×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity

(ebook) (audiobook) (audiobook) Książka w języku angielskim
Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling - okladka książki

Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling - okladka książki

Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling - audiobook MP3

Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling - audiobook CD

Autorzy:
Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
1144
Dostępne formaty:
     PDF
     ePub
This book provides a comprehensive guide to cybersecurity, covering hacking techniques, tools, and defenses. It begins by introducing key concepts, distinguishing penetration testing from hacking, and explaining hacking tools and procedures. Early chapters focus on security fundamentals, such as attack vectors, intrusion detection, and forensic methods to secure IT systems.

As the book progresses, readers explore topics like exploits, authentication, and the challenges of IPv6 security. It also examines the legal aspects of hacking, detailing laws on unauthorized access and negligent IT security. Readers are guided through installing and using Kali Linux for penetration testing, with practical examples of network scanning and exploiting vulnerabilities.

Later sections cover a range of essential hacking tools, including Metasploit, OpenVAS, and Wireshark, with step-by-step instructions. The book also explores offline hacking methods, such as bypassing protections and resetting passwords, along with IT forensics techniques for analyzing digital traces and live data. Practical application is emphasized throughout, equipping readers with the skills needed to address real-world cybersecurity threats.

Wybrane bestsellery

O autorach książki

Michael Kofler is one of the most renowned IT authors in the German-speaking world. He is also an administrator and software developer. Michael teaches at FH Joanneum University in Kapfenberg. He designed this book and wrote seven chapters on basic topics as well as topics related to Linux.
Klaus Gebeshuber is a professor of IT security at FH Joanneum University in Kapfenberg, Austria. He focuses on network security, industrial security, security analysis, and penetration testing. Klaus holds numerous industry certifications in IT security and penetration testing. In this book, he covers the topics of exploits, security in wireless networks (WLAN/Bluetooth), security in web applications, bug bounty programs, and dealing with passwords in five chapters.
Peter Kloep is an outstanding expert for secure Windows infrastructures in Germanspeaking countries. Peter has been a Microsoft Certified Trainer since 2002 and has conducted numerous technical trainings on Windows administration. In this book, he explains how you can securely configure Windows Server and Active Directory installations.
Frank Neugebauer looks back on many years of service as an officer in the German Armed Forces. There he worked in the field of IT security for more than 25 years, serving as an IT security officer, systems engineer at NATO headquarters, and leader of an incident response team, among other positions. As a member of the Computer Emergency Response Team, he participated in vulnerability assessments on many Armed Forces networks. Most recently, he served as an incident handler at the Armed Forces Cyber Security Center. Frank currently works as a consultant and external contractor. For this book, he wrote a chapter on the “Attack Vector USB Interface” as well as sections in other chapters on “Empire”, “Koadic” and “Pwnagotchi.”
Thomas Hackner is the managing director of HACKNER Security Intelligence GmbH, a company he founded in 2010 after completing his studies in secure information systems in Hagenberg, Upper Austria. Thomas is a regular contributor to international red-teaming projects and penetration testing, where IT networks and web applications as well as SCADA systems are tested for security. In this book, he describes the objectives and execution of penetration testing in two chapters.
Markus Widl has been working as a consultant, developer, and trainer in IT for about 20 years. His focus is on cloud technologies such as Microsoft 365 and Azure. He has gained a high reputation through his expert workshops, conference presentations, and authoring activities. In this book, he demonstrates how you can avoid security issues when using Microsoft's cloud products.
Roland Aigner is an expert in secure IoT infra-structures. He has developed firmware and software for medical in vitro diagnostics, is a member of the Bluetooth SIG and a coauthor of its standards, and is a founding member of the NFC Forum, where he focused specifically on ticketing and communications security. He works as a lead software architect in the secure communications sector and is a consultant for IoT, RFID, and NFC projects. Roland contributed the IoT chapter to the book.
Stefan Kania has been working as a consultant and trainer since 1997. His focus is on the secure implementation of Samba, LDAP, and Kerberos as well as training on the topics. Stefan is the author of the Samba manual and conducts training and consulting projects. In this book, he demonstrates how you can securely integrate Samba servers into Windows networks.
Tobias Scheible is a security researcher and lecturer for cyber security and IT forensics and has been working at Albstadt-Sigmaringen University for more than 10 years. There he is active at the Institut für Wissenschaftliche Weiterbildung (IWW) in the in-service certificate program and teaches in special online modules. He also gives lectures and conducts workshops. Tobias authored the book Hardware & Security, also published by Rheinwerk Verlag. In this book, he wrote the chapter on IT forensics.

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
170,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.