 |
|
|
 Applied Network Security
Master the art of detecting and averting advanced network security attacks and techniques
About This Book
-
Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
-
Become an expert in cracking WiFi...
|  |  |  |  Steal This Computer Book 3: What They Won't Tell You About the InternetThis offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.
WARNING: This book is not to be used for hacking into government computers, shutting... |
|
 Nokia Smartphone HacksNokia's smartphones pack a powerful computer into a very small space. Unlike your desktop or laptop, your smallest computer can be connected to the Internet all the time, and can interact with the world around it through its camera, voice recognition, and its traditional phone keypad. Nokia smartphones combine these features with impressive storage... |  |  Sniffer Pro Network Optimization and Troubleshooting HandbookImagine it is 4:00 P.M. and you are sitting at your desk with three books spread across your lap.You are hard at work trying to figure out why performance on your company’s file server has dropped sharply over the past eight hours. Of the 200 users in your company, nearly 100 of them have called to complain about slow... |  |  |
|
 Hack Proofing Your Network: Internet TradecraftThis is a book about hacking. It’s not a novel about a set of elusive cyberpunks, it’s a do-it-yourself manual. Are we trying to tell you how to break into other people’s systems? No, we’re trying to help you make your own systems more secure by breaking into them yourself. Yes, this has the side effect that you might learn... |  |  Hacking Firefox: More Than 150 Hacks, Mods, and CustomizationsThey dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways... |  |  Linux (Hacking Exposed)From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...
Learn how to think like a hacker in order to secure your Linux network
In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software... |
|
Result Page: 5 4 3 2 1 |