Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Cертификаты | Хиты | | |
 

Another Man: Men`s Style Stories, MacKie Alister, Hack Jefferson



Варианты приобретения
Цена: 3490р.
Кол-во:
Наличие:
Есть в наличии уцененная книга.
Чаще всего это книги, возвращенные оптовыми покупателями или книги, поврежденные при перевозке. Возможные дефекты: потертая обложка, помятые уголки, наклейка магазина с ценой, потеря подарочного вида. Более подробное описание состояния можно уточнить после оформления заказа.

Добавить в корзину
Цена: 7595р.
Кол-во:
Наличие: Есть
Отгрузка заказа в течение 3-4 рабочих дней
Добавить в корзину
в Мои желания

Автор: MacKie Alister, Hack Jefferson
Название:  Another Man: Men`s Style Stories
Перевод названия: Алистер МакКи: Все о мужчинах. Мужской стиль в моде
ISBN: 9780847843275
Издательство: Rizzoli
Классификация:
ISBN-10: 0847843270
Обложка/Формат: Hardback
Страницы: 272
Вес: 2.262 кг.
Дата издания: 21.10.2014
Язык: English
Иллюстрации: Illustrations
Размер: 326 x 246 x 32
Читательская аудитория: General (us: trade)
Подзаголовок: Men`s style stories
Рейтинг:
Поставляется из: Англии



Hack a Website Trick: New Hacking Tricks-Learn Hacking Online, Best Hacking Site

Автор: Hacker Xploit
Название: Hack a Website Trick: New Hacking Tricks-Learn Hacking Online, Best Hacking Site
ISBN: 1979885362 ISBN-13(EAN): 9781979885362
Издательство: Неизвестно
Цена: 5972 р.
Наличие на складе: Поставка под заказ.

Описание: HackThisSite is a legal and safe network security resource where users test their hacking skills on various challenges and learn about hacking

Автор: Wagner Alex
Название: Hacking: Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast
ISBN: 1979683239 ISBN-13(EAN): 9781979683234
Издательство: Неизвестно
Цена: 6213 р.
Наличие на складе: Поставка под заказ.

Описание: HACKING - 5 BOOKS IN 1BOOK 1: Beginners GuideBOOK 2: Wireless HackingBOOK 3: 17 Most Tools Every Hacker Should HaveBOOK 4: 17 Most Dangerous Hacking AttacksBOOK 5: 10 Most Dangerous Cyber GangsIn this book you will learn about: Basic KnowledgeThe history of hacking, What motivates Hackers, and how to differentiate one to anotherNetworking fundamentals, and basic system requirementsWhere to find the best operating systems for the purpose of HackingWhat virtualization is, and how to install Hacking softwarePenetrating Wired NetworksExploiting systems in multiple ways, Implementing Man in the Middle attack in multiple ways, How to use Social Engineering Toolkits, Creating a fake packet and find vulnerabilities, How to manipulate the networkWireless HackingHow to own a device connected remotelyHow to find hidden wireless networks, How to implement a Rouge Wireless Access PointDiscovering networking devices through wirelessExploiting systems in multiple ways using wireless technologiesImplementing Man in the Middle attack in multiple ways, How to become a wireless access point using your laptopHacking AttacksADVWARE - SPYWARE - MALWARE - MAN IN THE MIDDLE - LOCKYTRAFFIC REDIRECTION - PAYLOAD INJECTION - ARP POISIONING - WORMSDE-AUTHENTICATION ATTACKS - COLLISION ATTACKS - REPLAY ATTACKS PHISHING-VISHING - WHALING - SMISHING - SPEAR PHISHINGDUMPSTER DIVING - SHOLDER SURFING - BRUTE FORCE ATTACK - DICTIONARY ATTACKS RAINBOW TABLES - KEYSTROKE LOGGINGS SPOOFING - SOCIAL ENGINEERING-SPAMMING -SQL INJECTIONS - DDOS ATTACKS - TCP SYN FLOOD ATTACK PING OF DEATH - VIRUSES ROOTKITS - LOGIC BOMBS - TROJAN HORSESWANNAYCRY - RANSOMWARE - BOTNETSCyberGangsCutting sword of justice, Guardians of Peace, Honker Union, AnonymousSyrian Electronic Army, LulzSec, Carbanac, Equation Group, The Shadow Brokers

Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast How to H

Автор: Wagner Alex
Название: Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast How to H
ISBN: 1548513644 ISBN-13(EAN): 9781548513641
Издательство: Неизвестно
Цена: 5025 р.
Наличие на складе: Поставка под заказ.

