Catalog Search Results
Author
Pub. Date
2001.
Language
English
Description
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that"--The techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect...
Author
Pub. Date
2002.
Language
English
Description
"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lovers of elegant hacks, it deserves a spot on your shelf right next to Knuth."--Josh Bloch "When I first saw the title, I figured that the book must be either a cookbook for breaking into computers (unlikely) or some sort...
Author
Pub. Date
©2005
Language
English
Description
Do you spend hours coding on an application for the sheer joy and challenge? How about taking the time to analyze every piece of traffic that crosses your network, dissecting packets, and making sure nothing hidden is going on? If you want to refine these skills (and learn many new ones) to build an InfoSec career in a top corporation or government agency but aren't sure where to begin, this book is for you! The authors of this book have all succeeded...
Pub. Date
©2012
Language
English
Description
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques...
Author
Pub. Date
©2004
Language
English
Description
Praise for Exploiting Software " Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations...
Author
Series
Language
English
Description
Learn to think like a hacker to secure your own systems and data
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong.
Hacking For Dummies takes...
Author
Pub. Date
2010
Language
English
Description
"For 25 years, 2600: The Hacker Quarterly has given voice to the hacker community in all its manifestations. This collection of letters to the magazine reveals the thoughts and viewpoints of hackers, both white and black hat, as well as hacker wannabes, technophiles, and people concerned about computer security. Insightful and entertaining, the exchanges illustrate 2600's vast readership, from teenage rebels, anarchists, and survivalists to law enforcement,...
Author
Language
English
Formats
Description
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting...
Author
Pub. Date
©2008
Language
English
Description
As the clicȟ reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade...
Author
Pub. Date
[2018]
Language
English
Description
"This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and basics of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, and exploitation. This course provides step-by-step real-life scenarios. You will see first hand...
Author
Language
English
Formats
Description
Harden the human firewall against the most current threats
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire-why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool...
Author
Series
Pub. Date
[2020]
Language
Deutsch
Description
Methoden und Tools der Hacker, Cyberkriminellen und Penetration Tester Mit zahlreichen Schritt-für-Schritt-Anleitungen und Praxis-Workshops Inklusive Vorbereitung auf den Certified Ethical Hacker (CEHv10) mit Beispielfragen zum Lernen Dies ist ein praxisorientierter Leitfaden für angehende Hacker, Penetration Tester, IT-Systembeauftragte, Sicherheitsspezialisten und interessierte Poweruser. Mithilfe vieler Workshops, Schritt-für-Schritt-Anleitungen...
13) Hacking
Author
Series
Pub. Date
[2022]
Language
English
Description
Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes...
Author
Pub. Date
[2018]
Language
English
Description
Beyond incident response and threat intelligence operations, threat hunting can provide an extra layer of defense for your company's network. In many organizations, security analysts initiate threat hunting when they spot something weird--network conditions or activity not easily explained--in an effort to catch subtle, more deeply embedded attackers. With this practical ebook, you'll explore how this method works and learn how to stage an effective...
Author
Pub. Date
©2009
Language
English
Description
The complete guide to today's hard-to-defend chained attacks: performing them and preventing them Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "chained" exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don't cover them at all. Now there's a book that...
Author
Pub. Date
2009
Language
English
Description
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks...
Author
Pub. Date
2022.
Language
Deutsch
Description
Dies ist ein praxisorientierter Leitfaden für angehende Hacker, Penetration Tester, IT-Systembeauftragte, Sicherheitsspezialisten und interessierte Poweruser. Mithilfe vieler Workshops, Schritt-für-Schritt-Anleitungen sowie Tipps und Tricks lernen Sie unter anderem die Werkzeuge und Mittel der Hacker und Penetration Tester sowie die Vorgehensweise eines professionellen Hacking-Angriffs kennen. Der Fokus liegt auf der Perspektive des Angreifers...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request