Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Networking For Beginners: Learn Basic Computer Networking Concepts, What A Computer Network Is And What Are The Different Types Of Networks., Kali Kevin


Варианты приобретения
Цена: 3447.00р.
Кол-во:
 о цене
Наличие: Отсутствует. 
Возможна поставка под заказ. Дата поступления на склад уточняется после оформления заказа


Добавить в корзину
в Мои желания

Автор: Kali Kevin
Название:  Networking For Beginners: Learn Basic Computer Networking Concepts, What A Computer Network Is And What Are The Different Types Of Networks.
ISBN: 9781914058127
Издательство: Growise Ltd
Классификация:

ISBN-10: 1914058127
Обложка/Формат: Paperback
Страницы: 170
Вес: 0.24 кг.
Дата издания: 11.10.2020
Язык: English
Размер: 22.86 x 15.24 x 0.91 cm
Читательская аудитория: General (us: trade)
Подзаголовок: Learn basic computer networking concepts, what a computer network is and what are the different types of networks.
Рейтинг:
Поставляется из: США
Описание: ★★ Do you want to learn how to set up a new network? Do you want to learn more about Network Security? If you want to know more about Computer Networking, then keep reading. ★★


Computer networking has been around for ages, starting from the wired to the present wireless systems. We have been able to do justice to everything you need to kick start your knowledge of computer networking in this book. Getting familiar with the components and implementing your own networks should come easier. Networking of Computers requires so many infrastructures for a seamless operation. The various types of network structures require different parts. These will be looked at extensively in the course of this book.


Physical network infrastructures are needed for a Computer Network, which includes but is not limited to; switches, routers, wireless access points, etc. There is also some underlying firmware that makes these infrastructures function correctly. Other than the physical systems, there is also the needed software deployed to monitor, manage, and secure the network.


For advanced networks, there is a need for standard protocols, which are designed to perform numerous discrete functions. These protocols are also used to communicate different data types, irrespective of the underlying hardware.

For instance, in the telephone system, a voice over IP (VoIP) can bring about the transportation of IP telephony traffic from one point to another, once these points support the protocol. This is also similar to what occurs in the browser, with the HTTP providing portals to accessing webpages. Also, over an IP based network, the IP protocols to transport data and services, since there is protocol compatibility.


This guide will focus on the following:


- Types of computer networking

- Components of a network

- Mobile networks

- Wired network technology

- How to automate the network?

- Introduction to IP addressing

- Packets, frames, and headers

- What is the airport extreme?

- Information technology vulnerability

- Sniffing and spoofing

- About CCNA routing and switching... AND MORE


Even if youve never know anything about computer networks in your life, you can learn it just in few days.


Get a copy of Networking for Beginners Now





Hymn to kali

Автор: Avalon, Arthur
Название: Hymn to kali
ISBN: 1434691969 ISBN-13(EAN): 9781434691965
Издательство: Неизвестно
Рейтинг:
Цена: 3449.00 р.
Наличие на складе: Есть (1 шт.)

Linux for Hackers: The Advanced Guide on Kali Linux Operating System to Change Your Computer into an Underground Hacking Machine and Mast

Автор: Growth Darwin
Название: Linux for Hackers: The Advanced Guide on Kali Linux Operating System to Change Your Computer into an Underground Hacking Machine and Mast
ISBN: 1914024249 ISBN-13(EAN): 9781914024245
Издательство: Неизвестно
Рейтинг:
Цена: 3028.00 р.
Наличие на складе: Нет в наличии.

The Age of Kali

Автор: Dalrymple William
Название: The Age of Kali
ISBN: 0307948900 ISBN-13(EAN): 9780307948908
Издательство: Random House (USA)
Цена: 1559.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: From the author of The Last Mughal and Nine Lives the classic stories he gathered during the ten years he spent journeying across the Indian subcontinent, from Sri Lanka and southern India to the North West Frontier of Pakistan. As he searched for evidence of Kali Yug, the "age of darkness" predicted by an ancient Hindu cosmology in a final epoch of strife and corruption, Dalrymple encountered a region that thrilled and surprised him. Venturing to places rarely visited by foreigners, he presents compelling portraits of a diverse range of figures--from a Hindi rap megastar through the Tamil Tigers to the drug lords of Pakistan. Dalrymple's love for the subcontinent comes across in every page, which makes its chronicles of political corruption, ethnic violence and social disintegration all the more poignant. The result is a dark yet vibrant travelogue, and a unique look at a region that continues to be marked by rapid change and unlimited possibilities as it struggles to reconcile the forces of modernity and tradition.

Sabrina & Corina

Автор: Fajardo-Anstine, Kali
Название: Sabrina & Corina
ISBN: 0525511296 ISBN-13(EAN): 9780525511298
Издательство: Random House (USA)
Рейтинг:
Цена: 2391.00 р.
Наличие на складе: Нет в наличии.

Описание: Latinas of Indigenous descent living in the American West take center stage in this haunting debut story collection--a powerful meditation on friendship, mothers and daughters, and the deep-rooted truths of our homelands.

Kali Fajardo-Anstine's magnetic story collection breathes life into her Indigenous Latina characters and the land they inhabit. Set against the remarkable backdrop of Denver, Colorado--a place that is as fierce as it is exquisite--these women navigate the land the way they navigate their lives: with caution, grace, and quiet force.

In "Sugar Babies," ancestry and heritage are hidden inside the earth, but have the tendency to ascend during land disputes. "Any Further West" follows a sex worker and her daughter as they leave their ancestral home in southern Colorado only to find a foreign and hostile land in California. In "Tomi," a woman returns home from prison, finding herself in a gentrified city that is a shadow of the one she remembers from her childhood. And in the title story, "Sabrina & Corina," a Denver family falls into a cycle of violence against women, coming together only through ritual.

Sabrina & Corina is a moving narrative of unrelenting feminine power and an exploration of the universal experiences of abandonment, heritage, and an eternal sense of home.

Advance praise for Sabrina & Corina

"Here are stories that blaze like wildfires, with characters who made me laugh and broke my heart, believable in everything they said and did. How tragic that American letters hasn't met these women of the West before, women who were here before America was America. And how tragic that these working-class women haven't seen themselves in the pages of American lit before. Thank you for honoring their lives, Kali. I welcome them and you."--Sandra Cisneros

"Kali Fajardo-Anstine's collection of stories, Sabrina & Corina, isn't just good, it's masterful storytelling. Fajardo-Anstine is a fearless writer: her women are strong and scarred witnesses of the violations of their homelands, their culture, their bodies; her plots turn and surprise, unerring and organic in their comprehensiveness; her characters break your heart, but you keep on going because you know you are in the hands of a master. . . . Her stories move through the heart of darkness and illuminate it with the soul of truth. Comparisons came to mind: the Alice Munro of the high plains, the Toni Morrison of indigenous Latinas--but why compare her to anybody? She is her own unique voice, and her work will easily find a place, not just in Latinx literature, but in American literature and beyond."--Julia Alvarez, author of How the Garc a Girls Lost Their Accents

Hacking Beginners Guide: The Basic Guide to Information Network Security and the Basic Concepts of Kali Linux

Автор: Morgan Kevin
Название: Hacking Beginners Guide: The Basic Guide to Information Network Security and the Basic Concepts of Kali Linux
ISBN: 1801094837 ISBN-13(EAN): 9781801094832
Издательство: Неизвестно
Рейтинг:
Цена: 2338.00 р.
Наличие на складе: Нет в наличии.

Описание: Do you want to learn the basic concepts of hacking and understand how to improve the security of your network in a simple and effective way?


Read on.

Surely, your passion for computing has led you to learn more about how to protect your network.

The term hacking means the set of methods, techniques and operations put in place by a person (hacker) with the aim of knowing, entering and modifying a computer hardware or software system.

If you know the operations that Hackers perform in order to enter a computer network, then you can understand how to prevent this.

This book aims to provide you with the basic concepts and techniques used by hackers to access a computer network.

In addition, you will be described, step by step, the installation of Kali Linux.


When you finish reading this guide, you will learn ALL the basic concepts to improve your computer security.


Topics:

  • Types of Hacking
  • The Path of a Hacker
  • The hacking process
  • Installing and Using Kali Linux
  • How to Scan the Network and Servers
  • How to hack a PC and how to protect yourself


The information collected through this guide is for your personal use and for applications permitted by law.


It is the guide to ethical hacking for every beginner.


Even if you have never had to deal with the hacking process and Kali Linux, with this guide you will learn how to perform penetration tests and improve your computer security.


Do you want to know more about it?


What are you waiting for?


Get your copy NOW
Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk

Автор: Kali Kevin
Название: Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk
ISBN: 1914058100 ISBN-13(EAN): 9781914058103
Издательство: Неизвестно
Рейтинг:
Цена: 3309.00 р.
Наличие на складе: Нет в наличии.

Описание: ★★ Do you want to protect yourself from Cyber Security attacks? If so then keep reading. ★★


Imagine if someone placed a key-logging tool in your personal computer and became privy to your passwords to social media, finances, school, or your organization. It would not take a lot of effort for this individual to ruin your life. There have been various solutions given to decrease your attack surface and mitigate the risks of cyberattacks. These can also be used on a small scale to protect yourself as an individual from such infiltrations.


The next step is placing advanced authentication when it comes to internal collaborators. After all, the goal is to minimize the risk of passwords being hacked - so it would be a good idea to use two-factor authentications. Google presents the perfect example in their security protocols by the way they use two-step verification, where the password has to be backed by a code sent to the user's mobile device.


You also need to authenticate the external collaborators. There are inevitable risks that come with sharing data to the external suppliers, clients, and partners that are essential in business. In this case, you need to know how long the data is being shared and apply controls to supervise the sharing permissions that can be stopped when required. If not for anything else, it would give you peace of mind to know that the information is safely being handled.


The future of cybersecurity lies in setting up frameworks, as individuals and as corporations, to filter the access to information and sharing networks.


This guide will focus on the following:


- Introduction

- What is Ethical Hacking?

- Preventing Cyber Attacks

- Surveillance System

- Social Engineering and Hacking

- Cybersecurity Types of Roles

- Key Concepts & Methodologies

- Key Technologies to Be Aware

- Which Security Certification fits you best

- The Value of Security Certifications

- Cyber Security Career Potentials... AND MORE


Get this book Now and feel like a master of Cyber Security within a few days


Networking For Beginners: Learn Basic Computer Networking Concepts, What A Computer Network Is And What Are The Different Types Of Networks.

Автор: Kali Kevin
Название: Networking For Beginners: Learn Basic Computer Networking Concepts, What A Computer Network Is And What Are The Different Types Of Networks.
ISBN: 1914058135 ISBN-13(EAN): 9781914058134
Издательство: Неизвестно
Рейтинг:
Цена: 4964.00 р.
Наличие на складе: Нет в наличии.

Описание: ★★ Do you want to learn how to set up a new network? Do you want to learn more about Network Security? If you want to know more about Computer Networking, then keep reading. ★★


Computer networking has been around for ages, starting from the wired to the present wireless systems. We have been able to do justice to everything you need to kick start your knowledge of computer networking in this book. Getting familiar with the components and implementing your own networks should come easier. Networking of Computers requires so many infrastructures for a seamless operation. The various types of network structures require different parts. These will be looked at extensively in the course of this book.


Physical network infrastructures are needed for a Computer Network, which includes but is not limited to; switches, routers, wireless access points, etc. There is also some underlying firmware that makes these infrastructures function correctly. Other than the physical systems, there is also the needed software deployed to monitor, manage, and secure the network.


For advanced networks, there is a need for standard protocols, which are designed to perform numerous discrete functions. These protocols are also used to communicate different data types, irrespective of the underlying hardware.

For instance, in the telephone system, a voice over IP (VoIP) can bring about the transportation of IP telephony traffic from one point to another, once these points support the protocol. This is also similar to what occurs in the browser, with the HTTP providing portals to accessing webpages. Also, over an IP based network, the IP protocols to transport data and services, since there is protocol compatibility.


This guide will focus on the following:


- Types of computer networking

- Components of a network

- Mobile networks

- Wired network technology

- How to automate the network?

- Introduction to IP addressing

- Packets, frames, and headers

- What is the airport extreme?

- Information technology vulnerability

- Sniffing and spoofing

- About CCNA routing and switching... AND MORE


Even if you've never know anything about computer networks in your life, you can learn it just in few days.


Get a copy of Networking for Beginners Now


Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk

Автор: Kali Kevin
Название: Cyber Security: A Starter Guide to Cyber Security for Beginners, Discover the Best Strategies for Defense Your Devices, Including Risk
ISBN: 1914058119 ISBN-13(EAN): 9781914058110
Издательство: Неизвестно
Рейтинг:
Цена: 4827.00 р.
Наличие на складе: Нет в наличии.

Описание: ★★ Do you want to protect yourself from Cyber Security attacks? If so then keep reading. ★★


Imagine if someone placed a key-logging tool in your personal computer and became privy to your passwords to social media, finances, school, or your organization. It would not take a lot of effort for this individual to ruin your life. There have been various solutions given to decrease your attack surface and mitigate the risks of cyberattacks. These can also be used on a small scale to protect yourself as an individual from such infiltrations.


The next step is placing advanced authentication when it comes to internal collaborators. After all, the goal is to minimize the risk of passwords being hacked - so it would be a good idea to use two-factor authentications. Google presents the perfect example in their security protocols by the way they use two-step verification, where the password has to be backed by a code sent to the user's mobile device.


You also need to authenticate the external collaborators. There are inevitable risks that come with sharing data to the external suppliers, clients, and partners that are essential in business. In this case, you need to know how long the data is being shared and apply controls to supervise the sharing permissions that can be stopped when required. If not for anything else, it would give you peace of mind to know that the information is safely being handled.


The future of cybersecurity lies in setting up frameworks, as individuals and as corporations, to filter the access to information and sharing networks.


This guide will focus on the following:


- Introduction

- What is Ethical Hacking?

- Preventing Cyber Attacks

- Surveillance System

- Social Engineering and Hacking

- Cybersecurity Types of Roles

- Key Concepts & Methodologies

- Key Technologies to Be Aware

- Which Security Certification fits you best

- The Value of Security Certifications

- Cyber Security Career Potentials... AND MORE


Get this book Now and feel like a master of Cyber Security within a few days


Mastering kali linux for advanced penetration testing -

Автор: Velu, Vijay Kumar
Название: Mastering kali linux for advanced penetration testing -
ISBN: 1787120236 ISBN-13(EAN): 9781787120235
Издательство: Неизвестно
Цена: 10114.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.

Key Features

  • Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
  • Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
  • Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs

Book Description

This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.

We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network--directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.

You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing

What you will learn

  • Select and configure the most effective tools from Kali Linux to test network security
  • Employ stealth to avoid detection in the network being tested
  • Recognize when stealth attacks are being used against your network
  • Exploit networks and data systems using wired and wireless networks as well as web services
  • Identify and download valuable data from target systems
  • Maintain access to compromised systems
  • Use social engineering to compromise the weakest part of the network--the end users

Who this book is for

Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title.

Kali linux - an ethical hacker`s cookbook

Автор: Sharma, Himanshu
Название: Kali linux - an ethical hacker`s cookbook
ISBN: 1787121828 ISBN-13(EAN): 9781787121829
Издательство: Неизвестно
Цена: 9010.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Over 120 recipes to perform advanced penetration testing with Kali LinuxAbout This Book* Practical recipes to conduct effective penetration testing using the powerful Kali Linux* Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease* Confidently perform networking and application attacks using task-oriented recipesWho This Book Is ForThis book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn* Installing, setting up and customizing Kali for pentesting on multiple platforms* Pentesting routers and embedded devices* Bug hunting 2017* Pwning and escalating through corporate network* Buffer over?ows 101* Auditing wireless networks* Fiddling around with software-defned radio* Hacking on the run with NetHunter* Writing good quality reportsIn DetailWith the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities.

This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark.

Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approachThis is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.

Hacking With Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including

Автор: Scripting Alan
Название: Hacking With Kali Linux: A Complete Guide for Beginners to Hacking, Security, Computer Networking, Wireless Networks, Cybersecurity, Including
ISBN: 191410501X ISBN-13(EAN): 9781914105012
Издательство: Неизвестно
Рейтинг:
Цена: 3028.00 р.
Наличие на складе: Нет в наличии.

Описание:

You Are A Few Steps Away From Securing Your Online Transactions And Hacking Your Data Will Be A Thing Of The Past


Do you know that hackers are big threats to your business only and they are ready to damage and destroy you and your data by snooping at everything you are doing without knowing anything?Do you want to give yourself peace of mind, freedom, choice, and security in all your dealings on the internet? Do you want to know how you can protect your server and your data no matter how skillful a hacker can be?


This easy-to-use, step-by-step book goes a step further to show you about different techniques and methods as well as ways hackers can get into your network, steal your data, and cause severe damages to you. No matter what you do online, some bad actors are keeping a close look at you, ready to devour you and your assets.

If you are tired of spinning the wheel about your security online, buy this book. Its approach draws from various ways, guidelines, tips, and examples about how hackers can tap into any form of your vulnerabilities on the internet and steal your data. This book teaches how you can secure yourself from these bad actors so they will never crack into your network. What are the steps to take so you can be safe and secure? This book walks you through the entire process.


Some of the things that this book discusses include:

  • Deep understanding of hacking and hackers
  • Different types of hackers and how they operate
  • The process of hacking
  • How to prepare before hacking (with the detailed process)
  • The five phases of hacking
  • How you can delete tracks in a system and stay anonymous
  • How you can become exposed to the internet
  • The process of installing Kali Linux
  • How you can work with Kali Linux
  • What is a wireless network and how you can scan networks and servers
  • Everything you need to know about WEP cracking and the tools to do the job
  • The best way you can use to install Nmap on Linux
  • How you can understand the risks your system is facing
  • How to know your enemies on the internet and how you can win when you have the right tools
  • Everything you need to know about wireless hacking domination as well as testing methodology and the best tools for the job
  • How you can crack WEP/WPA encryptions
  • What are the hacking techniques?
  • How you can scan and map your network
  • How you can defend against attacks
  • Some facts you need to know about cybersecurity and cyber-attacks
  • What is cryptography, and how does it work?
  • Symmetric and asymmetric encryption
  • Different ways you can use to secure important files online without hacking coming near them not to talk of touching them
  • How you can use VPN to protect internet traffic
  • How you can crack the encryption
  • What are the flaws in web applications and websites

Plus tons of more examples and details.


If you'd like to know new ways hackers manipulate their ways into your server and how you can guard against these attacks, buy this book

If you'd like to know everything about framework attacks and penetration testing measures, buy this book

If you'd like to know simple yet powerful ways to protect your website so it can run smoothly without the fear of perpetrators, buy this book

Not only will this book change your life forever, but it will also change the way you look at online security, hackers, and how you need to stay secure online


Get your copy of this book by clicking the "Buy Now" button

Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies

Автор: Codings Zach
Название: Cyber Security: This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies
ISBN: 1801091471 ISBN-13(EAN): 9781801091473
Издательство: Неизвестно
Рейтинг:
Цена: 4959.00 р.
Наличие на складе: Нет в наличии.

Описание:

How do I secure my computer? What is malware and how do I get rid of it? Do I only need to worry about Phishing attacks via email? What if my personal email account, bank account, or other accounts were compromised? Sounds familiar? Keep reading...


Cybersecurity has changed significantly in the past decade, we've moved away from the days when basic virus protection and security controls were sufficient to deter threats, to the need for advanced security analytics tools to prevent advanced persistent threats (APTs) and tackle malicious insiders.

This book includes:

Hacking with Kali Linux A Beginner's Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security

Here's a sneak peek of what you'll learn with this book:

- What is hacking

- The importance of cybersecurity

- How malware and cyber-attacks operate

- How to install Kali Linux on a virtual box

- How to scan networks

- VPNs & Firewalls

- An introduction to Digital Signatures and Cryptography

- and much more...

Ethical Hacking A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment

Throughout these pages, you will learn:

- Roles and responsibilities of an Ethical Hacker

- Hacking as a career

- Making money freelance

- Most common security tools

- The three ways to scan your system

- The seven proven penetration testing strategies

- and much more...


Even if you aren't a security expert, there are a few basic steps you can take to secure your computer.

Arm yourself with all this knowledge

Scroll up and click the BUY NOW BUTTON


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия