Artboard 33 Artboard 16 Artboard 18 Artboard 15 Artboard 21 Artboard 1 Artboard 2 Artboard 5 Artboard 45 Artboard 45 Artboard 22 Artboard 9 Artboard 23 Artboard 17? Artboard 28 Artboard 43 Artboard 49 Artboard 47 Artboard 38 Artboard 32 Artboard 8 Artboard 22 Artboard 5 Artboard 25 Artboard 1 Artboard 42 Artboard 11 Artboard 41 Artboard 13 Artboard 23 Artboard 10 Artboard 4 Artboard 9 Artboard 20 Artboard 6 Artboard 11 Artboard 7 Artboard 3 Artboard 3 Artboard 12 Artboard 25 Artboard 34 Artboard 39 Artboard 24 Artboard 13 Artboard 19 Artboard 7 Artboard 24 Artboard 31 Artboard 4 Artboard 14 Artboard 27 Artboard 30 Artboard 36 Artboard 44 Artboard 12 Artboard 17 Artboard 17 Artboard 6 Artboard 27 Artboard 19 Artboard 30 Artboard 29 Artboard 29 Artboard 26 Artboard 18 Artboard 2 Artboard 20 Artboard 35 Artboard 15 Artboard 14 Artboard 48 Artboard 50 Artboard 26 Artboard 16 Artboard 40 Artboard 21 Artboard 29 Artboard 10 Artboard 37 Artboard 3 Artboard 3 Artboard 46 Artboard 8

Resultados para: hacking

145 produtos
  • Hacking Para Leigos - Tradução da 3ª Ed. 2014

    Beaver,Kevin
    (7695484)

    Você pode ter sido encarregado de realizar um teste geral de invasão, ou pode querer realizar testes específicos, tais como quebra de senhas, ou, ainda, tentar conseguir acesso a um aplicativo da Web. Ou você pode estar realizando um teste de...

  • Hacking – a Proxima Geração

    Dhanjani, Nitesh
    (3527642)

    Vetores de ataque que já foram considerados algo fantasioso no passado, agora são realidade. Existem dois motivos para isso; primeiro, a necessidade de mobilidade dos equipamentos e de agilidade na tecnologia de acesso tornou o modelo tradicional de...

  • e-book

    Hacking the Hacker - Learn From the Experts...

    Grimes,Roger A.
    (9655530)

    Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this...

  • e-book

    Hacking Para Leigos - Tradução da 3ª Ed.

    Beaver, Kevin
    (8158025)

    Você pode ter sido encarregado de realizar um teste geral de invasão, ou pode querer realizar testes específicos, tais como quebra de senhas, ou, ainda, tentar conseguir acesso a um aplicativo da Web. Ou você pode estar realizando um teste de...

  • Hacking Growth - How Today's Fastest-Growing...

    Brown,Morgan
    (9740029)

    A compelling methodology...to increase market share quickly'. (Eric Ries, bestselling author of THE LEAN STARTUP). 'A must-read for anyone in business'. (James Currier, managing partner, NFX Guild). 'Will teach you how to think like a marketer of...

  • e-book

    Advanced Penetration Testing - Hacking the...

    Allsopp,Wil
    (9527175)

    Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring...

  • e-book

    Hacking For Dummies

    Beaver,Kevin
    (9295079)

    Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your...

  • e-book

    Hacking Vim 7.2

    (8322618)

    This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapter covers a set of recipes, each of which follows a systematic approach with a self-contained...

  • e-book

    Hacking For Dummies

    Beaver,Kevin
    (9448164)

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better...

  • e-book

    Hacking Exposed Linux - Linux Security...

    Isecom
    (3022891)

    The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way,...

  • e-book

    HACKING EXPOSED WEB APPLICATIONS, 3rd Edition

    Scambray,Joel; Sima,Caleb; Liu, Vincent
    (3165660)

    The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and...

  • e-book

    Hacking with Kali - Practical Penetration...

    Broad, James
    (9756185)

    Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James...

  • e-book

    Hacking Web Apps - Detecting and Preventing...

    (4902067)

    How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the...

  • e-book

    Hacking Exposed Cisco Networks: Cisco...

    Gavrilenko,Konstantin; Vladimirov,Andrew; Mikhailovsky,Andrei
    (8101113)

    Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network...

  • e-book

    Hacking the Code - Auditor'apos;s Guide to...

    Burnett,Mark
    (3024943)

    Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits,...

  • e-book

    Hacking Android

    Mohammed A. Imran; Srinivasa Rao Kotipalli
    (9544007)

    Explore every nook and cranny of the Android OS to modify your device and guard it against security threatsAbout This Book• Understand and counteract against offensive security threats to your applications• Maximize your device's power and potential...

  • e-book

    Hacking Exposed Mobile - Security Secrets&...

    Mike Stanfield; Neil Bergman; Jason Rouse
    (9553581)

    Proven security tactics for today'apos;s mobile apps, devices, and networks'quot;A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter.'quot; --...

  • e-book

    Hacking Exposed Malware& Rootkits - Security...

    Sean M. Bodmer; Michael A. Davis
    (9434235)

    Arm yourself for the escalating war against malware and rootkitsThwart debilitating cyber-attacks and dramatically improve your organization'apos;s security posture using the proven defense strategies in this thoroughly updated guide. Hacking...

  • e-book

    Hacking Exposed 7: Network Security Secrets...

    Scambray,Joel; Kurtz,George; Mcclure,Stuart,
    (8322614)

    The latest tactics for thwarting digital attacks 'Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such...

  • e-book

    Hacking Exposed Computer Forensics, Second...

    Davis, Chris; Philipp,Aaron; Cowen, David
    (3023004)

    'Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the...

  • e-book

    Hacking For Dummies

    Beaver,Kevin
    (9448321)

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better...

  • e-book

    Hacking Exposed Windows - Microsoft Windows...

    Scambray,Joel
    (8322623)

    The latest Windows security attack and defense strategies'quot;Securing Windows begins with reading this book.'quot; --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed...

  • e-book

    Hacking Wireless Networks For Dummies

    Davis,Peter T.; Beaver,Kevin
    (9295074)

    Become a cyber-hero - know the common wireless weaknesses 'Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.' --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP)...

  • e-book

    Hacking Hot Potatoes - The Cookbook

    (9437067)

    This book is dedicated to extending the capabilities of a powerful suite of Web authoring tools - Hot Potatoes, by Half-Baked Software Inc. and the University of Victoria Humanities Computing and Media Centre. It is intended to help you make the best...

  • e-book

    Hacking Point of Sale - Payment Application...

    Gomzin, Slava
    (9446444)

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many...

  • e-book

    Hacking Point of Sale - Payment Application...

    Gomzin, Slava
    (9446510)

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many...

  • e-book

    Hacking Exposed Web 2.0: Web 2.0 Security...

    Dwivedi,Himanshu; Cannings,Rich; Lackey,Zane
    (8096859)

    Lock down next-generation Web services 'This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats.' --Max Kelly, CISSP, CIPP...

  • e-book

    Hacking Wireless Access Points - Cracking,...

    (9452406)

    Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for...

  • e-book

    Hacking Exposed

    Scambray,Joel; Kurtz,George; McClure,Stuart
    (9841226)

    This one-of-a-kind book provides in-depth expert insight into how hackers infiltrate e-business, and how they can be stopped.

  • e-book

    Hacking Vim - A Cookbook to get the Most out...

    Schulz Kim
    (8293232)

    This is a cookbook packed with ready-to-use hacks that give solutions for some of the commonest problems users of the Vim editor encounter during their daily use. Each recipe follows a systematic approach with a self-contained description of the task...

  • e-book

    Hacking a Terror Network: The Silent Threat...

    Rogers, Russ; Devost,Matthew G
    (3025277)

    Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic 'insider's look' into...

  • Hacking Product Design - Help Any Team Build...

    Govella, Austin
    (9932888)

    UX designers today can piece together several frameworks and have a new website or app up and running in a matter of days--as long as everyone on the project has the same vision, that is. Implementing a product is no longer a problem, but...

    pré-venda
  • e-book

    Hacking Your Mind!

    Stephen Ebanks
    (9923940)

    Hacking Your Mind: This brilliant little ebook is designed for those who need to harness the power of your dormant capacity. We are quite literally living in an age of 'zombies' who have lost their capabilities to think and go into themselves. This...

  • e-book

    Google Hacking for Penetration Testers

    Long,Johnny; Gardner,Bill; Brown,Justin
    (9740800)

    Google is the most popular search engine ever created, but Google'apos;s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit...

  • e-book

    Hardware Hacking: Have Fun while Voiding your...

    Russell,Ryan; Mitnick,Kevin D.; Grand,Joe
    (3024951)

    'If I had this book 10 years ago, the FBI would never have found me!' -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed 'gadget geek.' Take an ordinary...

  • e-book

    Ethical Hacking and Computer Securities for...

    Elaiya Iswera Lallan
    (9609309)

    This book is written based on practical usage and research on computer security and networks. Basically everyone has strong concern about computer security networks where by it can sabotage the business and operations. It will be worse if the entire...

  • e-book

    Wireless Hacking

    (3025188)

    Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN...

  • e-book

    Ninja Hacking - Unconventional Penetration...

    Wilhelm,Thomas; Andress, Jason; Andress,Jason
    (3129515)

    Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques,...

  • e-book

    Google Hacking for Penetration Testers

    Long,Johnny
    (3024932)

    Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice...

  • e-book

    Kismet Hacking

    Thornton,Frank; Haines,Brad; Schearer, Michael J.
    (3029010)

    Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in...

  • e-book

    Certified Hacking Forensic Investigator...

    Thomas,Shirley
    (9847495)

    Certified Hacking Forensic Investigator Secrets To Acing The Exam and Successful Finding And Landing Your Next Certified Hacking Forensic Investigator Certified Job

  • e-book

    Google Hacking for Penetration Testers

    Long,Johnny; Gardner, Bill; Brown,Justin
    (3025199)

    A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading...

  • e-book

    Asterisk Hacking

    (3028757)

    Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone...

  • For Dummies (Computers) - Hacking For Dummies

    Beaver, Kevin
    (9401832)

    This is the hardcover format of Hacking For Dummies, 4th Edition. Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by...

    sob encomenda
Busca por