• Ebook Advanced persistent threat hacking: The art and science of hacking any organization – Part 1

    Ebook Advanced persistent threat hacking: The art and science of hacking any organization – Part 1

    Ebook Advanced persistent threat hacking: The art and science of hacking any organization – Part 1 includes contents: Chapter 1 introduction, chapter 2 empirical data, chapter 3 APT hacker methodology, chapter 4 an APT approach to reconnaissance, chapter 5 reconnaissance: nontechnical data.

     202 p actvn 26/01/2024 22 0

  • Ebook Advanced persistent threat hacking: The art and science of hacking any organization – Part 2

    Ebook Advanced persistent threat hacking: The art and science of hacking any organization – Part 2

    Ebook Advanced persistent threat hacking: The art and science of hacking any organization – Part 2 includes contents: Chapter 6 spear social engineering, chapter 7 phase III: remote targeting, chapter 8 spear phishing with hardware trojans, chapter 9 physical infiltration, chapter 10 APT software backdoors.

     348 p actvn 26/01/2024 15 0

  • Ebook Computer viruses hacking and malware attacks for dummies: Part 2

    Ebook Computer viruses hacking and malware attacks for dummies: Part 2

    Ebook Computer viruses hacking and malware attacks for dummies: Part 2 includes contents: Chapter 8: updating antivirus software and signatures; chapter 9: installing security patches; chapter 10: using firewalls and spyware blockers; chapter 11: protecting PDAs from viruses; chapter 12: incorporating safe computing practices; chapter 13: viruses and the losers whowrite them; chapter 14: trojan horses, worms, spam, and hoaxes; chapter 15: how...

     160 p actvn 26/01/2024 13 0

  • Ebook Computer viruses hacking and malware attacks for dummies: Part 1

    Ebook Computer viruses hacking and malware attacks for dummies: Part 1

    Ebook Computer viruses hacking and malware attacks for dummies: Part 1 includes contents: Chapter 1: understanding virus risks, chapter 2: does my computer have a virus?, chapter 3: does your computer have antivirus software?, chapter 4: obtaining and installing antivirus software, chapter 5: configuring antivirus software, chapter 6: scanning your computer and e-mail, chapter 7: ridding your computer of viruses.

     130 p actvn 26/01/2024 19 0

  • Ebook Google hacking for penetration testers (Volume 2): Part 1

    Ebook Google hacking for penetration testers (Volume 2): Part 1

    Ebook Google hacking for penetration testers (Volume 2): Part 1 includes contents: Chapter 1: Google searching basics, Chapter 2: advanced operators, chapter 3: Google hacking basics, chapter 4: document grinding and database digging, chapter 5: Google’s partin an information collection framework, chapter 6: locating exploits and finding targets.

     283 p actvn 26/01/2024 20 0

  • Ebook Google hacking for penetration testers (Volume 2): Part 2

    Ebook Google hacking for penetration testers (Volume 2): Part 2

    Ebook Google hacking for penetration testers (Volume 2): Part 2 includes contents: Chapter 7: ten simple security searches that work; chapter 8: tracking down web servers, login portals, and network hardware; chapter 9: usernames, passwords, and secret stuff, oh my!; chapter 10: hacking google services; chapter 11: Google hacking showcase; chapter 12: protecting yourself from google hackers.

     278 p actvn 26/01/2024 16 0

  • Ebook Incident response: Computer forensics toolkit – Part 2

    Ebook Incident response: Computer forensics toolkit – Part 2

    Ebook Incident response: Computer forensics toolkit – Part 2 includes contents: Chapter 8: incident containment and eradication of vulnerabilities; chapter 9: disaster recovery and follow-up; chapter 10: responding to different types of incidents; chapter 11: assessing system security to prevent further attacks; chapter 12: pulling it all together; appendix a: what's on the CD-ROM; appendix b: commonly attacked ports; appendix c: field...

     184 p actvn 26/01/2024 22 0

  • Ebook Incident response: Computer forensics toolkit – Part 1

    Ebook Incident response: Computer forensics toolkit – Part 1

    Ebook Incident response: Computer forensics toolkit – Part 1 includes contents: Chapter 1: computer forensics and incident response essentials; chapter 2: addressing law enforcement considerations; chapter 3: forensic preparation and preliminary response; chapter 4: windows registry, recycle bin, and data storage; chapter 5: analyzing and detecting malicious code and intruders; chapter 6: retrieving and analyzing clues; chapter 7: procedures...

     178 p actvn 26/01/2024 14 0

  • Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 2

    Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 2

    Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) – Part 2 includes contents: Chapter 6 input injection attacks, chapter 7 attacking XML web services, chapter 8 attacking web application management, chapter 9 hacking web clients, chapter 10 the enterprise web application security program, A: Web application security checklist, B: Web hacking tools and techniques cribsheet.

     233 p actvn 25/12/2023 37 1

  • Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 1

    Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 1

    Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 1 includes contents: Chapter 1 hacking web apps 101, chapter 2 profiling, chapter 3 hacking web platforms, chapter 4 attacking web authentication, chapter 5 attacking web authorization.

     248 p actvn 25/12/2023 36 0

  • Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 information security basics, chapter 2 the windows security architecture from the hacker's perspective, chapter 3 footprinting and scanning, chapter 4 enumeration, chapter 5 hacking windows-specific services, chapter 6 discovering and exploiting windows vulnerabilities, chapter 7 post-exploit pillaging.

     252 p actvn 25/12/2023 41 0

  • Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2 includes contents: Chapter 8 achieving stealth and maintaining presence, chapter 9 hacking SQL server, chapter 10 hacking Microsoft client apps, chapter 11 physical attacks, chapter 12 windows security features and tools, chapter a windows security checklist, chapter b about the companion website.

     230 p actvn 25/12/2023 36 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn