Mostrando 1,001 - 1,020 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.08s Limitar resultados
  1. 1001
    Publicado 2015
    “…Omar holds the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH) certifications, among others. Omar is the author of numerous books, video courses, white papers, and articles, and has delivered technical presentations at many conferences. …”
    Video
  2. 1002
    Publicado 2018
    “…What you will learn Conduct the initial stages of a penetration test and understand its scope Perform reconnaissance and enumeration of target networks Obtain and crack passwords Use Kali Linux NetHunter to conduct wireless penetration testing Create proper penetration testing reports Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing Carry out wireless auditing assessments and penetration testing Understand how a social engineering attack such as phishing works Who this book is for This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linu..…”
    Libro electrónico
  3. 1003
    Publicado 2018
    “…What you will learn Get started with red team engagements using lesser-known methods Explore intermediate and advanced levels of post-exploitation techniques Get acquainted with all the tools and frameworks included in the Metasploit framework Discover the art of getting stealthy access to systems via Red Teaming Understand the concept of redirectors to add further anonymity to your C2 Get to grips with different uncommon techniques for data exfiltration Who this book is for Hands-On Red Team Tactics is for you if you are an IT professional, pentester, security consultant, or ethical hacker interested in the IT security domain and wants to go beyond Penetration Testing. …”
    Libro electrónico
  4. 1004
    por Knittel, Brian
    Publicado 2013
    “…• Take a quick guided tour of everything that’s new in Windows 8 • Survive without the Start menu • Navigate the new Windows 8 interface (and customize it to make yourself more comfortable) • Learn hidden shortcuts you’d never find on your own • Quickly locate and use files, media, apps, websites, and management tools • Set up your Web connection, and discover Internet Explorer 10’s latest improvements • Get comfortable with Windows 8’s built-in apps, from Calendar and Finance to Weather and Windows Store • Save time by monitoring Facebook, Twitter, and LinkedIn through one unified app • Make the most of Windows 8’s supercharged media and imaging tools • Profit from Windows 8’s built-in support for business presentations • Maximize the performance and efficiency of hardware, storage, and software • Protect yourself from viruses, spyware, data theft, fraud, spam, hackers, and snoops • Use SkyDrive to access your data from anywhere—and use Remote Desktop to access your computer, too • Get even more power with Windows 8’s command-line interface • Use Hyper-V to run other operating systems alongside Windows 8 • Troubleshoot the most common Windows 8 problems—and the toughest ones In Depth offers: • Comprehensive coverage, with detailed solutions • Breakthrough techniques and shortcuts that are unavailable elsewhere • Practical, real-world examples with nothing glossed over or left out • Troubleshooting help for tough problems you can’t fix on your own • Outstanding authors recognized worldwide for their expertise and teaching style • Quick information via sidebars, tips, reminders, notes, and warnings In Depth is the only tool you need to get more done in less time! …”
    Libro electrónico
  5. 1005
    Publicado 2015
    “…The book describes the methods used by criminal hackers to attack organizations via their web applications and provides a detailed explanation of how you can combat such attacks by employing the guidance and controls set out in ISO 27001. …”
    Libro electrónico
  6. 1006
    Publicado 2023
    “…Security engineers, including pentesters, security architects, and ethical hackers, who want to ensure the security of their organization's data when connected with the IoT will find this book useful…”
    Libro electrónico
  7. 1007
    por Hoglund, Greg
    Publicado 2005
    “…At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. …”
    Libro electrónico
  8. 1008
    Publicado 2019
    “…What you will learn Detect email threats such as spamming and phishing using AI Categorize APT, zero-days, and polymorphic malware samples Overcome antivirus limits in threat detection Predict network intrusions and detect anomalies with machine learning Verify the strength of biometric authentication procedures with deep learning Evaluate cybersecurity strategies and learn how you can improve them Who this book is for If you're a cybersecurity professional or ethical hacker who wants to build intelligent systems using the power of machine learning and AI, you'll find this book useful. …”
    Libro electrónico
  9. 1009
    Publicado 2012
    “…Baichtal has written dozens of articles, including pieces for AKE , the D&D publication Kobold Quarterly , and 2600: The Hacker Quarterly . He has contributed to Wired.com’s GeekDad blog for four years and blogged at Make: Online for two, publishing more than 1,500 posts during that time. …”
    Libro electrónico
  10. 1010
    Publicado 2013
    “…He holds 28 industry certifications, including CISSP, ISSAP, Certified Ethical Hacker, Certified Hacking Forensics Investigator, EC Council Certified Security Administrator, and EC Council Certified Instructor. …”
    Libro electrónico
  11. 1011
    por Knittel, Brian
    Publicado 2014
    “…• Take a quick guided tour of everything that’s new in Windows 8.1 • Survive without the Start menu • Navigate the Windows 8.1 interface (and customize it to make yourself more comfortable) • Learn hidden shortcuts you’d never find on your own • Quickly locate and use files, media, apps, websites and management tools • Set up your Web connection, and discover Internet Explorer 11’s latest improvements • Get comfortable with Windows 8.1’s built-in apps, from Calendar and Finance to Weather and Windows Store • Save time by monitoring Facebook, Twitter, and LinkedIn through one unified app • Make the most of Windows’ supercharged media and imaging tools • Profit from Windows’ built-in support for business presentations • Maximize the performance and efficiency of hardware, storage, and software • Protect yourself from viruses, spyware, data theft, fraud, spam, hackers, and snoops • Use SkyDrive to access your data from anywhere—and use Remote Desktop to access your computer, too • Get even more power with Windows 8.1’s command-line interface • Use Hyper-V to run other operating systems alongside Windows • Troubleshoot the most common Windows 8.1’s problems—and the toughest ones In Depth offers: • Comprehensive coverage, with detailed solutions • Breakthrough techniques and shortcuts that are unavailable elsewhere • Practical, real-world examples with nothing glossed over or left out • Troubleshooting help for tough problems you can’t fix on your own • Outstanding authors recognized worldwide for their expertise and teaching styles • Quick information via sidebars, tips, reminders, notes, and warnings In Depth is the only tool you need to get more done in less time! …”
    Libro electrónico
  12. 1012
    Publicado 2023
    “…What you will learn Grasp the psychological concepts and principles used in social engineering attacks Distinguish the different types of social engineering attacks Examine the impact of social engineering on social networks Find out how attackers leverage OSINT tools to perform more successful attacks Walk through the social engineering lifecycle Get a glimpse of the capabilities of Social Engineering Toolkit (SET) Who this book is for This book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. …”
    Libro electrónico
  13. 1013
    Publicado 2024
    “…What you will learn Conduct vulnerability scans with Nikto and Burp Suite Execute directory fuzzing with Feroxbuster Detect and exploit SQL injections using SQL Map Uncover and mitigate XSS vulnerabilities Safeguard against CSRF and SSRF threats Implement JWT attack strategies for security Audience This course is ideal for cybersecurity enthusiasts, IT professionals, and aspiring ethical hackers seeking to deepen their understanding of web app vulnerabilities. …”
    Video
  14. 1014
    Publicado 2024
    “…What you will learn Understand the concept of password cracking Discover how OSINT potentially identifies passwords from breaches Address how to crack common hash types effectively Identify, extract, and crack Windows and macOS password hashes Get up to speed with WPA/WPA2 architecture Explore popular password managers such as KeePass, LastPass, and 1Password Format hashes for Bitcoin, Litecoin, and Ethereum wallets, and crack them Who this book is for This book is for cybersecurity professionals, penetration testers, and ethical hackers looking to deepen their understanding of password security and enhance their capabilities in password cracking. …”
    Libro electrónico
  15. 1015
    Publicado 2024
    “…Con la ayuda de una aliada inesperada, una bella hacker y ladrona profesional danesa, Gabriel no tarda en descubrir que el robo del cuadro forma parte de una trama ilegal de miles de millones de dólares en la que está implicado un individuo cuyo nombre en clave es «el coleccionista», un ejecutivo de la industria energética estrechamente vinculado con las altas esferas del poder en Rusia. …”
    Libro
  16. 1016
    Publicado 2020
    “…By the end of this penetration testing book, you'll have become well-versed in a variety of ethical hacking techniques for securing your AWS environment against modern cyber threats.What you will learnSet up your AWS account and get well-versed in various pentesting servicesDelve into a variety of cloud pentesting tools and methodologiesDiscover how to exploit vulnerabilities in both AWS and applicationsUnderstand the legality of pentesting and learn how to stay in scopeExplore cloud pentesting best practices, tips, and tricksBecome competent at using tools such as Kali Linux, Metasploit, and NmapGet to grips with post-exploitation procedures and find out how to write pentesting reportsWho this book is forIf you are a network engineer, system administrator, or system operator looking to secure your AWS environment against external cyberattacks, then this book is for you. Ethical hackers, penetration testers, and security consultants who want to enhance their cloud security skills will also find this book useful. …”
    Libro electrónico
  17. 1017
    Publicado 2016
    “…What You Will Learn Set up a penetration testing laboratory in a secure way Find out what information is useful to gather when performing penetration tests and where to look for it Use crawlers and spiders to investigate an entire website in minutes Discover security vulnerabilities in web applications in the web browser and using command-line tools Improve your testing efficiency with the use of automated vulnerability scanners Exploit vulnerabilities that require a complex setup, run custom-made exploits, and prepare for extraordinary scenarios Set up Man in the Middle attacks and use them to identify and exploit security flaws within the communication between users and the web server Create a malicious site that will find and exploit vulnerabilities in the user's web browser Repair the most common web vulnerabilities and understand how to prevent them becoming a threat to a site's security In Detail Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. …”
    Libro electrónico
  18. 1018
    Publicado 2016
    “…What You Will Learn Acquaint yourself with the fundamental building blocks of Android Apps in the right way Pentest Android apps and perform various attacks in the real world using real case studies Take a look at how your personal data can be stolen by malicious attackers Understand the offensive maneuvers that hackers use Discover how to defend against threats Get to know the basic concepts of Android rooting See how developers make mistakes that allow attackers to steal data from phones Grasp ways to secure your Android apps and devices Find out how remote attacks are possible on Android devices In Detail With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. …”
    Libro electrónico
  19. 1019
    Publicado 2007
    “…Michael not only has experience in performing security audits and assessments, but also is the author of Que Publishing’s Certified Ethical Hacker Exam Prep, CISSP Exam Cram, and is the co-author of Inside Network Security Assessment: Guarding Your IT Infrastructure by Sams Publishing. …”
    Libro electrónico
  20. 1020
    Publicado 2023
    “…What you will learn Install ZAP on different operating systems or environments Explore how to crawl, passively scan, and actively scan web apps Discover authentication and authorization exploits Conduct client-side testing by examining business logic flaws Use the BOAST server to conduct out-of-band attacks Understand the integration of ZAP into the final stages of a CI/CD pipeline Who this book is for This book is for cybersecurity professionals, ethical hackers, application security engineers, DevSecOps engineers, students interested in web security, cybersecurity enthusiasts, and anyone from the open source cybersecurity community looking to gain expertise in ZAP. …”
    Libro electrónico