Number of the records: 1  

Hacking the hacker

  1. Title statementHacking the hacker : learn from the experts who take down hackers / Roger A. Grimes.
    PublicationIndianapolis, IN : Wiley, 2017.
    Phys.des.1 online resource.
    ISBN9781119396260 (online : oBook)
    1119396263 (online : oBook)
    9781119396222 (online)
    1119396220 (online)
    NoteIncludes index.
    ContentsWhat Type of Hacker Are You? -- How Hackers Hack -- Profile -- Social Engineering -- Profile -- Software Vulnerabilities -- Profile -- Profile -- Malware -- Profile -- Profile -- Cryptography -- Profile -- Intrusion Detection/APTs -- Profile -- Profile -- Firewalls -- Profile -- Honeypots -- Profile -- Password Hacking -- Profile -- Wireless Hacking -- Profile -- Penetration Testing -- Profile -- Profile -- DDoS Attacks -- Profile -- Secure OS -- Profile -- Profile -- Network Attacks -- Profile -- IoT Hacking -- Profile -- Policy and Strategy -- Profile -- Threat Modeling -- Profile -- Computer Security Education -- Profile -- Privacy -- Profile -- Patching -- Profile -- Writing as a Career -- Profile -- Guide for Parents with Young Hackers -- Hacker Code of Ethics.
    Notes to AvailabilityPřístup pouze pro oprávněné uživatele
    Subj. Headings Hacking. * Computer security. * COMPUTERS / Security / General
    Form, Genre elektronické knihy electronic books
    CountryIndiana
    Languageangličtina
    Document kindElectronic books
    URLPlný text pro studenty a zaměstnance UPOL
    book

    book


    What Type of Hacker Are You? -- How Hackers Hack -- Profile -- Social Engineering -- Profile -- Software Vulnerabilities -- Profile -- Profile -- Malware -- Profile -- Profile -- Cryptography -- Profile -- Intrusion Detection/APTs -- Profile -- Profile -- Firewalls -- Profile -- Honeypots -- Profile -- Password Hacking -- Profile -- Wireless Hacking -- Profile -- Penetration Testing -- Profile -- Profile -- DDoS Attacks -- Profile -- Secure OS -- Profile -- Profile -- Network Attacks -- Profile -- IoT Hacking -- Profile -- Policy and Strategy -- Profile -- Threat Modeling -- Profile -- Computer Security Education -- Profile -- Privacy -- Profile -- Patching -- Profile -- Writing as a Career -- Profile -- Guide for Parents with Young Hackers -- Hacker Code of Ethics.

Number of the records: 1  

  This site uses cookies to make them easier to browse. Learn more about how we use cookies.