Hacking methodology

Xem 1-5 trên 5 kết quả Hacking methodology
  • Tham khảo sách 'hack proofing: your web applications', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf625p maiphuong 11-08-2009 472 219   Download

  • Tham khảo sách 'hack proofing your network', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf495p nguyen2 10-11-2009 109 61   Download

  • I was planning to write a detail article on the basis of ethical hacking and penetration testing that cover the methodology, reporting and other things but some of my friend has shared this wonderful presentation that covers each and everything about ethical hacking and the process. Below is the presentation that covers the beginning of ethical hacking and it will let you know the procedure of hacking and penetration testing.

    pdf57p hoangtumayman 20-08-2012 62 27   Download

  • The tenth anniversary edition of the world’s bestselling computer security book! The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today’s most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more. ...

    pdf720p titatu_123 01-03-2013 32 11   Download

  • Syngress would like to acknowledge the following people for their kindness and support in making this book possible. Syngress books are now distributed in the United States and Canada by O’Reilly Media, Inc.

    pdf513p ltvtrinh 24-09-2012 32 12   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản