• Домой
  • телефоны
  • смартфоны
  • планшеты
  • ноутбуки

christopher hadnagy social engineering the art of human hacking в наличии / купить интернет-магазине

Новинки
  • неттоп asus vivomini un45h dm013z intel celeron n3150 2gb 500gb intel hd graphics windows 10 home синий 90ms00r2 m02000
  • с 17 stl стандартная библиотека шаблонов
  • смартфон apple iphone se 32gb mp852ru a розовое золото
  • аксессуар браслет apple watch 42mm apres m l lavender
  • kiccy kr999 gsm bar phone w 2 0 lcd screen dual sim quad band bluetooth and fm black
  • datakam g5 real pro bf
  • люк с сост photoshop elements и обработка фотографий
  • visual c 编程之道
  • linux format 3 221 март 2017 dvd
  • левин а ш работа на ноутбуке самоучитель левина в цвете
  • глушаков с в цифровое фото секреты обработки на пк
Christopher  Hadnagy Social Engineering. The Art of Human Hacking christopher hadnagy social engineering the art of human hacking Christopher Hadnagy Social Engineering. The Art of Human Hacking
2139.48 RUR
Похожие товары

The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. Examines social engineering, the science of influencing a target to perform a desired task or divulge information Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access Reveals vital steps for preventing social engineering threats Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.

Christopher  Hadnagy Unmasking the Social Engineer. The Human Element of Security christopher hadnagy social engineering the art of human hacking Christopher Hadnagy Unmasking the Social Engineer. The Human Element of Security
2139.48 RUR
Похожие товары

Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming. Clearly combines both the practical and technical aspects of social engineering security Reveals the various dirty tricks that scammers use Pinpoints what to look for on the nonverbal side to detect the social engineer Sharing proven scientific methodology for reading, understanding, and deciphering non-verbal communications, Unmasking the Social Engineer arms readers with the knowledge needed to help protect their organizations.

Christopher  Hadnagy Phishing Dark Waters. The Offensive and Defensive Sides of Malicious Emails christopher hadnagy social engineering the art of human hacking Christopher Hadnagy Phishing Dark Waters. The Offensive and Defensive Sides of Malicious Emails
2140.09 RUR
Похожие товары

An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensible guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe.

Wade  Alcorn The Browser Hacker's Handbook christopher hadnagy social engineering the art of human hacking Wade Alcorn The Browser Hacker's Handbook
3363 RUR
Похожие товары

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer «program» in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy ARP spoofing, social engineering, and phishing to access browsers DNS tunneling, attacking web applications, and proxying—all from the browser Exploiting the browser and its ecosystem (plugins and extensions) Cross-origin attacks, including Inter-protocol Communication and Exploitation The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.

Kevin D. Mitnick The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers christopher hadnagy social engineering the art of human hacking Kevin D. Mitnick The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
1036.41 RUR
Похожие товары

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use «social engineering» to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A «Robin Hood» hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting «you are there» descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Kevin  Beaver Hacking For Dummies christopher hadnagy social engineering the art of human hacking Kevin Beaver Hacking For Dummies
1833.75 RUR
Похожие товары

Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks. Additionally, you have access to free testing tools and an appendix detailing valuable tools and resources. Ethical hacking entails thinking like the bad guys to identify any vulnerabilities that they might find in your system—and fixing them before they do. Also called penetration testing, ethical hacking is essential to keeping your system, and all of its data, secure. Understanding how to perform effective ethical hacking can improve the safety of your network. Defend your system—and all of the data it holds—against the latest Windows 10 and Linux hacks Develop an effective ethical hacking plan that keeps your system safe Protect your web applications, databases, laptops, and smartphones by going beyond simple hacking strategies Leverage the latest testing tools and techniques when using ethical hacking to keep your system secure Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your own system to protect it—and it will become your go-to reference when ethical hacking is on your to-do list.

David  Litchfield The Oracle Hacker's Handbook. Hacking and Defending Oracle christopher hadnagy social engineering the art of human hacking David Litchfield The Oracle Hacker's Handbook. Hacking and Defending Oracle
2750.93 RUR
Похожие товары

David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle and then it shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.

Avinash  Kaushik Web Analytics 2.0. The Art of Online Accountability and Science of Customer Centricity christopher hadnagy social engineering the art of human hacking Avinash Kaushik Web Analytics 2.0. The Art of Online Accountability and Science of Customer Centricity
2445.2 RUR
Похожие товары

Adeptly address today’s business challenges with this powerful new book from web analytics thought leader Avinash Kaushik. Web Analytics 2.0 presents a new framework that will permanently change how you think about analytics. It provides specific recommendations for creating an actionable strategy, applying analytical techniques correctly, solving challenges such as measuring social media and multichannel campaigns, achieving optimal success by leveraging experimentation, and employing tactics for truly listening to your customers. The book will help your organization become more data driven while you become a super analysis ninja! Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Roger A. Grimes Hacking the Hacker christopher hadnagy social engineering the art of human hacking Roger A. Grimes Hacking the Hacker
1528.64 RUR
Похожие товары

John  Chirillo Hack Attacks Revealed. A Complete Reference with Custom Security Hacking Toolkit christopher hadnagy social engineering the art of human hacking John Chirillo Hack Attacks Revealed. A Complete Reference with Custom Security Hacking Toolkit
3668.11 RUR
Похожие товары

The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in order to evaluate their security policies and conduct security audits. He gets inside every detail of the hacker's world, including how hackers exploit security holes in private and public networks and how network hacking tools work. As a huge value-add, the author is including the first release of a powerful software hack attack tool that can be configured to meet individual customer needs.

Indra  Gunawan Fundamentals of Reliability Engineering. Applications in Multistage Interconnection Networks christopher hadnagy social engineering the art of human hacking Indra Gunawan Fundamentals of Reliability Engineering. Applications in Multistage Interconnection Networks
9416.39 RUR
Похожие товары

This book presents fundamentals of reliability engineering with its applications in evaluating reliability of multistage interconnection networks. In the first part of the book, it introduces the concept of reliability engineering, elements of probability theory, probability distributions, availability and data analysis. The second part of the book provides an overview of parallel/distributed computing, network design considerations, and more. The book covers a comprehensive reliability engineering methods and its practical aspects in the interconnection network systems. Students, engineers, researchers, managers will find this book as a valuable reference source.

Eldad  Eilam Reversing. Secrets of Reverse Engineering christopher hadnagy social engineering the art of human hacking Eldad Eilam Reversing. Secrets of Reverse Engineering
2445.82 RUR
Похожие товары

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into «disassembly»-code-level reverse engineering-and explaining how to decipher assembly language

Christopher Negus Ubuntu Linux Toolbox: 1000+ Commands for Power Users christopher hadnagy social engineering the art of human hacking Christopher Negus Ubuntu Linux Toolbox: 1000+ Commands for Power Users
1833.75 RUR
Похожие товары

This updated bestseller from Linux guru Chris Negus is packed with an array of new and revised material As a longstanding bestseller, Ubuntu Linux Toolbox has taught you how to get the most out Ubuntu, the world's most popular Linux distribution. With this anticipated new edition, Christopher Negus returns with a host of new and expanded coverage on tools for managing file systems, ways to connect to networks, techniques for securing Ubuntu systems, and a look at the latest Long Term Support (LTS) release of Ubuntu, all aimed at getting you up and running with Ubuntu Linux quickly. Covers installation, configuration, shell primer, the desktop, administrations, servers, and security Delves into coverage of popular applications for the web, productivity suites, and e-mail Highlights setting up a server (Apache, Samba, CUPS) Boasts a handy trim size so that you can take it with you on the go Ubuntu Linux Toolbox, Second Edition prepares you with a host of updated tools for today's environment, as well as expanded coverage on everything you know to confidently start using Ubuntu today.

Bruce  Schneier Cryptography Engineering. Design Principles and Practical Applications christopher hadnagy social engineering the art of human hacking Bruce Schneier Cryptography Engineering. Design Principles and Practical Applications
3363 RUR
Похожие товары

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field. After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography. An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

Jason  Tyler XDA Developers' Android Hacker's Toolkit. The Complete Guide to Rooting, ROMs and Theming christopher hadnagy social engineering the art of human hacking Jason Tyler XDA Developers' Android Hacker's Toolkit. The Complete Guide to Rooting, ROMs and Theming
2139.48 RUR
Похожие товары

Make your Android device truly your own Are you eager to make your Android device your own but you're not sure where to start? Then this is the book for you. XDA is the world's most popular resource for Android hacking enthusiasts, and a huge community has grown around customizing Android devices with XDA. XDA's Android Hacker's Toolkit gives you the tools you need to customize your devices by hacking or rooting the android operating system. Providing a solid understanding of the internal workings of the Android operating system, this book walks you through the terminology and functions of the android operating system from the major nodes of the file system to basic OS operations. As you learn the fundamentals of Android hacking that can be used regardless of any new releases, you'll discover exciting ways to take complete control over your device. Teaches theory, preparation and practice, and understanding of the OS Explains the distinction between ROMing and theming Provides step-by-step instructions for Droid, Xoom, Galaxy Tab, LG Optimus, and more Identifies the right tools for various jobs Contains new models enabling you to root and customize your phone Offers incomparable information that has been tried and tested by the amazing XDA community of hackers, gadgeteers, and technicians XDA's Android Hacker's Toolkit is a simple, one-stop resource on hacking techniques for beginners.

Dave  Evans Social Media Marketing. An Hour a Day christopher hadnagy social engineering the art of human hacking Dave Evans Social Media Marketing. An Hour a Day
1833.75 RUR
Похожие товары

Updated with 100 pages of new content, this edition is better than ever In the newest edition of his top-selling book, social media expert Dave Evans bypasses theory to provide you with practical, hands-on advice on developing, implementing, and measuring social media marketing campaigns. In what can be an overwhelming topic, he demystifies the jargon, dispels the myths, and helps you develop an effective, day-by-day plan. Revised and updated with more than 100 pages of new material on all the latest developments, Evans includes new and updated coverage on Facebook, Twitter, and Google+; the latest on listening and analytics platforms; how to incorporate mobile and location-based services like Foursquare and Gowalla into your plan; and more. Helps marketers, advertisers, and small business owners quickly develop effective, practical approaches to social media marketing campaigns Highlights the latest you should know about Facebook, Twitter, and Google+; as well as mobile- and location-based services such as Foursquare and Gowalla Shows you how to track and measure results and integrate that information into your overall marketing plan Features case studies, step-by-step instructions, and hands-on tutorials If you've been seeking ways to break down social media marketing into tasks you can handle and campaigns that deliver, this is the book you need.

Страницы: 1 2 3 4 5 6 7 8 9 10
Случайные товары
Смартфон Apple iPhone SE 32Gb Silver christopher hadnagy social engineering the art of human hacking Смартфон Apple iPhone SE 32Gb Silver
23357 RUR
Ноутбук Apple MacBook Pro 13 (MNQG2RU/A) (MNQG2RU/A) christopher hadnagy social engineering the art of human hacking Ноутбук Apple MacBook Pro 13 (MNQG2RU/A) (MNQG2RU/A)
139366 RUR
Настольный компьютер APPLE Mac Mini MGEM2RU/A (Intel Core i5 1.4 GHz/4096Mb/500Gb/NO ODD/Intel HD Graphics 5000/Wi-Fi/Bluetooth/Mac OS X) christopher hadnagy social engineering the art of human hacking Настольный компьютер APPLE Mac Mini MGEM2RU/A (Intel Core i5 1.4 GHz/4096Mb/500Gb/NO ODD/Intel HD Graphics 5000/Wi-Fi/Bluetooth/Mac OS X)
29789 RUR
Похожие товары

Магазин

~