Hacking and Security - Kofler, Michael
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre44,36 €
Occasion · Très Bon État
Ou 11,09 € /mois
- Livraison GRATUITE
- Livré entre le 26 et le 29 mai
Livré gratuitement chez vous en 2 semaines. Article presque inutilisé, absence presque totale de traces d'utilisation. 2 millions de ventes réalisées en 5 ans, merci de votre confiance ! Découvrez les avis...
Nos autres offres
-
86,26 €
Produit Neuf
Ou 21,57 € /mois
- Livraison : 3,99 €
- Livré entre le 28 mai et le 1 juin
Voir le détail de l'annonce -
92,81 €
Produit Neuf
Ou 23,20 € /mois
- Livraison à 0,01 €
- Livré entre le 28 mai et le 6 juin
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781493224258_dbm
Voir le détail de l'annonce
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Hacking And Security Format Broché - Livre Informatique
0 avis sur Hacking And Security Format Broché - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Rome
1 avis
Neuf dès 55,00 €
-
Mathieu Lehanneur
Occasion dès 33,16 €
-
Vitalogy; Or, Encyclopedia Of Health And Home
Neuf dès 52,06 €
-
Shrinking Cities : International Research
Occasion dès 30,00 €
-
Citizen Marx
Neuf dès 49,44 €
-
El Monte
Neuf dès 45,26 €
-
Frank Cho Women: Selected Drawings And Illustrations
Occasion dès 29,90 €
-
Gedichte
Neuf dès 46,66 €
-
Los Negros Brujos
Neuf dès 39,83 €
-
International Commercial Agreements: A Functional Primer On Drafting, Negotiating And Resolving Disputes, Third Edition
Neuf dès 52,99 €
Occasion dès 96,99 €
-
How To Write Songs On Keyboards
1 avis
Neuf dès 35,68 €
-
100 Dives Of A Lifetime
Neuf dès 38,98 €
Occasion dès 25,18 €
-
Vocal Workouts For The Contemporary Singer Vocal Training Book With Online Audio By Anne Peckham Singing Lessons For Beginners To Advanced Singers Vocal Exercise Guide For Range And Performance
Neuf dès 28,61 €
-
America, América
Neuf dès 32,24 €
Occasion dès 50,12 €
-
Historia De España En La Edad Moderna
Occasion dès 25,00 €
-
Receptive Music Therapy In Palliative Care
Neuf dès 27,45 €
-
Chantournage - Compilation Des Volumes 1 À 6: Intégral De La Collection Avec + De 400 Modèles Et Créations Pour Exercer Votre Talent. Version Numérique Incluse. (Modèles De Chantournage)
Occasion dès 27,27 €
-
Kripalu Yoga
Neuf dès 27,42 €
-
Baal
Neuf dès 23,88 €
-
Superpack Perfectionnement Anglais - 1 Livre + 4 Cd Audio + 1 Clé Usb
3 avis
Occasion dès 25,49 €
Produits similaires
Présentation Hacking And Security Format Broché
- Livre Informatique
Résumé :
? ... Preface ... 33
? ... What Hacking Has to Do with Security ... 33
? ... About this Book ... 34
? ... What's New in the Third Edition ... 35
? ... Target Group ... 35
? ... Let's Go! ... 35
? ... Foreword by Klaus Gebeshuber ... 36
? ... Foreword by Stefan Kania ... 36
? ... Greeting ... 36
? Introduction ... 39
? 1.1 ... Hacking ... 39
? 1.2 ... Security ... 47
? 1.3 ... Exploits ... 58
? 1.4 ... Authentication and Passwords ... 65
? 1.5 ... Security Risk IPv6 ... 70
? 1.6 ... Legal Framework ... 72
? 1.7 ... Security Organizations and Government Institutions ... 75
? 2 ... Kali Linux ... 77
? 2.1 ... Kali Alternatives ... 77
? 2.2 ... Trying Out Kali Linux without Installation ... 78
? 2.3 ... Installing Kali Linux in VirtualBox ... 84
? 2.4 ... Kali Linux and Hyper-V ... 91
? 2.5 ... Kali Linux in the Windows Subsystem for Linux ... 93
? 2.6 ... Kali Linux on Raspberry Pi ... 96
? 2.7 ... Running Kali Linux on Apple PCs with ARM CPUs ... 97
? 2.8 ... Simple Application Examples ... 99
? 2.9 ... Internal Details of Kali ... 103
? 3 ... Setting Up the Learning Environment: Metasploitable, Juice Shop ... 109
? 3.1 ... Honeypots ... 110
? 3.2 ... Metasploitable 2 ... 110
? 3.3 ... Metasploitable 3 (Ubuntu Variant) ... 116
? 3.4 ... Metasploitable 3 (Windows Variant) ... 123
? 3.5 ... Juice Shop ... 133
? 4 ... Hacking Tools ... 137
? 4.1 ... nmap ... 138
? 4.2 ... hydra ... 142
? 4.3 ... sslyze, sslscan, and testssl ... 148
? 4.4 ... whois, host, and dig ... 151
? 4.5 ... Wireshark ... 154
? 4.6 ... tcpdump ... 159
? 4.7 ... Netcat (nc) ... 163
? 4.8 ... OpenVAS ... 166
? 4.9 ... Metasploit Framework ... 176
? 4.10 ... Empire Framework ... 187
? 4.11 ... The Koadic Postexploitation Framework ... 197
? 4.12 ... Social Engineer Toolkit ... 205
? 4.13 ... Burp Suite ... 212
? 4.14 ... Sliver ... 219
? 5 ... Offline Hacking ... 227
? 5.1 ... BIOS/EFI: Basic Principles ... 228
? 5.2 ... Accessing External Systems ... 230
? 5.3 ... Accessing External Hard Drives or SSDs ... 236
? 5.4 ... Resetting the Windows Password ... 237
? 5.5 ... Resetting Linux and macOS Passwords ... 244
? 5.6 ... Encrypting Hard Drives ... 246
? 6 ... Passwords ... 255
? 6.1 ... Hash Procedures ... 256
? 6.2 ... Brute-Force Password Cracking ... 259
? 6.3 ... Rainbow Tables ... 260
? 6.4 ... Dictionary Attacks ... 262
? 6.5 ... Password Tools ... 263
? 6.6 ... Default Passwords ... 271
? 6.7 ... Data Breaches ... 272
? 6.8 ... Multifactor Authentication ... 275
? 6.9 ... Implementing Secure Password Handling ... 276
? IT Forensics ... 279
? 7.1 ... Methodical Analysis of Incidents ... 281
? 7.2 ... Postmortem Investigation ... 284
? 7.3 ... Live Analysis ... 300
? 7.4 ... Forensic Readiness ... 303
? 7.5 ... Summary ... 305
? 8 ... Wi-Fi, Bluetooth, and SDR ... 307
? 8.1 ... 802.11x Systems: Wi-Fi ... 307
? 8.2 ... Collecting WPA-2 Handshakes with Pwnagotchi ... 325
? 8.3 ... Bluetooth ... 332
? 8.4 ... Software-Defined Radios ... 349
? 9 ... Attac...
Sommaire:
? ... Preface ... 33
? ... What Hacking Has to Do with Security ... 33
? ... About this Book ... 34
? ... What's New in the Third Edition ... 35
? ... Target Group ... 35
? ... Let's Go! ... 35
? ... Foreword by Klaus Gebeshuber ... 36
? ... Foreword by Stefan Kania ... 36
? ... Greeting ... 36
? Introduction ... 39
? 1.1 ... Hacking ... 39
? 1.2 ... Security ... 47
? 1.3 ... Exploits ... 58
? 1.4 ... Authentication and Passwords ... 65
? 1.5 ... Security Risk IPv6 ... 70
? 1.6 ... Legal Framework ... 72
? 1.7 ... Security Organizations and Government Institutions ... 75
? 2 ... Kali Linux ... 77
? 2.1 ... Kali Alternatives ... 77
? 2.2 ... Trying Out Kali Linux without Installation ... 78
? 2.3 ... Installing Kali Linux in VirtualBox ... 84
? 2.4 ... Kali Linux and Hyper-V ... 91
? 2.5 ... Kali Linux in the Windows Subsystem for Linux ... 93
? 2.6 ... Kali Linux on Raspberry Pi ... 96
? 2.7 ... Running Kali Linux on Apple PCs with ARM CPUs ... 97
? 2.8 ... Simple Application Examples ... 99
? 2.9 ... Internal Details of Kali ... 103
? 3 ... Setting Up the Learning Environment: Metasploitable, Juice Shop ... 109
? 3.1 ... Honeypots ... 110
? 3.2 ... Metasploitable 2 ... 110
? 3.3 ... Metasploitable 3 (Ubuntu Variant) ... 116
? 3.4 ... Metasploitable 3 (Windows Variant) ... 123
? 3.5 ... Juice Shop ... 133
? 4 ... Hacking Tools ... 137
? 4.1 ... nmap ... 138
? 4.2 ... hydra ... 142
? 4.3 ... sslyze, sslscan, and testssl ... 148
? 4.4 ... whois, host, and dig ... 151
? 4.5 ... Wireshark ... 154
? 4.6 ... tcpdump ... 159
? 4.7 ... Netcat (nc) ... 163
? 4.8 ... OpenVAS ... 166
? 4.9 ... Metasploit Framework ... 176
? 4.10 ... Empire Framework ... 187
? 4.11 ... The Koadic Postexploitation Framework ... 197
? 4.12 ... Social Engineer Toolkit ... 205
? 4.13 ... Burp Suite ... 212
? 4.14 ... Sliver ... 219
? 5 ... Offline Hacking ... 227
? 5.1 ... BIOS/EFI: Basic Principles ... 228
? 5.2 ... Accessing External Systems ... 230
? 5.3 ... Accessing External Hard Drives or SSDs ... 236
? 5.4 ... Resetting the Windows Password ... 237
? 5.5 ... Resetting Linux and macOS Passwords ... 244
? 5.6 ... Encrypting Hard Drives ... 246
? 6 ... Passwords ... 255
? 6.1 ... Hash Procedures ... 256
? 6.2 ... Brute-Force Password Cracking ... 259
? 6.3 ... Rainbow Tables ... 260
? 6.4 ... Dictionary Attacks ... 262
? 6.5 ... Password Tools ... 263
? 6.6 ... Default Passwords ... 271
? 6.7 ... Data Breaches ... 272
? 6.8 ... Multifactor Authentication ... 275
? 6.9 ... Implementing Secure Password Handling ... 276
? IT Forensics ... 279
? 7.1 ... Methodical Analysis of Incidents ... 281
? 7.2 ... Postmortem Investigation ... 284
? 7.3 ... Live Analysis ... 300
? 7.4 ... Forensic Readiness ... 303
? 7.5 ... Summary ... 305
? 8 ... Wi-Fi, Bluetooth, and SDR ... 307
? 8.1 ... 802.11x Systems: Wi-Fi ... 307
? 8.2 ... Collecting WPA-2 Handshakes with Pwnagotchi ... 325
? 8.3 ... Bluetooth ... 332
? 8.4 ... Software-Defined Radios ... 349
? 9 ... Attack Vector USB Interface ... 359
? 9.1 ... USB Rubber Ducky ... 3...
Détails de conformité du produit
Personne responsable dans l'UE