Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk, Kali Kevin


Варианты приобретения
Цена: 3309.00р.
Кол-во:
 о цене
Наличие: Отсутствует. 
Возможна поставка под заказ. Дата поступления на склад уточняется после оформления заказа


Добавить в корзину
в Мои желания

Автор: Kali Kevin
Название:  Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk
ISBN: 9781914058103
Издательство: Growise Ltd
Классификация:


ISBN-10: 1914058100
Обложка/Формат: Paperback
Страницы: 132
Вес: 0.19 кг.
Дата издания: 11.10.2020
Язык: English
Размер: 22.91 x 15.19 x 0.71 cm
Читательская аудитория: General (us: trade)
Подзаголовок: A starter guide to cyber security for beginners, discover the best strategies for defense your devices, including risk management, social engineering, and information security.
Рейтинг:
Поставляется из: США
Описание: ★★ Do you want to protect yourself from Cyber Security attacks? If so then keep reading. ★★


Imagine if someone placed a key-logging tool in your personal computer and became privy to your passwords to social media, finances, school, or your organization. It would not take a lot of effort for this individual to ruin your life. There have been various solutions given to decrease your attack surface and mitigate the risks of cyberattacks. These can also be used on a small scale to protect yourself as an individual from such infiltrations.


The next step is placing advanced authentication when it comes to internal collaborators. After all, the goal is to minimize the risk of passwords being hacked - so it would be a good idea to use two-factor authentications. Google presents the perfect example in their security protocols by the way they use two-step verification, where the password has to be backed by a code sent to the users mobile device.


You also need to authenticate the external collaborators. There are inevitable risks that come with sharing data to the external suppliers, clients, and partners that are essential in business. In this case, you need to know how long the data is being shared and apply controls to supervise the sharing permissions that can be stopped when required. If not for anything else, it would give you peace of mind to know that the information is safely being handled.


The future of cybersecurity lies in setting up frameworks, as individuals and as corporations, to filter the access to information and sharing networks.


This guide will focus on the following:


- Introduction

- What is Ethical Hacking?

- Preventing Cyber Attacks

- Surveillance System

- Social Engineering and Hacking

- Cybersecurity Types of Roles

- Key Concepts & Methodologies

- Key Technologies to Be Aware

- Which Security Certification fits you best

- The Value of Security Certifications

- Cyber Security Career Potentials... AND MORE


Get this book Now and feel like a master of Cyber Security within a few days





Hymn to kali

Автор: Avalon, Arthur
Название: Hymn to kali
ISBN: 1434691969 ISBN-13(EAN): 9781434691965
Издательство: Неизвестно
Рейтинг:
Цена: 3449.00 р.
Наличие на складе: Есть (1 шт.)

Mastering kali linux for advanced penetration testing -

Автор: Velu, Vijay Kumar
Название: Mastering kali linux for advanced penetration testing -
ISBN: 1787120236 ISBN-13(EAN): 9781787120235
Издательство: Неизвестно
Цена: 10114.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.

Key Features

  • Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
  • Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
  • Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs

Book Description

This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.

We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network--directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.

You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing

What you will learn

  • Select and configure the most effective tools from Kali Linux to test network security
  • Employ stealth to avoid detection in the network being tested
  • Recognize when stealth attacks are being used against your network
  • Exploit networks and data systems using wired and wireless networks as well as web services
  • Identify and download valuable data from target systems
  • Maintain access to compromised systems
  • Use social engineering to compromise the weakest part of the network--the end users

Who this book is for

Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title.

Kali linux - an ethical hacker`s cookbook

Автор: Sharma, Himanshu
Название: Kali linux - an ethical hacker`s cookbook
ISBN: 1787121828 ISBN-13(EAN): 9781787121829
Издательство: Неизвестно
Цена: 9010.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Over 120 recipes to perform advanced penetration testing with Kali LinuxAbout This Book* Practical recipes to conduct effective penetration testing using the powerful Kali Linux* Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease* Confidently perform networking and application attacks using task-oriented recipesWho This Book Is ForThis book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn* Installing, setting up and customizing Kali for pentesting on multiple platforms* Pentesting routers and embedded devices* Bug hunting 2017* Pwning and escalating through corporate network* Buffer over?ows 101* Auditing wireless networks* Fiddling around with software-defned radio* Hacking on the run with NetHunter* Writing good quality reportsIn DetailWith the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities.

This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark.

Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approachThis is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.

Hacking With Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including

Автор: Scripting Alan
Название: Hacking With Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including
ISBN: 191410501X ISBN-13(EAN): 9781914105012
Издательство: Неизвестно
Рейтинг:
Цена: 3028.00 р.
Наличие на складе: Нет в наличии.

Описание:

You Are A Few Steps Away From Securing Your Online Transactions And Hacking Your Data Will Be A Thing Of The Past


Do you know that hackers are big threats to your business only and they are ready to damage and destroy you and your data by snooping at everything you are doing without knowing anything?Do you want to give yourself peace of mind, freedom, choice, and security in all your dealings on the internet? Do you want to know how you can protect your server and your data no matter how skillful a hacker can be?


This easy-to-use, step-by-step book goes a step further to show you about different techniques and methods as well as ways hackers can get into your network, steal your data, and cause severe damages to you. No matter what you do online, some bad actors are keeping a close look at you, ready to devour you and your assets.

If you are tired of spinning the wheel about your security online, buy this book. Its approach draws from various ways, guidelines, tips, and examples about how hackers can tap into any form of your vulnerabilities on the internet and steal your data. This book teaches how you can secure yourself from these bad actors so they will never crack into your network. What are the steps to take so you can be safe and secure? This book walks you through the entire process.


Some of the things that this book discusses include:

  • Deep understanding of hacking and hackers
  • Different types of hackers and how they operate
  • The process of hacking
  • How to prepare before hacking (with the detailed process)
  • The five phases of hacking
  • How you can delete tracks in a system and stay anonymous
  • How you can become exposed to the internet
  • The process of installing Kali Linux
  • How you can work with Kali Linux
  • What is a wireless network and how you can scan networks and servers
  • Everything you need to know about WEP cracking and the tools to do the job
  • The best way you can use to install Nmap on Linux
  • How you can understand the risks your system is facing
  • How to know your enemies on the internet and how you can win when you have the right tools
  • Everything you need to know about wireless hacking domination as well as testing methodology and the best tools for the job
  • How you can crack WEP/WPA encryptions
  • What are the hacking techniques?
  • How you can scan and map your network
  • How you can defend against attacks
  • Some facts you need to know about cybersecurity and cyber-attacks
  • What is cryptography, and how does it work?
  • Symmetric and asymmetric encryption
  • Different ways you can use to secure important files online without hacking coming near them not to talk of touching them
  • How you can use VPN to protect internet traffic
  • How you can crack the encryption
  • What are the flaws in web applications and websites

Plus tons of more examples and details.


If you'd like to know new ways hackers manipulate their ways into your server and how you can guard against these attacks, buy this book

If you'd like to know everything about framework attacks and penetration testing measures, buy this book

If you'd like to know simple yet powerful ways to protect your website so it can run smoothly without the fear of perpetrators, buy this book

Not only will this book change your life forever, but it will also change the way you look at online security, hackers, and how you need to stay secure online


Get your copy of this book by clicking the "Buy Now" button

Computer Programming and Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacki

Автор: Codings Zach
Название: Computer Programming and Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacki
ISBN: 1801091447 ISBN-13(EAN): 9781801091442
Издательство: Неизвестно
Рейтинг:
Цена: 4275.00 р.
Наличие на складе: Нет в наличии.

Описание:

Do you feel that informatics is indispensable in today's increasingly digital world? Do you want to introduce yourself to the world of programming or cyber security but don't know where to get started? If the answer to these questions is yes, then keep reading...


This book includes:


PYTHON MACHINE LEARNING: A Beginner's Guide to Python Programming for Machine Learning and Deep Learning, Data Analysis, Algorithms and Data Science with Scikit Learn, TensorFlow, PyTorch and Keras


Here's a sneak peek of what you'll learn with this book:

- The Fundamentals of Python

- Python for Machine Learning

- Data Analysis in Python

- Comparing Deep Learning and Machine Learning

- The Role of Machine Learning in the Internet of Things (IoT)

And much more...


SQL FOR BEGINNERS: A Step by Step Guide to Learn SQL Programming for Query Performance Tuning on SQL Database


Throughout these pages, you will learn:

- How to build databases and tables with the data you create.

- How to sort through the data efficiently to find what you need.

- The exact steps to clean your data and make it easier to analyze.

- How to modify and delete tables and databases.

And much more...


LINUX FOR BEGINNERS: An Introduction to the Linux Operating System for Installation, Configuration and Command Line


We will cover the following topics:

- How to Install Linux

- The Linux Console

- Command line interface

- Network administration

And much more...


HACKING WITH KALI LINUX: A Beginner's Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security


You will learn:

- The importance of cybersecurity

- How malware and cyber-attacks operate

- How to install Kali Linux on a virtual box

- VPNs & Firewalls

And much more...


ETHICAL HACKING: A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment


Here's a sneak peek of what you'll learn with this book:

- What is Ethical Hacking (roles and responsibilities of an Ethical Hacker)

- Most common security tools

- The three ways to scan your system

- The seven proven penetration testing strategies

...and much more.