Описание: Book 1 - The Ultimate Guide to Hacking using the most dangerous tools 2017Book 2 - The Ultimate Guide to Wireless Hacking using the best tools 2017Book 3 - The Ultimate Guide to the 17 Most Dangerous Hacking Attacks Book 1 - The Ultimate Guide to Hacking using the most dangerous tools 2017This book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers. Beginning with some of the fundamentals of networking, and technologies that are vital to be aware for every hacker.It will cover some studying techniques that can be used in order to be able to follow today's fast growing technologies, and then will recommend additional study materials and what certification path you should be aiming in order to become an IT Professional. The focus of this book will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every chapter you will find demonstrated examples step-by-step, on hacker tools. The discussions and implementation examples will provide you not only how to use hacking tools, but how to become a Man in the Middle in multiple ways. Additionally you will be demonstrated how to create a Denial of Service Attack, how to manipulate the network infrastructure by creating fake packets, as well how to replicate any networking device, and fool end users to install backdoors on demand.In order to understand hackers and protect the network infrastructure you must think like a hacker in today's expansive and eclectic internet and you must understand that nothing is fully secured. There are many step by step method on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering. The intention of this content is to benefit readers by reviewing detailed facts as well as personal experience.Your reading of this book will boost your knowledge on what is possible in today's hacking world and help you to become an Ethical Hacker.Book 2 - The Ultimate Guide to Wireless Hacking using the best tools 2017Do you want to learn how to hack any wireless networksusing only a laptop?Do you want to know how your laptop can becomewireless access point?Do you want to access a detailed guide on how to manipulateWireless networks?In this book you will learn: *How to find hidden wireless networks*How to join any wireless access points*How to implement a Rouge Wireless Access Point*Discovering networking devices through wireless*Exploiting systems in multiple ways using wireless technologies*Implementing Man in the Middle attack in multiple ways*How to create an Evil Twin*How to become a wireless access point using your laptop*How to implement wireless collision attack*Why you should never join a free wireless network*Wireless flooding attack, Replay attack, Denial of Sleep, and many more...Book 3 - The Ultimate Guide to the 17 Most Dangerous Hacking Attacks Do you want to learn about today's most sophisticated Hacking attacks?Do you want to know more about Cyber criminals and their operations?Do you want to learn about Robot Networks, Trojans & Ransomware?In this book you will learn about: ADWARESPYWAREMALWARE MAN IN THE MIDDLELOCKYTRAFFIC REDIRECTIONPAYLOAD INJECTIONARP POISONINGWORMSROGUE WIRELESS ACCESS POINTSMISS-ASSOCIATION ATTACKSDE-AUTHENTICATION ATTACKSCOLLISION ATTACKSREPLAY ATTACKSPHISHINGVISHINGWHALINGSMISHINGSPEAR PHISHINGDUMPSTER DIVINGSHOULDER SURFINGBRUTE FORCE ATTACKDICTIONARY ATTACKSRAINBOW TABLESKEYSTROKE LOGGINGSSPOOFINGSOCIAL ENGINEERINGSPAMMINGSQL INJECTIONSDDOS ATTACKSTCP SYN FLOOD ATTACKPING OF DEATHVIRUSESROOTKITSLOGIC BOMBSTROJAN HORSESWANNA-CRY RANSOMWAREBOTNETS

Hacking: The Complete Beginner`s Guide to Computer Hacking: Your Guide on How to Hack Networks and Computer Systems, Informatio

Автор: Jones Jack
Название: Hacking: The Complete Beginner`s Guide to Computer Hacking: Your Guide on How to Hack Networks and Computer Systems, Informatio
ISBN: 1548126470 ISBN-13(EAN): 9781548126476
Издательство: Неизвестно
Цена: 4948 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Hacking: Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast

Автор: Wagner Alex
Название: Hacking: Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast
ISBN: 1548959073 ISBN-13(EAN): 9781548959074
Издательство: Неизвестно
Цена: 6213 р.
Наличие на складе: Поставка под заказ.

