (9637561)

    The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and...

  • e-book

    Job Reconnaissance - Using Hacking Skills to...

    More,Josh
    (9767513)

    There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people'apos;s limiting factor in their ability to get better jobs is not technical skills or even the soft skills...

  • e-book

    Linksys WRT54G Ultimate Hacking

    Asadoorian,Paul; Pesce,Larry
    (3028856)

    This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G'apos;s hardware...

  • e-book

    Social Engineering - The Art of Human Hacking

    Hadnagy,Christopher
    (9307001)

    The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world...

  • e-book

    A First Course In Ethical Hacking

    Herman van Heerden
    (9612730)

    As a youngster, the romance of hacking took hold of my imagination.  Computers were always my passion, and the myth (legend?) of kids who moved a satellite by messing around were well known and the subject of daydreaming. But where to begin?  While...

  • e-book

    Hacking Android

    Mohammed A. Imran; Srinivasa Rao Kotipalli
    (9544007)

    Explore every nook and cranny of the Android OS to modify your device and guard it against security threatsAbout This Book• Understand and counteract against offensive security threats to your applications• Maximize your device's power and potential...

Busca por