Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Boca Raton, Florida : CRC Press
    ISBN: 9781482252194 , 9781482252200
    Language: English
    Pages: 1 Online-Ressource (231 pages)
    DDC: 005.8/4
    Keywords: Android (Electronic resource) ; Smartphones Security measures ; Mobile computing Security measures ; Malware (Computer software) ; Operating systems (Computers) ; Electronic books
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Burlington, MA : Syngress/Elsevier
    ISBN: 9780080949192 , 0080949193 , 1282169335 , 9781282169333
    Language: English
    Pages: 1 online resource (xxv, 409 pages) , illustrations
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 005.8
    Keywords: COMPUTERS / Internet / Security ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer crimes ; Computer crimes / Prevention ; Hackers ; Cell phone systems Security measures ; Mobile communication systems Security measures ; Mobile computing Security measures ; Computer crimes Prevention ; Computer crimes Case studies ; Hackers ; Wireless Internet Security measures ; Fallstudiensammlung
    Abstract: Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices
    Note: Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    ISBN: 9781420069068
    Language: English
    Pages: 1 online resource (168 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods
    Note: Online resource; Title from title page (viewed August 6, 2008) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781801818650 , 1801818657 , 9781801810081
    Language: English
    Pages: 1 online resource (464 p.)
    Edition: 1st edition.
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Hackers
    Abstract: Detect and mitigate diverse cyber threats with actionable insights into attacker types, techniques, and efficient cyber threat hunting Key Features Explore essential tools and techniques to ethically penetrate and safeguard digital environments Set up a malware lab and learn how to detect malicious code running on the network Understand different attacker types, their profiles, and mindset, to enhance your cyber defense plan Purchase of the print or Kindle book includes a free PDF eBook Book Description If you're an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. Hands-On Ethical Hacking Tactics is a comprehensive guide that will take you from fundamental to advanced levels of ethical hacking, offering insights into both offensive and defensive techniques. Written by a seasoned professional with 20+ years of experience, this book covers attack tools, methodologies, and procedures, helping you enhance your skills in securing and defending networks. The book starts with foundational concepts such as footprinting, reconnaissance, scanning, enumeration, vulnerability assessment, and threat modeling. Next, you'll progress to using specific tools and procedures for hacking Windows, Unix, web servers, applications, and databases. The book also gets you up to speed with malware analysis. Throughout the book, you'll experience a smooth transition from theoretical concepts to hands-on techniques using various platforms. Finally, you'll explore incident response, threat hunting, social engineering, IoT hacking, and cloud exploitation, which will help you address the complex aspects of ethical hacking. By the end of this book, you'll have gained the skills you need to navigate the ever-changing world of cybersecurity. What you will learn Understand the core concepts and principles of ethical hacking Gain hands-on experience through dedicated labs Explore how attackers leverage computer systems in the digital landscape Discover essential defensive technologies to detect and mitigate cyber threats Master the use of scanning and enumeration tools Understand how to hunt and use search information to identify attacks Who this book is for Hands-On Ethical Hacking Tactics is for penetration testers, ethical hackers, and cybersecurity enthusiasts looking to explore attack tools, methodologies, and procedures relevant to today's cybersecurity landscape. This ethical hacking book is suitable for a broad audience with varying levels of expertise in cybersecurity, whether you're a student or a professional looking for job opportunities, or just someone curious about the field.
    Note: Description based upon print version of record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...