This book won't make you an expert programmer, but it will give you an exciting first look at programming and a foundation of basic concepts with which you can start your journey learning computer programming, machine learning and cybersecurity

Scroll up and click the BUY NOW BUTTON

Computer Programming and Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacki

Автор: Codings Zach
Название: Computer Programming and Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacki
ISBN: 1801091455 ISBN-13(EAN): 9781801091459
Издательство: Неизвестно
Рейтинг:
Цена: 5378.00 р.
Наличие на складе: Нет в наличии.

Описание:

Do you feel that informatics is indispensable in today's increasingly digital world? Do you want to introduce yourself to the world of programming or cyber security but don't know where to get started? If the answer to these questions is yes, then keep reading...


This book includes:


PYTHON MACHINE LEARNING: A Beginner's Guide to Python Programming for Machine Learning and Deep Learning, Data Analysis, Algorithms and Data Science with Scikit Learn, TensorFlow, PyTorch and Keras


Here's a sneak peek of what you'll learn with this book:

- The Fundamentals of Python

- Python for Machine Learning

- Data Analysis in Python

- Comparing Deep Learning and Machine Learning

- The Role of Machine Learning in the Internet of Things (IoT)

And much more...


SQL FOR BEGINNERS: A Step by Step Guide to Learn SQL Programming for Query Performance Tuning on SQL Database

Throughout these pages, you will learn:

- How to build databases and tables with the data you create.

- How to sort through the data efficiently to find what you need.

- The exact steps to clean your data and make it easier to analyze.

- How to modify and delete tables and databases.

And much more...


LINUX FOR BEGINNERS: An Introduction to the Linux Operating System for Installation, Configuration and Command Line


We will cover the following topics:

- How to Install Linux

- The Linux Console

- Command line interface

- Network administration

And much more...


HACKING WITH KALI LINUX: A Beginner's Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security


You will learn:

- The importance of cybersecurity

- How malware and cyber-attacks operate

- How to install Kali Linux on a virtual box

- VPNs & Firewalls

And much more...


ETHICAL HACKING: A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment


Here's a sneak peek of what you'll learn with this book:

- What is Ethical Hacking (roles and responsibilities of an Ethical Hacker)

- Most common security tools

- The three ways to scan your system

- The seven proven penetration testing strategies

...and much more.


This book won't make you an expert programmer, but it will give you an exciting first look at programming and a foundation of basic concepts with which you can start your journey learning computer programming, machine learning and cybersecurity

Scroll up and click the BUY NOW BUTTON

Kali Linux for Beginners: A Practical Guide to Learn the Operating System Installation and configuration, including Networks, Ethical Hacking an

Автор: Foster Matt
Название: Kali Linux for Beginners: A Practical Guide to Learn the Operating System Installation and configuration, including Networks, Ethical Hacking an
ISBN: 1801092036 ISBN-13(EAN): 9781801092036
Издательство: Неизвестно
Рейтинг:
Цена: 3717.00 р.
Наличие на складе: Нет в наличии.

Описание: Discover Kali Linux And Take Your First Step Towards Becoming An Ethical Hacker


Are you a tech enthusiast who's curious about how computers and networks function?

Are you looking for a new exciting career?

Do you want an epic-sounding job title?

Then ethical hacking is right for you.


An ethical hacker (also known as a white hat hacker) is a cybersecurity expert who helps companies find and fix vulnerabilities in their software, networks, or websites. Some companies are ready to pay tens of thousands of dollars for a single vulnerability

But how do you become an ethical hacker?


You don't need a degree in IT or engineering to start hacking. It's one of those fields where experience matters much more than any formal qualifications you might have. All you need to start learning ethical hacking is a PC with the necessary tools installed.

With this book, you'll get ready to start. This book will guide you through installing and using Kali Linux, an operating system designed specifically for the needs of ethical hackers.


Here's what you'll learn:
  • The top reasons why you should choose Linux as your operating system
  • How to install Linux without technical knowledge
  • Why Kali Linux is the best operating system for ethical hackers
  • The best beginner-friendly hacking tools in Kali Linux
  • The key principles of cybersecurity that every Internet user should know
  • And much more


Unlike many other Linux books that are written with tech professionals in mind, this book is specifically aimed at beginners. This is why you'll find so many step-by-step guides and explanatory screenshots in the book. Just follow the instructions and enjoy your first successes


Get a taste of hacking with this beginner-friendly guide.


Scroll up, click on "Buy Now with 1-Click", and Get Your Copy Now


Linux for Hackers: The Advanced Guide on Kali Linux Operating System to Change Your Computer into an Underground Hacking Machine and Mast

Автор: Growth Darwin
Название: Linux for Hackers: The Advanced Guide on Kali Linux Operating System to Change Your Computer into an Underground Hacking Machine and Mast
ISBN: 1914024249 ISBN-13(EAN): 9781914024245
Издательство: Неизвестно
Рейтинг:
Цена: 3028.00 р.
Наличие на складе: Нет в наличии.

Hacking with Kali Linux

Автор: Medicine John
Название: Hacking with Kali Linux
ISBN: 1914053036 ISBN-13(EAN): 9781914053030
Издательство: Неизвестно
Рейтинг:
Цена: 3033.00 р.
Наличие на складе: Нет в наличии.

Описание:

Are you worried about the security structure of your business and want to prevent all forms of attacks on your system? You don't know where to start from or you tried without good results? If so then keep reading.


It is not at all easy to constantly look out for the various forms of threats that are always ready to attack your system of network. It is your prime duty to analyze your network and check out for the various loopholes that are present within the system. Failing to do so might result in serious loss data and security breach.

For having a proper idea about the security threats, it is crucial to learn about the process of hacking in the first place. When you have proper knowledge about the complete process of hacking, you can easily trace out the threats for your system and also improve the security measures for the same.

You can perform various functions with the help of Kali Linux. It not only helps in hacking but also provides the users with various tools that can help in testing the networks for security vulnerabilities. It is a very process to set up the OS and can be installed on any form of system.

In order to analyze your organizational network, you need to learn about the various concepts of cyber security. Learning about the same will help in better implementation of the security measures.

There are various types of cyber-attacks and as the owner of an organization you are required to have proper knowledge about the same. This will help you in planning out preventive measures for the future attacks. As every disease comes with an antidote, cyber-attacks also come with antivirus software for preventing them from attacking the systems.


You will learn:


- Network structure and management

- Concepts of cyber security

- How to implement security measures

- Bash and Python Scripting

- Wireless network security

- Types of attacks

- Firewall security

- Cryptography and Network security

- Penetration Testing

And more...


You need to start from the beginning in order to setup a proper security system. It might take some time but do not lose hope. The chapters of this book have been arranged in a unique way that will provide you with the answers to all your questions regarding hacking and security of network.

Hacking with Kali Linux: The Complete Guide to Kali Linux and the Art of Exploitation, Basic Security, Wireless Network Security, Ethical Hacking and Penetration Testing for Beginners will surely help you in getting started with new security measures for your organization.


So, if you are interested in the various aspects of Kali Linux along with network security, and want to feel like a Master of Security,


click the Buy Now button

Linux for Hackers: The Advanced Guide on Kali Linux Operating System to Change Your Computer into an Underground Hacking Machine and Mast

Автор: Growth Darwin
Название: Linux for Hackers: The Advanced Guide on Kali Linux Operating System to Change Your Computer into an Underground Hacking Machine and Mast
ISBN: 1914024257 ISBN-13(EAN): 9781914024252
Издательство: Неизвестно
Рейтинг:
Цена: 3855.00 р.
Наличие на складе: Нет в наличии.

Hacking with Kali Linux: The Advanced Guide about CyberSecurity to Learn the Secret Coding Tools that Every Hacker Must Use to Break All Comput

Автор: Growth Darwin
Название: Hacking with Kali Linux: The Advanced Guide about CyberSecurity to Learn the Secret Coding Tools that Every Hacker Must Use to Break All Comput
ISBN: 191402429X ISBN-13(EAN): 9781914024290
Издательство: Неизвестно
Рейтинг:
Цена: 4131.00 р.
Наличие на складе: Нет в наличии.

Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies

Автор: Codings Zach
Название: Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies
ISBN: 1801091471 ISBN-13(EAN): 9781801091473
Издательство: Неизвестно
Рейтинг:
Цена: 4959.00 р.
Наличие на складе: Нет в наличии.

Описание:

How do I secure my computer? What is malware and how do I get rid of it? Do I only need to worry about Phishing attacks via email? What if my personal email account, bank account, or other accounts were compromised? Sounds familiar? Keep reading...


Cybersecurity has changed significantly in the past decade, we've moved away from the days when basic virus protection and security controls were sufficient to deter threats, to the need for advanced security analytics tools to prevent advanced persistent threats (APTs) and tackle malicious insiders.

This book includes:

Hacking with Kali Linux A Beginner's Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security

Here's a sneak peek of what you'll learn with this book:

- What is hacking

- The importance of cybersecurity

- How malware and cyber-attacks operate

- How to install Kali Linux on a virtual box

- How to scan networks

- VPNs & Firewalls

- An introduction to Digital Signatures and Cryptography

- and much more...

Ethical Hacking A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment

Throughout these pages, you will learn:

- Roles and responsibilities of an Ethical Hacker

- Hacking as a career

- Making money freelance

- Most common security tools

- The three ways to scan your system

- The seven proven penetration testing strategies

- and much more...


Even if you aren't a security expert, there are a few basic steps you can take to secure your computer.

Arm yourself with all this knowledge

Scroll up and click the BUY NOW BUTTON


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия