Mostrando 1,021 - 1,040 Resultados de 1,058 Para Buscar '"hacker"', tiempo de consulta: 0.09s Limitar resultados
  1. 1021
    Publicado 2023
    “…What you will learn Explore various DLL injection techniques for setting API hooks Understand how to run an arbitrary program file in memory Become familiar with malware obfuscation techniques to evade antivirus detection Discover how malware circumvents current security measures and tools Use Microsoft Authenticode to sign your code to avoid tampering Explore various strategies to bypass UAC design for privilege escalation Who this book is for This book is for cybersecurity professionals- especially for anyone working on Windows security, or malware researchers, network administrators, ethical hackers looking to explore Windows exploit, kernel practice, and reverse engineering. …”
    Libro electrónico
  2. 1022
    Publicado 2024
    “…Certifications: GIAC Security Essentials; Azure Fundamentals; Microsoft 365 Fundamentals; Cybersec First Responder; CompTIA ITF+, A+, Network+, Security+, Project+; MCP; MCT; MCDST; MCITP; MCTS; MCSA; MCSE; MCDBA; Certified Ethical Hacker; Certified Wireless Administrator; Certified Internet Web Professional…”
    Video
  3. 1023
    Publicado 2019
    “…What you will learn Choose and configure a hardware device to use Kali NetHunter Use various tools during pentests Understand NetHunter suite components Discover tips to effectively use a compact mobile platform Create your own Kali NetHunter-enabled device and configure it for optimal results Learn to scan and gather information from a target Explore hardware adapters for testing and auditing wireless networks and Bluetooth devices Who this book is for Hands-On Penetration Testing with Kali NetHunter is for pentesters, ethical hackers, and security professionals who want to learn to use Kali NetHunter for complete mobile penetration testing and are interested in venturing into the mobile domain. …”
    Libro electrónico
  4. 1024
    Publicado 2020
    “…This book is not about protecting yourself from a targeted attack by the NSA; it is about arming yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data—just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. …”
    Libro electrónico
  5. 1025
    Publicado 2017
    “…Who This Book Is For This book targets IT pen testers, security consultants, and ethical hackers who want to expand their knowledge and gain expertise on advanced web penetration techniques. …”
    Libro electrónico
  6. 1026
    Publicado 2007
    “…For each class of security threat, Home Network Security Simplified provides a tutorial–including tricks and tools that hackers use, a primer on network security design fundamentals, and step-by-step instructions on implementing security solutions. …”
    Libro electrónico
  7. 1027
    Publicado 2008
    “…. • Complete and comprehensive coverage of Windows Vista’s networking features. • Thwart hackers, crackers, thieves and other Internet malefactors by following our easy to understand chapters on security! …”
    Libro electrónico
  8. 1028
    Publicado 2008
    “…—Lance Spitzner, Founder, Honeynet Project "Whether gathering intelligence for research and defense, quarantining malware outbreaks within the enterprise, or tending hacker ant farms at home for fun, you’ll find many practical techniques in the black art of deception detailed in this book. …”
    Libro electrónico
  9. 1029
    Publicado 2008
    “…Dabei wird stets die Denk- und Handlungsweise eines Angreifers genau analysiert. Beliebte Hacker-Tools werden dabei auch dargestellt. Mit einer Philosophie der digitalen Sicherheit schließt dieses herausragende IT-Sicherheitsbuch…”
    Libro electrónico
  10. 1030
    por White, Jane, 1948-
    Publicado 2010
    “…We can protect our own financial futures if we get wise--and get together to demand real change.” Jacob S. Hacker, Author of The Great Risk Shift: The New Economic Insecurity and the Decline of the American Dream Too many American families are racing toward financial catastrophe--saddled with exploding credit card and college debt, out-of-control housing costs, and underfunded 401(k) accounts. …”
    Libro electrónico
  11. 1031
    Publicado 2020
    “…What you will learn Set up the environment for Metasploit Understand how to gather sensitive information and exploit vulnerabilities Get up to speed with client-side attacks and web application scanning using Metasploit Leverage the latest features of Metasploit 5.0 to evade anti-virus Delve into cyber attack management using Armitage Understand exploit development and explore real-world case studies Who this book is for If you are a penetration tester, ethical hacker, or security consultant who wants to quickly get started with using the Metasploit Framework to carry out elementary penetration testing in highly secured environments, then this Metasploit book is for you. …”
    Libro electrónico
  12. 1032
    Publicado 2012
