• Ebook Google Hacks: 100 Industrial-Strength Tips & Tools

    Ebook Google Hacks: 100 Industrial-Strength Tips & Tools

    With the largest collection of web documents in the world, Google is a reflection of the Web. The hacks in this book are not just about Google, they are also about unleashing the vast potential of the Web today and in the years to come. Google Hacks is a great resource for search enthusiasts, and we hope you enjoy it as much as we did.

     384 p actvn 26/03/2024 15 0

  • Ebook Hack-X-Crypt: A straight forward guide towards ethical hacking and cyber security

    Ebook Hack-X-Crypt: A straight forward guide towards ethical hacking and cyber security

    This Book you will uncover the finest ways to defend your computer systems from the hackers This Book is written by keeping one object in mind that a beginner, who is not much familiar regarding computer hacking, can easily, attempts these hacks and recognize what we are trying to demonstrate. After Reading this book you will come to recognize that how Hacking is affecting our everyday routine work and can be very hazardous in many fields like...

     105 p actvn 26/03/2024 14 0

  • Ebook Hacker’s challenge: Test your incident response skills using 20 scenarios

    Ebook Hacker’s challenge: Test your incident response skills using 20 scenarios

    Hacker’s Challenge brings you fact-based, computer-security war stories from top researchers, consultants, incident-response specialists, and forensic analysts working in the computer-security industry today. Rather than just retelling the story, however, the book goes further—it pulls you, the reader, inside the story. As each story unfolds, you are presented with information about the incident and are looked upon to solve the case. This...

     384 p actvn 26/03/2024 14 0

  • Ebook Hackers beware

    Ebook Hackers beware

    A good defense starts with a thorough understanding of your opponent’s offense. Hackers Beware teaches you how hackers think, what tools they use, and the techniques they utilize to compromise a machine. Eric Cole, a leading expert in information security, shows you not only how to detect these attacks, but what you can do to protect yourself against them. When it comes to securing your site, knowledge is power. This book gives you the...

     817 p actvn 26/03/2024 17 0

  • Ebook Hacking: Computer hacking, security testing, penetration testing and basic security - Gary Hall, Erin Watson

    Ebook Hacking: Computer hacking, security testing, penetration testing and basic security - Gary Hall, Erin Watson

    Most people don't really understand what hacking is about, much less how to go about it. It's something that we just watch in movies or hear about on the news. This book, Hacking: Computer hacking, security testing, penetration testing and basic security, is meant to help you understand hacking techniques in a broader and deeper way. In this book, you will learn how you can protect yourself from some of the most prevalent hacking schemes to...

     134 p actvn 26/03/2024 20 0

  • Ebook The official CHFI study guide for computer hacking forensics investigators: Part 1

    Ebook The official CHFI study guide for computer hacking forensics investigators: Part 1

    Ebook The official CHFI study guide for computer hacking forensics investigators: Part 1 includes contents: Chapter 1: computer forensics in today’s world; chapter 2: systems, disks, and media; chapter 3: the computer investigation process; chapter 4: acquiring data, duplicating data, and recovering deleted files; chapter 5: Windows, Linux, and macintosh boot processes; chapter 6: Windows and Linux Forensics; chapter 7: steganography and...

     485 p actvn 26/03/2024 8 0

  • Ebook The official CHFI study guide for computer hacking forensics investigators: Part 2

    Ebook The official CHFI study guide for computer hacking forensics investigators: Part 2

    Ebook The official CHFI study guide for computer hacking forensics investigators: Part 2 includes contents: Chapter 10: router forensics and network forensics; chapter 11: investigating wireless attacks; chapter 12: PDA, blackberry, and ipod forensics; chapter 13: forensic softwareand hardware; chapter 14: forensics investigation using encase; chapter 15: incident response; chapter 16: types of investigations; appendix a: becoming an expert...

     471 p actvn 26/03/2024 9 0

  • Ebook Forensic computer crime investigation

    Ebook Forensic computer crime investigation

    Ebook "Forensic computer crime investigation" includes contents: Chapter 1: computer crime and the electronic crime scene; chapter 2: the digital investigative unit: staffing, training, and issues; chapter 3: criminal investigation analysis and behavior: characteristics of computer criminals; chapter 4: investigative strategy and utilities; chapter 5: computer forensics & investigation: the training organization; chapter 6: internet crimes...

     338 p actvn 26/03/2024 7 0

  • Ebook Forensic computing: A practitioners guide (Second edition)

    Ebook Forensic computing: A practitioners guide (Second edition)

    Ebook Forensic computing: A practitioners guide (Second edition) includes contents: Chapter 1 forensic computing, chapter 2 understanding information, chapter 3 IT systems concepts, chapter 4 PC hardware and inside the box, chapter 5 disk geometry, chapter 6 the new technology file system, chapter 7 the treatment of pcs, chapter 8 the treatment of electronic organizers, chapter 9 looking ahead (just a little bit more).

     464 p actvn 26/03/2024 9 0

  • Ebook Computer & intrusion forensics: Part 1

    Ebook Computer & intrusion forensics: Part 1

    In ebook Computer & intrusion forensics: Part 1, the following content will be discussed: Chapter 1 computer crime, computer forensics, and computer security; chapter 2 current practice; chapter 3 computer forensics in law enforcement and national security.

     196 p actvn 26/03/2024 7 0

  • Ebook Computer & intrusion forensics: Part 2

    Ebook Computer & intrusion forensics: Part 2

    In ebook Computer & intrusion forensics: Part 2, the following content will be discussed: Chapter 4 computer forensics in forensic accounting; chapter 5 case studies; chapter 6 intrusion detection and intrusion forensics; chapter 7 research directions and future developments.

     221 p actvn 26/03/2024 8 0

  • Ebook Ethernet the definitive guide - Charles E. Spurgeon

    Ebook Ethernet the definitive guide - Charles E. Spurgeon

    This book shows how Ethernet components can be combined to create Ethernet LANs. While some basic network designs are shown in this book, there are an infinity of network designs that can be built using Ethernet, ranging from the smallest workgroup on up to very large enterprise networks that support tens of thousands of computers.

     527 p actvn 26/03/2024 9 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn
getDocumentFilter3 strKey=LIBTAILIEU2_LIST_FILTERactvn262710vi