Hacking Exposed 7
7,283円 The latest tactics for thwarting digital attacks “Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abrea...
Countdown to Zero Day
1,399円 Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfareーone in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors wit...
Mastering Metasploit
4,368円 A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you...
Python Forensics
7,291円 Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twist...
Sinking the Jolly Roger
395円 Piracy is taking over the Internet. Especially the piracy of Independent Authors who are perceived as being less able to defend their copyright. This book takes the reader by the hand and walks them through the process of getting their books taken down from pirate sites. You are not defenseless. ...
Verschlüsselung im NSA-Zeitalter
470円 Die NSA kann manche Verschlüsselungen brechen und nimmt Einfluss auf die Entwicklung von Kryptografiestandards. Wem, oder besser: welchen Verfahren ist noch zu trauen? Und wie setzt man sie sicher ein? In den ersten beiden Kapiteln geht Carsten Eilers, freier Berater und Coach für IT-Sicherheit u...
Social Engineering in IT Security: Tools,...
5,850円 Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert o...
@War
1,856円 The spies had come without warning. They plied their craft silently, stealing secrets from the world's most powerful military. They were at work months before anyone noticed their presence. And when American officials finally detected the thieves, they saw it was too late. The damage was done . ....
How to Configure Ubuntu as a Router
80円 Did you know that your Ubuntu system could be configured to act as an immensely powerful router? Surprised? Read on to discover how to achieve this with just a few simple steps.
Incident Response & Computer Forensics, T...
8,119円 The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble w...
Mark Shuttleworth Mini Biography
299円 Mark Shuttleworthis a British-South African entrepreneur, and space tourist who became the first citizen of an independent African country to travel to space. Shuttleworth founded Canonical Ltd. and provides leadership for the Ubuntu operating system. He currently lives on the Isle of Man and hol...
楽天Koboの電子書籍!マンガ、小説、雑誌のレビュー高評価、最安値をチャック!