Bücher Bücher Elektronik, Foto Elektronik, Foto Sport und Freizeit Sport und Freizeit
Drogerie und Bad Drogerie und Bad Haus, Garten, Küche Haus, Garten, Küche Spielzeug Spielzeug
Computerspiele Computerspiele Software Software Küchengeräte Küchengeräte
DVDs - Filme DVDs - Filme Lebensmittel Lebensmittel Musik-CDs Musik-CDs
Buch, Hörbücher
Computer und Internet
PC- und Internetsicherheit

Hacking 10

Wireless Hacking Demystified: The Ultimate Penetration Testing Handbook - Nicolás Fernándezea

Wireless Hacking Demystified: The Ultimate Penetration Testing Handbook

Autor: Nicolás Fernándezea

Taschenbuch, 11.01.2024


Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques - Vinny Troia

Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques

Autor: Vinny Troia

Taschenbuch, 24.01.2020


Hacking und Bug Hunting: Wie man Softwarefehler aufspürt und damit Geld verdient -- ein Blick über die Schulter eines erfolgreichen Bug Hunters - Peter Yaworski Übersetzer: Peter Klicman

Hacking und Bug Hunting: Wie man Softwarefehler aufspürt und damit Geld verdient -- ein Blick über die Schulter eines erfolgreichen Bug Hunters

Autor: Peter Yaworski
Übersetzer: Peter Klicman

Taschenbuch, 06.08.2020


Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day - Ira Winkler

Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day

Autor: Ira Winkler

Gebundene Ausgabe, 12.04.2005


The Web Designer's Roadmap - Giovanni DiFeterici, Giovanni Di Feterici

The Web Designer's Roadmap

Autoren: Giovanni DiFeterici, Giovanni Di Feterici

Taschenbuch, 22.08.2012


The Pentester BluePrint: Starting a Career as an Ethical Hacker - Phillip L. Wylie, Kim Crawley

The Pentester BluePrint: Starting a Career as an Ethical Hacker

Autoren: Phillip L. Wylie, Kim Crawley

Taschenbuch, 06.11.2020


Exploiting Software: How to Break Code: How to Break Code - Greg Hoglund

Exploiting Software: How to Break Code: How to Break Code

Autor: Greg Hoglund

Taschenbuch, 17.02.2004


The Art of Deception: Controlling the Human Element of Security - Kevin D. Mitnick, William L. Simon

The Art of Deception: Controlling the Human Element of Security

Kevin D. Mitnick, William L. Simon

Gebundene Ausgabe


< I> The Art of Deception is about gaining someone's trust by lying to them and then abusing that trust for fun and profit. Hackers use the euphemism "social engineering" and hacker-guru Kevin Mitnick examines many example scenarios.

After Mitnick's first dozen examples anyone responsible for organizational security is going to lose the will to live. It's been said before, but people and security are antithetical. Organizations exist to provide a good or service and want helpful, friendly employees to promote the good or service. People are social animals who want to be liked. Controlling the human aspects of security means denying someone something. This circle can't be squared.

Considering Mitnick's reputation as a hacker guru, it's ironic that the last point of attack for hackers using social engineering are computers. Most of the scenarios in < I> The Art of Deception work just as well against computer-free organizations and were probably known to the Phoenicians; technology simply makes it all easier. Phones are faster than letters, after all, and having large organizations means dealing with lots of strangers.

Much of Mitnick's security advice sounds practical until you think about implementation, when you realize that more effective security means reducing organizational efficiency-an impossible trade in competitive business. And anyway, who wants to work in an organization where the rule is " Trust no one"? Mitnick shows how easily security is breached by trust, but without trust people can't live and work together. In the real world, effective organizations have to acknowledge that total security is a chimera-and carry more insurance. < I>-Steve Patient, amazon. co. uk


Hacking mit Python: Fehlersuche, Programmanalyse, Reverse Engineering - Justin Seitz

Hacking mit Python: Fehlersuche, Programmanalyse, Reverse Engineering

Justin Seitz

Taschenbuch


Android Hacker's Handbook - Joshua J. Drake

Android Hacker's Handbook

Joshua J. Drake

Taschenbuch


Digitale Diktatur: Totalüberwachung Datenmissbrauch Cyberkrieg - Thomas Ammann, Stefan Aust

Digitale Diktatur: Totalüberwachung Datenmissbrauch Cyberkrieg

Thomas Ammann, Stefan Aust

Gebundene Ausgabe


Cybersecurity and Cyberwar: What Everyone Needs To Know® - P.W. Singer

Cybersecurity and Cyberwar: What Everyone Needs To Know®

P.W. Singer

Taschenbuch


Network Hacking: Professionelle Angriffs- und Verteidigungstechniken gegen Hacker und Datendiebe | 5. Auflage des Bestsellers - Peter Kraft

Network Hacking: Professionelle Angriffs- und Verteidigungstechniken gegen Hacker und Datendiebe | 5. Auflage des Bestsellers

Peter Kraft

Taschenbuch


Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition - Mark Collier, David Endler

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

Mark Collier, David Endler

Taschenbuch


Basiswissen Sichere Software: Aus- und Weiterbildung zum ISSECO Certified Professional for Secure Software Engineering (ISQL-Reihe) - Sachar Paulus

Basiswissen Sichere Software: Aus- und Weiterbildung zum ISSECO Certified Professional for Secure Software Engineering (ISQL-Reihe)

Sachar Paulus

Gebundene Ausgabe


Dark Territory: The Secret History of Cyber War - Fred Kaplan

Dark Territory: The Secret History of Cyber War

Fred Kaplan

Gebundene Ausgabe


Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World - Marcus J. Carey, Jennifer Jin

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World

Marcus J. Carey, Jennifer Jin

Taschenbuch


Buch, Hörbücher, Kategorie Hacking, Weitere Seiten:
 1      2      3      4      5      6      7      8      9      10