Artboard 33 Artboard 16 Artboard 18 Artboard 15 Artboard 21 Artboard 1 Artboard 2 Artboard 5 Artboard 45 Artboard 45 Artboard 22 Artboard 9 Artboard 23 Artboard 17? Artboard 28 Artboard 43 Artboard 49 Artboard 47 Artboard 38 Artboard 32 Artboard 8 Artboard 22 Artboard 5 Artboard 25 Artboard 1 Artboard 42 Artboard 11 Artboard 41 Artboard 13 Artboard 23 Artboard 10 Artboard 4 Artboard 9 Artboard 20 Artboard 6 Artboard 11 Artboard 7 Artboard 3 Artboard 3 Artboard 12 Artboard 25 Artboard 34 Artboard 39 Artboard 24 Artboard 13 Artboard 19 Artboard 7 Artboard 24 Artboard 31 Artboard 4 Artboard 14 Artboard 27 Artboard 30 Artboard 36 Artboard 44 Artboard 12 Artboard 17 Artboard 17 Artboard 6 Artboard 27 Artboard 19 Artboard 30 Artboard 29 Artboard 29 Artboard 26 Artboard 18 Artboard 2 Artboard 20 Artboard 35 Artboard 15 Artboard 14 Artboard 48 Artboard 50 Artboard 26 Artboard 16 Artboard 40 Artboard 21 Artboard 29 Artboard 10 Artboard 37 Artboard 3 Artboard 3 Artboard 46 Artboard 8

Resultados para: hacking

99 produtos
  • Hacking Com Kali Linux

    Broad, James; Bindner, Andrew
    (7219616)

    Hacking com Kali Linux apresenta a distribuição mais recente da ferramenta que é o padrão de fato para testes de invasão Linux. Começando pelo uso do live CD do Kali Linux e prosseguindo para a instalação em discos rígidos, pen drives e cartões SD,...

  • e-book

    Hacking Para Leigos - Tradução da 3ª Ed. 2014

    Beaver,Kevin
    (8158025)

    Você pode ter sido encarregado de realizar um teste geral de invasão, ou pode querer realizar testes específicos, tais como quebra de senhas, ou, ainda, tentar conseguir acesso a um aplicativo da Web. Ou você pode estar realizando um teste de...

  • Hacking Growth - A Estratégia De Marketing...

    Ellis, Sean; Brown, Morgan
    (9883356)

    O livro definitivo dos pioneiros do growth hacking, uma das melhores metodologias de negócios no Vale do Silício. Parece difícil de acreditar, mas houve um momento em que o Airbnb era o segredo mais bem-guardado de couchsurfers, o LinkedIn era uma...

    pré-venda
  • Testes de Invasão - Uma Introdução Prática ao...

    Weidman,Georgia
    (8259438)

    Os pentesters simulam ciberataques para descobrir vulnerabilidades de segurança em redes, em sistemas operacionais e em aplicações. Os especialistas em segurança da informação no mundo todo utilizam técnicas de testes de invasão para avaliar as...

  • Hacking – a Proxima Geração

    Dhanjani, Nitesh
    (3527642)

    Vetores de ataque que já foram considerados algo fantasioso no passado, agora são realidade. Existem dois motivos para isso; primeiro, a necessidade de mobilidade dos equipamentos e de agilidade na tecnologia de acesso tornou o modelo tradicional de...

  • e-book

    Hacking Android

    Mohammed A. Imran; Srinivasa Rao Kotipalli
    (9544007)

    Explore every nook and cranny of the Android OS to modify your device and guard it against security threatsAbout This Book• Understand and counteract against offensive security threats to your applications• Maximize your device's power and potential...

  • e-book

    HACKING EXPOSED WEB APPLICATIONS, 3rd Edition

    Scambray,Joel; Sima,Caleb; Liu,Vincent
    (3165660)

    The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and...

  • e-book

    Hacking For Dummies

    Beaver, Kevin
    (9295079)

    Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your...

  • e-book

    Hacking Vim - A Cookbook to get the Most out...

    Schulz Kim
    (8293232)

    This is a cookbook packed with ready-to-use hacks that give solutions for some of the commonest problems users of the Vim editor encounter during their daily use. Each recipe follows a systematic approach with a self-contained description of the task...

  • e-book

    Hacking For Dummies

    Beaver, Kevin
    (9448321)

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better...

  • Google Hacking Para Pentest

    Long,Johnny
    (9354938)

    O Google é o mecanismo de busca mais popular já criado, e seus recursos de pesquisa são tão poderosos que às vezes encontram conteúdo que não deveria ser disponibilizado publicamente na web, o que inclui números de CPF, números de cartão de crédito,...

  • e-book

    Hacking Exposed Computer Forensics, Second...

    Davis, Chris; Philipp,Aaron; Cowen, David
    (3023004)

    'Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the...

  • e-book

    Hacking Exposed

    Scambray,Joel; Kurtz,George; McClure,Stuart
    (9841226)

    This one-of-a-kind book provides in-depth expert insight into how hackers infiltrate e-business, and how they can be stopped.

  • e-book

    Hacking with Kali - Practical Penetration...

    Broad, James
    (9756185)

    Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James...

  • e-book

    Hacking For Dummies

    Beaver, Kevin
    (9448164)

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better...

  • e-book

    Hacking Exposed Web 2.0: Web 2.0 Security...

    Dwivedi,Himanshu; Cannings,Rich; Lackey,Zane
    (8096859)

    Lock down next-generation Web services 'This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats.' --Max Kelly, CISSP, CIPP...

  • e-book

    Hacking Exposed Linux - Linux Security...

    Isecom
    (3022891)

    The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way,...

  • e-book

    Hacking Web Apps - Detecting and Preventing...

    (4902067)

    How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the...

  • e-book

    Hacking Hot Potatoes - The Cookbook

    (9437067)

    This book is dedicated to extending the capabilities of a powerful suite of Web authoring tools - Hot Potatoes, by Half-Baked Software Inc. and the University of Victoria Humanities Computing and Media Centre. It is intended to help you make the best...

  • e-book

    Hacking Exposed Windows - Microsoft Windows...

    Scambray, Joel
    (8322623)

    The latest Windows security attack and defense strategies'quot;Securing Windows begins with reading this book.'quot; --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed...

  • e-book

    Hacking the Code - Auditor'apos;s Guide to...

    Burnett, Mark
    (3024943)

    Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits,...

  • e-book

    Hacking a Terror Network: The Silent Threat...

    Rogers,Russ; Devost,Matthew G
    (3025277)

    Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic 'insider's look' into...

  • e-book

    Hacking Point of Sale - Payment Application...

    Gomzin, Slava
    (9446510)

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many...

  • e-book

    Hacking Point of Sale - Payment Application...

    Gomzin, Slava
    (9446444)

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many...

  • e-book

    Hacking Vim 7.2

    (8322618)

    This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapter covers a set of recipes, each of which follows a systematic approach with a self-contained...

  • e-book

    Hacking Exposed Cisco Networks: Cisco...

    Gavrilenko,Konstantin; Vladimirov,Andrew; Mikhailovsky,Andrei
    (8101113)

    Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network...

  • e-book

    InfoSec Career Hacking: Sell Your Skillz, Not...

    Hurley,Chris; Long,Johnny; Bayles,Aaron W
    (3025288)

    'InfoSec Career HackingÂ? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The...

  • e-book

    Basic Wifi Hacking

    Mad76e
    (9473749)

    This book contains interesting information for those who are interested in Ethical hacking. This book is written from a hackers point of view, pentesting our most popular wireless communication in our home This book was created to help and teach...

  • e-book

    Hardware Hacking: Have Fun while Voiding your...

    Russell,Ryan; Mitnick,Kevin D.; Grand,Joe
    (3024951)

    'If I had this book 10 years ago, the FBI would never have found me!' -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed 'gadget geek.' Take an ordinary...

  • e-book

    Asterisk Hacking

    (3028757)

    Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone...

  • e-book

    Ninja Hacking - Unconventional Penetration...

    Wilhelm, Thomas; Andress, Jason; Andress, Jason
    (3129515)

    Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques,...

  • e-book

    Google Hacking for Penetration Testers

    Long,Johnny; Gardner,Bill; Brown,Justin
    (9740800)

    Google is the most popular search engine ever created, but Google'apos;s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit...

  • e-book

    Google Hacking for Penetration Testers

    Long, Johnny
    (3024932)

    Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice...

  • e-book

    Google Hacking for Penetration Testers

    Long,Johnny; Gardner, Bill; Brown,Justin
    (3025199)

    A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading...

  • e-book

    Kismet Hacking

    Thornton, Frank; Haines, Brad; Schearer, Michael J.
    (3029010)

    Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in...

  • e-book

    Certified Hacking Forensic Investigator...

    Thomas,Shirley
    (9847495)

    Certified Hacking Forensic Investigator Secrets To Acing The Exam and Successful Finding And Landing Your Next Certified Hacking Forensic Investigator Certified Job

  • Hacking Point Of Sale - Payment Application...

    Gomzin, Slava
    (9396837)

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many...

    sob encomenda
  • e-book

    Hacking Innovation - The New Growth Model...

    Linkner,Josh
    (9653873)

    Hackers are a global fascination with cybercrime representing our single biggest threat to national security. But putting their sinister motives aside, the dark underworld of hackers contains some of the most creative minds on the planet.

  • e-book

    CHFI Computer Hacking Forensic Investigator...

    Brooks,Charles L.
    (9841753)

    An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-CouncilGet complete coverage of all the material included on version 8 of the EC-Council'apos;s Computer Hacking Forensic Investigator exam from...

  • e-book

    Low Tech Hacking: Street Smarts for Security...

    Wiles,Jack; Gudaitis, Terry; Jabbusch,Jennifer
    (3737920)

    Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are...

  • e-book

    Gray Hat Hacking The Ethical Hacker'apos;s...

    Harper, Allen; Harris, Shon; Allen, Harper,; Daniel Regalado
    (9613306)

    Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The...

  • e-book

    The Basics of Hacking and Penetration Testing...

    (9637561)

    The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and...

  • e-book

    Advanced Persistent Threat Hacking - The Art...

    Wrightson,Tyler
    (9650811)

    Master the tactics and tools of the advanced persistent threat hackerIn this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat...

  • e-book

    Chained Exploits: Advanced Hacking Attacks...

    Whitaker,Andrew; Voth,Jack B.; Evans,Keatron
    (2910162)

    The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them   Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of...

Busca por