Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Hands on Hacking, Matthew Hickey, James McAlonan, Jennifer Arcuri


Варианты приобретения
Цена: 5544.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Англия: Есть  Склад Америка: Есть  
При оформлении заказа до: 2025-08-04
Ориентировочная дата поставки: Август-начало Сентября

Добавить в корзину
в Мои желания

Автор: Matthew Hickey, James McAlonan, Jennifer Arcuri
Название:  Hands on Hacking
ISBN: 9781119561453
Издательство: Wiley
Классификация:


ISBN-10: 1119561450
Обложка/Формат: Paperback
Страницы: 400
Вес: 0.67 кг.
Дата издания: 23.06.2020
Серия: Computing & IT
Язык: English
Размер: 235 x 186 x 37
Читательская аудитория: Professional & vocational
Ключевые слова: Data encryption,Computer networking & communications
Основная тема: Data encryption,Computer networking & communications
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание:

A fast, hands-on introduction to offensive hacking techniques

Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the authors years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike.

We will take you on a journey through a hackers perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, youll look for flaws and their known exploits--including tools developed by real-world government financed state-actors.

- An introduction to the same hacking techniques that malicious hackers will use against an organization

- Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws

- Based on the tried and tested material used to train hackers all over the world in the art of breaching networks

- Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities

We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you wont find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security.

Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.




Hands-On Smart Contract Development with Solidity and Ethereum: From Fundamentals to Deployment

Автор: Hoover David H., Solorio Kevin
Название: Hands-On Smart Contract Development with Solidity and Ethereum: From Fundamentals to Deployment
ISBN: 1492045268 ISBN-13(EAN): 9781492045267
Издательство: Wiley
Рейтинг:
Цена: 8394.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Ready to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum-the open source blockchain-based distributed computing platform.

Hacking exposed cisco networks

Автор: Vladimirov, Andrew A. Gavrilenko, Konstantin V. Mi
Название: Hacking exposed cisco networks
ISBN: 0072259175 ISBN-13(EAN): 9780072259179
Издательство: McGraw-Hill
Рейтинг:
Цена: 9291.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: First to market! This is the only book focusing solely on Cisco network hacking, security auditing and defense issues.

Beginning Ethical Hacking with Python

Автор: Sinha
Название: Beginning Ethical Hacking with Python
ISBN: 1484225406 ISBN-13(EAN): 9781484225400
Издательство: Springer
Рейтинг:
Цена: 3492.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.
What You Will Learn
Discover the legal constraints of ethical hacking Work with virtual machines and virtualization Develop skills in Python 3See the importance of networking in ethical hackingGain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more
Who This Book Is For
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language.
Computer & Internet Security: A Hands-on Approach

Автор: Du Wenliang
Название: Computer & Internet Security: A Hands-on Approach
ISBN: 1733003924 ISBN-13(EAN): 9781733003926
Издательство: Неизвестно
Рейтинг:
Цена: 12670.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

This book is based on the author's 18 years of teaching and research experience. It covers the fundamental principles in Computer and Internet security, including software security, hardware security, network security, web security, and cryptography. Its goal is to help readers understand how various attacks work, what their fundamental causes are, how to defend against them, and how various defense mechanisms work. The book can be used as a textbook for undergraduate and graduate courses. Over 80 universities and colleges adopted the first edition of this book within the first 15 months since it was published in late 2017.

The author strongly believes in "learning by doing", so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can touch, play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). In some cases, if a principle involves a security mechanism, such as firewall or Virtual Private Network (VPN), the book guides readers to implement a mini-version of such a mechanism (e.g., mini-firewall or mini-VPN). Readers can learn better from such hands-on activities.

The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries.

Hands-On Blockchain with Hyperledger

Автор: Gaur Nitin, Desrosiers Luc, Novotny Petr
Название: Hands-On Blockchain with Hyperledger
ISBN: 1788994523 ISBN-13(EAN): 9781788994521
Издательство: Неизвестно
Цена: 10114.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: With concrete exercises and examples this book will help you to understand how to deploy a Hyperledger Fabric network. It then proceeds to explain the steps in developing a full fledged decentralized application. You will not only learn how to plan, design and create private networks but also evolve the network as per organizational needs.

Implementing Intrusion Detection Systems - A Hands -On Guide for Securing the Network

Автор: Crothers
Название: Implementing Intrusion Detection Systems - A Hands -On Guide for Securing the Network
ISBN: 0764549499 ISBN-13(EAN): 9780764549496
Издательство: Wiley
Рейтинг:
Цена: 6732.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Offering tips and techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It covers IDS standards, intrusion signatures, log analysis, and incident handling.

Identity Theft: Breakthroughs in Research and Practice

Автор: Information Resources Management Association
Название: Identity Theft: Breakthroughs in Research and Practice
ISBN: 1522508082 ISBN-13(EAN): 9781522508083
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 50312.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one`s identity is compromised. This critical volume features key research on methods and technologies for protection, the problems associated with identity theft, and outlooks for the future.

Blockchain Applications: A Hands-On Approach

Автор: Bahga Arshdeep, Madisetti Vijay
Название: Blockchain Applications: A Hands-On Approach
ISBN: 0996025561 ISBN-13(EAN): 9780996025560
Издательство: Неизвестно
Цена: 11725.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

In the US, the services sector provides employment to about 100 million, while the manufacturing sector provides employment to about 20 million. These sectors are highly automated, and driven by sophisticated business processes forming an integral part of the digital economy. While the applications themselves may be distributed over the Internet in time and space, the core business, regulatory, and financial aspects of the digital economy are still centralized, with the need for centralized agencies (such as banks, customs authorities, and tax agencies) to authenticate and settle payments and transactions. These centralized services often are manual, difficult to automate, and represent a bottleneck to facilitating a frictionless digital economy. The next revolutionary step in the services and manufacturing economy of the future is the development of automated distributed applications that do not depend on these traditional centralized agencies for controlling, facilitating and settling multi-party transactions that may themselves be subject to complex contractual constraints. The blockchain technology is an integral part of these next steps that promises a smart new world of automation of complex services and manufacturing processes. Blockchain is a distributed and public ledger which maintains records of all the transactions on a blockchain network comprising suppliers of products and services and consumers. With the blockchain's ability to establish trust in a peer-to-peer network through a distributed consensus mechanism rather than relying on a powerful centralized authority, the technology is being seen by the industry experts as one of the greatest innovations since the invention of the Internet. As per Santander, blockchain technologies can reduce annual costs for financial firms by $20b by streamlining processes and improving efficiency. In addition, investment and spending on blockchain technology is expected to increase at a compound annual growth rate (CAGR) of 52% through 2019. We have written this textbook, as part of our expanding "A Hands-On Approach"(TM) series, to serve as a textbook for senior-level and graduate-level courses on financial and regulation technologies, business analytics, Internet of Things, and cryptocurrency. This book is also written for use within industries in the FinTech and RegTech space that may be interested in rolling out products and services that utilize this new area of technology. An accompanying website for this book contains additional support for instruction and learning (www.blockchain-book.com). The book is organized into three main parts, comprising a total of ten chapters. Part I provides an introduction to blockchain concepts, design patterns, and architectures for blockchain applications. A blockchain stack comprising a decentralized computation platform, a decentralized messaging platform, and a decentralized storage platform is described. Part II introduces the readers to tools and platforms for blockchain, such as Geth, PyEthApp, TestRPC, Mist Ethereum Wallet, MetaMask, Web3 JavaScript API and the Truffle Dapp framework. Implementation examples of various smart contracts and decentralized applications (Dapps) are provided. Part III focuses on advanced topics such as the security and scalability related challenges for the blockchain platforms.

Hacking the Hacker

Автор: Grimes
Название: Hacking the Hacker
ISBN: 1119396212 ISBN-13(EAN): 9781119396215
Издательство: Wiley
Рейтинг:
Цена: 3326.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Meet the world`s top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race.

Hacking Connected Cars: Tactics, Techniques, and Procedures

Автор: Alissa Knight
Название: Hacking Connected Cars: Tactics, Techniques, and Procedures
ISBN: 1119491800 ISBN-13(EAN): 9781119491804
Издательство: Wiley
Рейтинг:
Цена: 6336.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment

Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars.

Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle's systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity.

  • Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide
  • Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability
  • Conduct penetration testing using the same tactics, techniques, and procedures used by hackers

From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars--all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия