181 rezultatov
-
Enterprise Security Architecture(2005) SHERWOOD, NICHOLASSecurity is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterpriseVezava: Trda186,45 € -
Violent Python(2012) O'CONNOR, TJDemonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frameVezava: Mehka57,01 € -
Cryptanalysis(2000) GAINES, HELEN FOUCHEThorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Simple and advanced methods. 166 specimens to solve — with solutions.Vezava: Mehka18,91 € -
Computer Security and Penetration Testing(2013) BASTA, ALFRED,BASTA, NADINE,BROWN, PHD, CISSP, CISA, MARY (CAPELLA UNIVERSITY)Offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. This title addresses how and why people attack computers and networks - equipping readers with the knowledge and techniquVezava: Mehka123,41 € -
-
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory(2014) MICHAEL HALEVezava: Mehka85,31 € -
Guide to Kernel Exploitation(2010) PERLA, ENRICO (KERNEL PROGRAMMER, ORACLE),OLDANI, MASSIMILIANO (SECURITY CONSULTANT, EMAZE NETWORKS)Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNVezava: Mehka57,01 € -
Digital Forensics with Open Source Tools(2011) CARVEY, HARLAN (DFIR ANALYST, PRESENTER, AND OPEN-SOURCE TOOL AUTHOR),ALTHEIDE, CORYFocuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of fVezava: Mehka77,10 € -
Basics of Hacking and Penetration Testing(2013) ENGEBRETSON, PATRICK (DAKOTA STATE UNIVERSITY, MADISON, SD, USA)Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This title helps you learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetratiVezava: Mehka34,20 € -
New Technologies and National Security Challenges(2020)Explores national security challenges posed by new technologies and examines some ongoing efforts to understand and mitigate their potential negative effects. The authors, drawn from among a roster of international scholars, approach these issues from difVezava: Trda338,96 € -
Privacy(2020) GRUIS, LESLIE N.Argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Greater privacy protections for US citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrateVezava: Trda83,60 € -
Core Data Analysis: Summarization, Correlation, and Visualization(2019) MIRKIN, BORISVezava: Mehka54,13 € -
Mindf*ck(2020) WYLIE, CHRISTOPHERFrom whistleblower Christopher Wylie, the definitive story of the Brexit coup, the making of Bannon's America, and an ongoing crime against democracy.Vezava: Mehka18,21 €