    “…Recognize vulnerabilities caused by IP network integration, as well as VoIP’s unique security requirements Discover how hackers target IP telephony networks and proactively protect against each facet of their attacks Implement a flexible, proven methodology for end-to-end Cisco IP Telephony security Use a layered (defense-in-depth) approach that builds on underlying network security design Secure CUCM, Cisco Unity/Unity Connection, CUPS, CUCM Express, and Cisco Unity Express platforms against internal and external threats Establish physical security, Layer 2 and Layer 3 security, and Cisco ASA-based perimeter security Complete coverage of Cisco IP Telephony encryption and authentication fundamentals Configure Cisco IOS Voice Gateways to help prevent toll fraud and deter attacks Secure Cisco Voice Gatekeepers and Cisco Unified Border Element (CUBE) against rogue endpoints and other attack vectors Se..…”
    Libro electrónico
  13. 1033
    Publicado 2024
    “…What you will learn Develop a deep understanding of the incident handling process from preparation to post-incident activities Gain practical experience in digital evidence collection and forensic analysis Effectively manage various security incidents, including malware, network, and web application security incidents Grasp essential cloud security concepts and best practices Identify and mitigate insider threats effectively Utilize tools like OSForensics, Wireshark, and NMAP for cybersecurity tasks Audience This course is suitable for cybersecurity professionals, ethical hackers, incident responders, and individuals seeking to enhance their cybersecurity skills. …”
    Video
  14. 1034
    Publicado 2024
    “…What you will learn Plan and execute effective penetration tests Perform detailed reconnaissance and vulnerability scans Exploit vulnerabilities to assess security posture Maintain unauthorized access discreetly Execute strategies to conceal testing activities Produce comprehensive security assessment reports Audience This course is ideal for IT professionals, cybersecurity enthusiasts, and ethical hackers seeking to enhance their pentesting skills. …”
    Video
  15. 1035
    Publicado 2024
    “…What you will learn Work with real-life examples of OSINT in action and discover best practices Automate OSINT collection and analysis Harness social media data for OSINT purposes Manage your digital footprint to reduce risk and maintain privacy Uncover and analyze hidden information within documents Implement an effective OSINT-driven threat intelligence program Leverage OSINT techniques to enhance organizational security Who this book is for This book is for ethical hackers and security professionals who want to expand their cybersecurity knowledge and stay one step ahead of online threats by gaining comprehensive insights into OSINT tools and techniques. …”
    Libro electrónico
  16. 1036
    Publicado 2024
    “…You'll learn how to choose the right hackathon platforms, structure, and communication strategy, and manage hackers, mentors, jury groups, and partnerships to serve your hackathon purpose and achieve impactful results. …”
    Libro electrónico
  17. 1037
    por Boyraz, Guven
    Publicado 2024
    “…What you will learn Gain insight into current cybersecurity threats targeting endpoints Understand why antivirus solutions are no longer sufficient for robust security Explore popular EDR/XDR tools and their implementation Master the integration of EDR tools into your security operations Uncover evasion techniques employed by hackers in the EDR/XDR context Get hands-on experience utilizing DNS logs for endpoint defense Apply effective endpoint hardening techniques within your organization Who this book is for If you're an IT professional seeking to safeguard yourself and your company's digital assets, this book is for you. …”
    Libro electrónico
  18. 1038
    Publicado 2024
    “…Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIs Key Features Develop a profound understanding of the inner workings of APIs with a sharp focus on security Learn the tools and techniques employed by API security testers and hackers, establishing your own hacking laboratory Master the art of building robust APIs with shift-left and shield-right approaches, spanning the API lifecycle Purchase of the print or Kindle book includes a free PDF eBook Book Description Along with the exponential growth of API adoption comes a rise in security concerns about their implementation and inherent vulnerabilities. …”
    Libro electrónico
  19. 1039
    Publicado 2024
    “…Whether you're an experienced Python developer looking to enhance offensive security skills, an ethical hacker, a penetration tester eager to learn advanced Python techniques, or a cybersecurity enthusiast exploring Python's potential in vulnerability analysis, you'll find valuable insights. …”
    Libro electrónico
  20. 1040
    Publicado 2023
    “…In a nutshell, he is a serial entrepreneur, techie, life hacker, expert PM, and MBA (x2), but at heart, he is also an educator. …”
    Video