Chiudi

Aggiungi l'articolo in

Chiudi
Aggiunto

L’articolo è stato aggiunto alla lista dei desideri

Chiudi

Crea nuova lista

The Hack Is Back: Techniques to Beat Hackers at Their Own Games - Jesse Varsalone,Christopher Haller - cover
The Hack Is Back: Techniques to Beat Hackers at Their Own Games - Jesse Varsalone,Christopher Haller - cover
Dati e Statistiche
Wishlist Salvato in 0 liste dei desideri
The Hack Is Back: Techniques to Beat Hackers at Their Own Games
Disponibile in 3 settimane
152,72 €
-5% 160,76 €
152,72 € 160,76 € -5%
Disp. in 3 settimane
Chiudi
Altri venditori
Prezzo e spese di spedizione
ibs
152,72 € Spedizione gratuita
disponibile in 3 settimane disponibile in 3 settimane
Info
Nuovo
Altri venditori
Prezzo e spese di spedizione
ibs
152,72 € Spedizione gratuita
disponibile in 3 settimane disponibile in 3 settimane
Info
Nuovo
Altri venditori
Prezzo e spese di spedizione
Chiudi

Tutti i formati ed edizioni

Chiudi
The Hack Is Back: Techniques to Beat Hackers at Their Own Games - Jesse Varsalone,Christopher Haller - cover
Chiudi

Promo attive (0)

Descrizione


Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world? Where did they learn these techniques and how do they refine them to achieve their objectives? How do I get started in a career in cyber and get hired? We will discuss and provide examples of some of the nefarious techniques used by hackers and cover how attackers apply these methods in a practical manner. The Hack Is Back is tailored for both beginners and aspiring cybersecurity professionals to learn these techniques to evaluate and find risks in computer systems and within networks. This book will benefit the offensive-minded hacker (red-teamers) as well as those who focus on defense (blue-teamers). This book provides real-world examples, hands-on exercises, and insider insights into the world of hacking, including: Hacking our own systems to learn security tools Evaluating web applications for weaknesses Identifying vulnerabilities and earning CVEs Escalating privileges on Linux, Windows, and within an Active Directory environment Deception by routing across the TOR network How to set up a realistic hacking lab Show how to find indicators of compromise Getting hired in cyber! This book will give readers the tools they need to become effective hackers while also providing information on how to detect hackers by examining system behavior and artifacts. By following the detailed and practical steps within these chapters, readers can gain invaluable experience that will make them better attackers and defenders. The authors, who have worked in the field, competed with and coached cyber teams, acted as mentors, have a number of certifications, and have tremendous passions for the field of cyber, will demonstrate various offensive and defensive techniques throughout the book.
Leggi di più Leggi di meno

Dettagli

2024
Hardback
310 p.
Testo in English
254 x 178 mm
760 gr.
9780815382386
Chiudi
Aggiunto

L'articolo è stato aggiunto al carrello

Chiudi

Aggiungi l'articolo in

Chiudi
Aggiunto

L’articolo è stato aggiunto alla lista dei desideri

Chiudi

Crea nuova lista

Chiudi

Chiudi

Siamo spiacenti si è verificato un errore imprevisto, la preghiamo di riprovare.

Chiudi

Verrai avvisato via email sulle novità di Nome Autore