Контакты/Адрес/Проезд   Доставка и Оплата
История
  +7(495) 980-12-10
  10:00-18:00 пн-сб
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Специальные предложения | Бестселлеры
 
Информация
Online Каталоги
Каталог учебной литературы
по английскому языку >>>

Каталог учебной литературы
по английскому языку >>>


No Tech Hacking,, Johnny Long



Варианты приобретения
Цена: 3278р.   3642р. -10%
Кол-во:
Наличие: Есть (1 шт.)
Отгрузка заказа в течение 1 рабочего дня
Добавить в корзину
в Мои желания

Автор: Johnny Long
Название:  No Tech Hacking,   (Джонни Лонг: Нет техническим хакерам)
Издательство: Elsevier Science
Классификация:
Невыдуманные истории
Общая теория обработки данных
Безопасность сети
Компьютерное мошенничество и хакерство

ISBN: 1597492159
ISBN-13(EAN): 9781597492157
ISBN: 1-59749-215-9
ISBN-13(EAN): 978-1-59749-215-7
Обложка/Формат: Paperback
Страницы: 384
Вес: 0.635 кг.
Дата издания: 31.03.2008
Серия: Syngress
Язык: ENG
Иллюстрации: Illustrations
Размер: 23.16 x 19.13 x 1.88 cm
Читательская аудитория: Professional & vocational
Подзаголовок: A guide to social engineering, dumpster diving, and shoulder surfing
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание: Johnny Longs last book sold 12,000 units worldwide. Kevin Mitnicks last book sold 40,000 units in North America.As the clich? goes, information is power. In this age of technology, an increasing majority of the worlds information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology.
Дополнительное описание:




Hacking firefox

Автор: Reyes, Mel
Название: Hacking firefox
ISBN: 0764596500 ISBN-13(EAN): 9780764596506
Издательство: Wiley
Рейтинг:
Цена: 1671 р.
Наличие на складе: Поставка под заказ.

Описание: Aiming to help tweaking performance, unlocking hidden configuration settings, and hustling up browsing speeds, this is a guide to modifying and customising Firefox`s appearance and functionality. Its coverage also includes: creating custom installations for various platforms including Linux, Windows memory optimizations, and network performance.

Hacking exposed web 2.0

Автор: Dwivedi, Himanshu Stamos, Alex Lackey, Zane Cannin
Название: Hacking exposed web 2.0
ISBN: 0071494618 ISBN-13(EAN): 9780071494618
Издательство: McGraw-Hill
Рейтинг:
Цена: 4388 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Revealing security vulnerabilities in Web-based services, this book provides details on the hacks and attacks alongside countermeasures, risk ratings, and real-world case studies.

Hacking google maps and google earth

Автор: Brown, Martin C.
Название: Hacking google maps and google earth
ISBN: 0471790095 ISBN-13(EAN): 9780471790099
Издательство: Wiley
Рейтинг:
Цена: 2089 р.
Наличие на складе: Поставка под заказ.

Описание: This one-of-a-kind resource contains 500 pages of jaw-dropping hacks, mods, and customizations. These include creating mashups with data from other sources such as Flickr, building a space station tracker, hacking Maps with Firefox PiggyBank, and building a complete community site with Maps and Earth.

Hacking exposed voip

Автор: Endler, David Collier, Mark
Название: Hacking exposed voip
ISBN: 0072263644 ISBN-13(EAN): 9780072263640
Издательство: McGraw-Hill
Рейтинг:
Цена: 3343 р.
Наличие на складе: Невозможна поставка.

Описание: VoIP is a communications technology that is prone to attacks such as SPIT, Voicemail Brute forcing, Caller ID Spoofing, Registration Hijacking, active directory number harvesting, and more. This book shows you how to proactively fuzz VoIP components for potential vulnerabilities using freely and commercially available tools.

Hacking exposed cisco networks

Автор: Vladimirov, Andrew A. Gavrilenko, Konstantin V. Mi
Название: Hacking exposed cisco networks
ISBN: 0072259175 ISBN-13(EAN): 9780072259179
Издательство: McGraw-Hill
Рейтинг:
Цена: 4806 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Focuses on Cisco network hacking, security auditing, and defense issues. Using the "Hacking Exposed" methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. It covers device-specific and network-centered attacks and defenses and offers real-world case studies.

Hacking Exposed 7 Network Security Secrets & Solutions

Автор: McClure Stuart
Название: Hacking Exposed 7 Network Security Secrets & Solutions
ISBN: 0071780289 ISBN-13(EAN): 9780071780285
Издательство: McGraw-Hill
Рейтинг:
Цена: 4179 р.
Наличие на складе: Поставка под заказ.

Описание: This fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new "5 Deployments" approach

Low Tech Hacking,

Автор: Jack Wiles
Название: Low Tech Hacking,
ISBN: 1597496650 ISBN-13(EAN): 9781597496650
Издательство: Elsevier Science
Рейтинг:
Цена: 3278 р. 3642.00 -10%
Наличие на складе: Есть (1 шт.)
Описание: Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.

Hacking the Code,

Автор: Mark Burnett
Название: Hacking the Code,
ISBN: 1932266658 ISBN-13(EAN): 9781932266658
Издательство: Elsevier Science
Рейтинг:
Цена: 4016 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: "Hacker Code" will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, "HC1" will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book.

The book will be accompanied with a free companion CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts.

These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software. You can: learn to quickly create security tools that ease the burden of software testing and network administration; find out about key security issues regarding vulnerabilities, exploits, programming flaws, and secure code development; discover the differences in numerous types of web-based attacks so that developers can create proper quality assurance testing procedures and tools; learn to automate quality assurance, management, and development tasks and procedures for testing systems and applications; and, learn to write complex Snort rules based solely upon traffic generated by network tools and exploits.

Hacking movable type

Автор: Allen, Jay Choate, Brad Hammersley, Ben Haughey, M
Название: Hacking movable type
ISBN: 076457499X ISBN-13(EAN): 9780764574993
Издательство: Wiley
Рейтинг:
Цена: 1984 р.
Наличие на складе: Поставка под заказ.

Описание: Movable Type, a powerful personal publishing application, is the superhero of the Internet age. This book enables you to: hack the perfect installation; hack the database; play with Atom, Perl, and XML-RPC APIs; write advanced plug-ins; master dynamic publishing; hack a super-powered blog app; ban comment spam; and build customized templates.

Kismet Hacking,

Автор: Frank Thornton
Название: Kismet Hacking,
ISBN: 1597491179 ISBN-13(EAN): 9781597491174
Издательство: Elsevier Science
Рейтинг:
Цена: 4296 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.

Hacking exposed windows

Автор: Scambray, Joel
Название: Hacking exposed windows
ISBN: 007149426X ISBN-13(EAN): 9780071494267
Издательство: McGraw-Hill
Рейтинг:
Цена: 4597 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Helps thwart various kinds of Windows attacks. This book helps you learn by looking through the eyes of the hacker how devastating attacks are executed and how to protect your Windows systems and networks from them. It covers various versions of Windows - including Windows Vista and Windows XP - as well as and Windows Server 2000, 2003, and 2007.

Hacking exposed computer forensics

Автор: Davis, Chris Philipp, Aaron Cowen, David
Название: Hacking exposed computer forensics
ISBN: 0072256753 ISBN-13(EAN): 9780072256758
Издательство: McGraw-Hill
Рейтинг:
Цена: 2812 р.
Наличие на складе: Невозможна поставка.

Описание: Whether retracing the steps of a security breech or tracking down high-tech crime, this computer forensics package shows how to be prepared with both the necessary tools and expert knowledge that ultimately helps the forensics stand up in court. It provides advice on how to avoid common dangers from occurring during the forensics process.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия