intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Hack

Xem 1-20 trên 1789 kết quả Hack
  • Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 1 includes contents: Chapter 1 reconnaissance, chapter 2 enumeration and scanning, chapter 3 hacking database services, chapter 4 web server and web application testing, chapter 5 wireless penetration testing using BackTrack 2.

    pdf342p longtimenosee02 03-01-2024 0 0   Download

  • In ebook Penetration testing basics: A quick-start guide to breaking into systems, the following content will be discussed: Chapter 1: what is penetration testing? chapter 2: digging for information, chapter 3: what’s open? chapter 4: vulnerabilities, chapter 5: exploitation, chapter 6: breaking web sites, chapter 7: reporting.

    pdf127p longtimenosee02 03-01-2024 3 1   Download

  • Ebook Professional penetration testing creating and operating a formal hacking lab: Part 1 includes contents: Chapter 1: introduction, chapter 2: ethics and hacking, chapter 3: hacking as a career, chapter 4: setting up your lab, chapter 5: creating and using pentest targets in your lab, chapter 6: methodologies, chapter 7: pentest metrics, chapter 8: management of a pentest.

    pdf237p longtimenosee02 03-01-2024 2 1   Download

  • Ebook Professional penetration testing creating and operating a formal hacking lab: Part 2 includes contents: Chapter 9: information gathering, chapter 10: vulnerability identification, chapter 11: vulnerability verification, chapter 12: compromising a system and privilege escalation, chapter 13: maintaining access, chapter 14: covering your tracks, chapter 15: reporting results, chapter 16: archiving data, chapter 17: cleaning up your lab, chapter 18: planning for your next pentest.

    pdf288p longtimenosee02 03-01-2024 3 1   Download

  • Ebook Ethical hacking includes contents: Module 1 Welcome to the class! module 2 legal and HR issues, module 3 why perform ethical hacking? module 4 attack types and vulnerabilities, module 5 searching for public corporate information, module 6 searching for technical information, module 7 network scanning, module 8 interpreting network results, module 9 host scanning, module 10 interpreting host results, module 11 vulnerability and exploit research, module 12 theoretical exploitation, module 13 exploitation in action.

    pdf258p longtimenosee02 03-01-2024 2 1   Download

  • With the largest collection of web documents in the world, Google is a reflection of the Web. The hacks in this book are not just about Google, they are also about unleashing the vast potential of the Web today and in the years to come. Google Hacks is a great resource for search enthusiasts, and we hope you enjoy it as much as we did.

    pdf384p longtimenosee02 03-01-2024 2 1   Download

  • This Book you will uncover the finest ways to defend your computer systems from the hackers This Book is written by keeping one object in mind that a beginner, who is not much familiar regarding computer hacking, can easily, attempts these hacks and recognize what we are trying to demonstrate. After Reading this book you will come to recognize that how Hacking is affecting our everyday routine work and can be very hazardous in many fields like bank account hacking etc.

    pdf105p longtimenosee02 03-01-2024 4 1   Download

  • Ebook "Hacker school" includes contents: For the love of hacking, why be a hacker?, feed your head: handles, how to hack, feed your head: espionage, game on: a hacker's first toy, the four point process, what to hack, feed your head: classes and channels, feed your head: porosity, resources, feed your head: speculation,....

    pdf388p longtimenosee02 03-01-2024 4 1   Download

  • Most people don't really understand what hacking is about, much less how to go about it. It's something that we just watch in movies or hear about on the news. This book, Hacking: Computer hacking, security testing, penetration testing and basic security, is meant to help you understand hacking techniques in a broader and deeper way. In this book, you will learn how you can protect yourself from some of the most prevalent hacking schemes to date. How? By learning how to hack! That's right.

    pdf134p longtimenosee02 03-01-2024 1 1   Download

  • In Hacking a terror network: The silent threat of covert channels, Russ Rogers uses a fictional scenario to demonstrate how terrorists may use the Internet to coordinate and launch a new series of terrorist attacks.While the scenario may be fictitious, the techniques and technologies that Russ uses are drawn straight from the computer security world, making this not only an interesting literary read but also a technical manual on how covert channels work and how law enforcement and intelligence organizations can go about discovering and defeating them.

    pdf400p longtimenosee02 03-01-2024 4 1   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 1 includes contents: Chapter 1 linux security overview; chapter 2 proactive measures and recovering from a break-in; chapter 3 mapping your machine and network getting in from the outside; chapter 4 social engineering, trojans, and other hacker trickery; chapter 5 physical attacks; chapter 6 attacking over the network; chapter 7 abusing the network itself.

    pdf268p longtimenosee02 03-01-2024 1 1   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.

    pdf316p longtimenosee02 03-01-2024 1 1   Download

  • The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET Server (code named Whistler), and IIS 5--plus a whole lot more!

    pdf260p longtimenosee02 03-01-2024 3 1   Download

  • Ebook The official CHFI study guide for computer hacking forensics investigators: Part 1 includes contents: Chapter 1: computer forensics in today’s world; chapter 2: systems, disks, and media; chapter 3: the computer investigation process; chapter 4: acquiring data, duplicating data, and recovering deleted files; chapter 5: Windows, Linux, and macintosh boot processes; chapter 6: Windows and Linux Forensics; chapter 7: steganography and application password crackers; chapter 8 computer-assisted attacks and crimes; chapter 9: investigating network traffic and investigating logs.

    pdf485p longtimenosee02 03-01-2024 2 1   Download

  • Ebook The official CHFI study guide for computer hacking forensics investigators: Part 2 includes contents: Chapter 10: router forensics and network forensics; chapter 11: investigating wireless attacks; chapter 12: PDA, blackberry, and ipod forensics; chapter 13: forensic softwareand hardware; chapter 14: forensics investigation using encase; chapter 15: incident response; chapter 16: types of investigations; appendix a: becoming an expert witness; appendix b: worldwide forensic acts and laws.

    pdf471p longtimenosee02 03-01-2024 1 1   Download

  • Ebook "UNIX & Linux forensic analysis DVD toolkit" includes contents: Chapter 1: introduction; chapter 2: understanding unix; chapter 3: live response: data collection; chapter 4: initial triage and live response: data analysis; chapter 5: the hacking top 10; chapter 6: the /proc file system; chapter 7: file analysis; chapter 8: malware.

    pdf244p longtimenosee02 03-01-2024 2 2   Download

  • This book attempts to take a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking versus cracking.The perception of this bi-modal activity is as controversial as the process itself—with many in society confusing the positive attributes of hackers with the criminal activities of crackers.This dictionary tries to balance the two sides of the equation: the White Hat or the positive side of hacking with the Black Hat or the negative side of cracking.

    pdf419p haojiubujain010 14-12-2023 0 0   Download

  • Ebook Beginning ethical hacking with python: Part 1 includes contents: Chapter 1: legal side of hacking; chapter 2: hacking environment; chapter 3: installing virtual box; chapter 4: installing Kali Linux and other operating systems on VB; chapter 5: Linux terminal, basic commands; chapter 6: python 3 and ethical hacking; chapter 7: python environment; chapter 8: general syntaxes; chapter 9: variables, objects and values; chapter 10: conditionals; chapter 11: loops; chapter 12: regular expressions; chapter 13: exceptions, catching errors; chapter 14: functions.

    pdf127p haojiubujain010 14-12-2023 1 1   Download

  • Ebook Beginning ethical hacking with python: Part 2 includes contents: Chapter 15: classes; chapter 16: string methods; chapter 17: file input and output; chapter 18: containers; chapter 19: database; chapter 20: module; chapter 21: debugging, unittest module; chapter 22: socket and networking; chapter 23: importing nmap module; chapter 24: building an nmap network scanner; chapter 25: protect anonymity on the internet; chapter 26: dark web and tor; chapter 27: proxy chains; chapter 28: virtual private network or VPN; chapter 29: MAC address.

    pdf128p haojiubujain010 14-12-2023 5 1   Download

  • Ebook Advanced penetration testing: Hacking the world’s most secure networks includes contents: Chapter 1: medical records (in)security, chapter 2: stealing research, chapter 3: twenty-first century heist, chapter 4: pharma karma, chapter 5: guns and ammo, chapter 6: criminal intelligence, chapter 7: war games, chapter 8: hack journalists, chapter 9: northern exposure.

    pdf269p haojiubujain010 14-12-2023 3 0   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2