Меню
Электронные Книги:
Журналы
Аудиокниги
Самое интересное

Hacking - The Next Generation (2009)

 (голосов: 0)
Date Дата: 29 апреля 2010 | Смотрели Hacking - The Next Generation (2009) Просмотров: 789
Hacking - The Next Generation (2009)

Название: Hacking - The Next Generation
Год: 2009
Страниц: 279
Формат: PDF
Размер: 6,77 mb
Язык: Ангийский
This book is for anyone interested in learning the techniques that the more sophisticated attackers are using today. Other books on the topic have the habit of rehashing legacy attack and penetration methodologies that are no longer of any use to criminals. If you want to learn how the techniques criminals use today have evolved to contain crafty tools and procedures that can compromise a targeted individual or an enterprise, this book is for you.
|

Уважаемые посетители, если вы хотите скачать Hacking - The Next Generation (2009) и не видите ссылок, то скорее всего наши партнёры(литрес) их не предоставили. Можем предложить купить данное издание.

Книги из категории Компьютерная литература:



Chained Exploits: Advanced Hacking Attacks from Start to Finish Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of at ... Читать

Srinivasa Rao Kotipalli, Mohammed A. Imran - Hacking Android (2016) Srinivasa Rao Kotipalli, Mohammed A. Imran - Hacking Android (2016)
With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part

Hacking Exposed Windows. Windows Security Secrets & Solutions (3-rd edition ... Hacking Exposed Windows. Windows Security Secrets & Solutions (3-rd edition ...

ICEfaces 1.8: Next Generation Enterprise Web Development ICEfaces 1.8: Next Generation Enterprise Web Development
Create your first enterprise Web application with a desktop-like user interface.If you are an enterprise developer who wants to add the latest Web 2.0 features to a JSF project this book is for you. You need a basic knowledge of the Spring Framework ... Читать

Asterisk Hacking Asterisk Hacking
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the ... Читать

Bandboxes: Tips, Tools, and Techniques for Learning the Craft Bandboxes: Tips, Tools, and Techniques for Learning the Craft
Картонные коробки впервые были изготовлены в Елизаветинской Англии для хранения мужских льняных воротничков или лент, но по-настоящему это ремесло получило развитие в Америке девятнадцатого века, где картон сшивали и оклеивали обоями, чтобы сделать к ... Читать

BackTrack 5 Wireless Penetration Testing BackTrack 5 Wireless Penetration Testing
Learn Wireless Penetration Testing with the most recent version of Backtrack.The first and only book that covers wireless testing with BackTrack.

re...
Добавление коментария
Ваше Имя:
Код: Включите эту картинку для отображения кода безопасности
обновить если не виден код
Введите код



Кабинет
Ты не поверишь!