Описание: HACKING BUNDLE BOOK YOU HAVE BEEN WAITING FOR IS NOW ON SALE -------------- This book has 4 manuscripts --------------1 - The Ultimate Beginners Guide to Hacking2 - The Ultimate Guide to Hacking using the most dangerous tools 3 - The Ultimate Guide to Wireless Hacking using the best tools4 - The Ultimate Guide to the 17 Most Dangerous Hacking Attacks1 - The Ultimate Beginners Guide to HackingThe following chapters will focus on the basics of hacking, starting by listing the possibilities that can be achieved by hacking as well as the most common motivations. Next, it will cover some basic technology related terms that are frequently mixed up even by Security Experts. It moves on to discuss different types of hackers as well as taking a look at some examples of their skill levels and understanding how they differ one from another.The discussions will take us back to the 70's and see the history of hackers, what was their dream, and what they expected from the future of computing.After the discussion of old school hackers we will land in today's expansive and eclectic internet and explain that nothing is fully secured Book 2 - The Ultimate Guide to Hacking using the most dangerous toolsThis book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers.Beginning with some of the fundamentals of networking, and technologies that are vital to be aware for every hacker.It will cover some studying techniques that can be used in order to be able to follow today's fast growing technologies, and then will recommend additional study materials and what certification path you should be aiming in order to become an IT Professional.The focus of this book will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every chapter you will find demonstrated examples step-by-step, on hacker tools.There are many step by step method on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering.Book 3 - The Ultimate Guide to Wireless Hacking using the best tools 2017Do you want to learn how to hack any wireless networksusing only a laptop?Do you want to know how your laptop can becomewireless access point?Do you want to access a detailed guide on how to manipulateWireless networks?In this book you will learn: * How to find hidden wireless networks* How to join any wireless access points* How to implement a Rouge Wireless Access Point* Discovering networking devices through wireless* Exploiting systems in multiple ways using wireless technologies* Implementing Man in the Middle attack in multiple ways* How to create an Evil Twin* How to become a wireless access point using your laptop* How to implement wireless collision attack* Why you should never join a free wireless network* Wireless flooding attack, Replay attack, Denial of Sleep, and many more...Book 4 - The Ultimate Guide to the 17 Most Dangerous Hacking AttacksDo you want to learn about today's most sophisticated Hacking attacks?Do you want to know more about Cyber criminals and their operations?Do you want to learn about Robot Networks, Trojans & Ransomware?In this book you will learn about: ADWARESPYWAREMALWAREMAN IN THE MIDDLELOCKYTRAFFIC REDIRECTIONPAYLOAD INJECTIONARP POISONINGWORMSROGUE WIRELESS ACCESS POINTSMISS-ASSOCIATION ATTACKSDE-AUTHENTICATION ATTACKSCOLLISION ATTACKSREPLAY ATTACKSPHISHINGVISHINGWHALINGSMISHINGSPEAR PHISHINGDUMPSTER DIVINGSHOULDER SURFINGBRUTE FORCE ATTACKDICTIONARY ATTACKSRAINBOW TABLESKEYSTROKE LOGGINGSSPOOFINGSOCIAL ENGINEERINGSPAMMINGSQL INJECTIONSDDOS ATTACKSTCP SYN FLOOD ATTACKPING OF DEATHVIRUSESROOTKITSLOGIC BOMBSTROJAN HORSESWANNA-CRYRANSOMWAREBOTNETS

Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast How to H

Автор: Wagner Alex
Название: Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast How to H
ISBN: 1548531804 ISBN-13(EAN): 9781548531805
Издательство: Неизвестно
Цена: 4233 р.
Наличие на складе: Поставка под заказ.

Описание: HACKING BUNDLE BOOK YOU HAVE BEEN WAITING FOR IS NOW ON SALE -------------- This book has 2 manuscripts --------------1 - The Ultimate Guide to Hacking using the most dangerous tools 2 - The Ultimate Guide to the 17 Most Dangerous Hacking AttacksBook 1 - The Ultimate Guide to Hacking using the most dangerous toolsThis book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers.Beginning with some of the fundamentals of networking, and technologies that are vital to be aware for every hacker.It will cover some studying techniques that can be used in order to be able to follow today's fast growing technologies, and then will recommend additional study materials and what certification path you should be aiming in order to become an IT Professional.The focus of this book will be to introduce some of the best well known software that you can use for free of charge, furthermore where to find them, how to access them, and finally in every chapter you will find demonstrated examples step-by-step, on hacker tools.The discussions and implementation examples will provide you not only how to use hacking tools, but how to become a Man in the Middle in multiple ways.Additionally you will be demonstrated how to create a Denial of Service Attack, how to manipulate the network infrastructure by creating fake packets, as well how to replicate any networking device, and fool end users to install backdoors on demand.In order to understand hackers and protect the network infrastructure you must think like a hacker in today's expansive and eclectic internet and you must understand that nothing is fully secured.There are many step by step method on how to plan a successful penetration test and examples on how to manipulate or misdirect trusted employees using social engineering.The intention of this content is to benefit readers by reviewing detailed facts as well as personal experience.Your reading of this book will boost your knowledge on what is possible in today's hacking world and help you to become an Ethical Hacker.Book 2 - The Ultimate Guide to the 17 Most Dangerous Hacking AttacksDo you want to learn about today's most sophisticated Hacking attacks?Do you want to know more about Cyber criminals and their operations?Do you want to learn about Robot Networks, Trojans & Ransomware?In this book you will learn about: ADWARESPYWAREMALWAREMAN IN THE MIDDLELOCKYTRAFFIC REDIRECTIONPAYLOAD INJECTIONARP POISONINGWORMSROGUE WIRELESS ACCESS POINTSMISS-ASSOCIATION ATTACKSDE-AUTHENTICATION ATTACKSCOLLISION ATTACKSREPLAY ATTACKSPHISHINGVISHINGWHALINGSMISHINGSPEAR PHISHINGDUMPSTER DIVINGSHOULDER SURFINGBRUTE FORCE ATTACKDICTIONARY ATTACKSRAINBOW TABLESKEYSTROKE LOGGINGSSPOOFINGSOCIAL ENGINEERINGSPAMMINGSQL INJECTIONSDDOS ATTACKSTCP SYN FLOOD ATTACKPING OF DEATHVIRUSESROOTKITSLOGIC BOMBSTROJAN HORSESWANNA-CRYRANSOMWAREBOTNETS

Hack-Proof Your Life Now!: The New Cybersecurity Rules: Protect Your Email, Computer, and Bank Accounts from Hackers, Malware, and Identity Theft

Автор: Bailey Sean M., Devin Kropp
Название: Hack-Proof Your Life Now!: The New Cybersecurity Rules: Protect Your Email, Computer, and Bank Accounts from Hackers, Malware, and Identity Theft
ISBN: 0997729007 ISBN-13(EAN): 9780997729009
Издательство: Неизвестно
Цена: 3055 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Everyone is besieged by a nonstop cyber-crime wave that victimizes millions of people and businesses each year. And trouble usually starts with a click.

In just the next 24 hours:

  • Scammers will target the public with 94 billion emails
  • Hackers will seize and hold 88,000 computers for ransom
  • Identity thieves will impersonate 35,000 people

How we handle our online security is critical to protecting our personal and professional lives. But guidance for staying safe has been fragmented and confusing--until now.

Hack-Proof Your Life Now demystifies the topic and introduces you to the New Cybersecurity Rules--clear, sensible, and do-able actions that will quickly improve your security.

Can anyone really be safe and secure online? Yes, there is a way to quickly shut down hackers, thieves, and identity scammers and enjoy good online security, say authors Sean M. Bailey and Devin Kropp. They contend that anyone can dramatically boost their online security by taking a handful of inexpensive and easy-to-accomplish actions.

Their book begins by asking the reader to measure his or her online security with a 10-question cybersecurity quiz. Nearly everyone scores poorly. But that changes quickly as the authors introduce the New Cybersecurity Rules, a set of 15 principles organized around three mindsets that must be cultivated in order to achieve higher security:

Secrecy. Email addresses, passwords, credit files, Social Security numbers, and other personal information need greater levels of protection. Governments and private companies have done a miserable job guarding personal data. Only individual actions can limit exposure to hackers' data breaches. The authors offer eight secrecy-boosting rules, including this one: Stop using a personal email address for online banking and credit accounts. It's too easily stolen. Instead, create a financial-only email account to use exclusively for finances. That limits exposure to just a few secure places on the Internet where the financial-only email resides, making it harder for hackers to scoop up and exploit.

Omniscience. Just like the financial services industry, consumers must use technology to become "financially all-knowing" and monitor--in real time-- personal banking and credit matters. By placing one's self at the center of online security (a key theme of the book), everyone can rest assured that identity thieves aren't quietly stealing their money or ruining their credit. One recommended omniscience rule: Set up notifications on banking and credit cards to instantly become aware whenever cash leaves any accounts or when credit is charged. It's a way to instantly spot fraud or identity theft, a solid protection to have at no extra cost.

Mindfulness. Enacting the New Cybersecurity Rules instills a stronger security mindset, the authors tell us. But how can it be maintained? Safety degrades without permanent changes to computer behaviors and security awareness. But the hackers never sleep. Even the best protected inbox will still receive a few dangerous emails. What to do? The authors suggest their 10-Second EMAIL Rule, an easy to remember mnemonic for staying mindful of avoiding malicious links. EMAIL stands for "Examine Message and Inspect Links" and shows how to spot and unmask dangerous blackmail spam and identity theft malware. It's a Zen-like practice that can benefit everyone every time they check their email.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия