Поиск книг по лучшей цене!

Актуальная информация о наличии книг в крупных интернет-магазинах и сравнение цен.


  • Joshua J. Drake, Pau Oliva Fora, Zach Lanier, Collin Mulliner, Stephen A. Ridley, Georg Wicherski. Android Hacker's Handbook
    Android Hacker's Handbook
    Joshua J. Drake, Pau Oliva Fora, Zach Lanier, Collin Mulliner, Stephen A. Ridley, Georg Wicherski
    As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world?s foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis. Covers Android application building...
  • ZETTER, KIM. COUNTDOWN TO ZERO DAY
    COUNTDOWN TO ZERO DAY
    ZETTER, KIM
    In January 2010, inspectors with the International Atomic Energy Agency began to notice that Iran's nuclear centrifuges were failing at an alarming rate. What was causing them to do so was a total mystery--apparently as much to the Iranian technicians as to the UN inspectors observing them. Then, in June 2010, a seemingly unrelated event occurred. A computer-security firm in Belarus was called in to investigate a computer in Iran that was caught in a reboot loop. At first, analysts assumed it was infected with a simple, routine piece of malware, but as they delved into its code they discovered a virus of unparalleled complexity and mysterious intent. Before long, experts around the world were beginning to understand that they had stumbled upon the world's first digital weapon. Stuxnet, as it came to be known, was a digital missile unlike any other virus or worm that had ever been built. Rather than simply stealing information from or damaging the computers it infected, it managed to...
  • MacDonnell Ulsch. Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks
    Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks
    MacDonnell Ulsch
    Praise for Cyber Threat! How to Manage the Growing Risk of Cyber Attacks Don Ulsch is one of those rare cyber security experts who understands not only the technical issues involved in dealing with all manner of cyber threats and risks, but he also ha
  • Robert Moore. Cybercrime
    Cybercrime
    Robert Moore
    Cybercrime
  • Eoghan Casey. Digital Evidence and Computer Crime
    Digital Evidence and Computer Crime
    Eoghan Casey
    Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism. Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked, collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime. This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical...
  • Johnny Long. Google Hacking for Penetration Testers, Volume 2
    Google Hacking for Penetration Testers, Volume 2
    Johnny Long
    A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because I've seen it with my own eyes. I am constantly amazed at what the Google hacking community comes up with. It turns out the rumors are true-creative Google searches can reveal medical, financial, proprietary and even classified information. Despite government edicts, regulation and protection acts like HIPPA and the constant barking of security watchdogs, this problem still persists. Stuff still makes it out onto the web, and Google hackers snatch it right up. Protect yourself from Google hackers with this new volume of information.
  • Andrew Johnston. Hacker's Guide to Project Management, Second Edition (COMPUTER WEEKLY PROFESSIONAL) (Computer Weekly Professional)
    Hacker's Guide to Project Management, Second Edition (COMPUTER WEEKLY PROFESSIONAL) (Computer Weekly Professional)
    Andrew Johnston
    Book DescriptionManaging a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just startand end with designing and building the system. Once you've specified, designed and built (or bought) the system it still needs to be properly tested, documented and settled into the live environment. This can seem like a maze to the inexperienced project manager, or even to the experienced project manager unused to a particular environment. A Hacker's Guide to Project Management acts as a guide through this maze. It's aimed specifically at those managing a project or leading a team for thefirst time, but it will also help more experienced managers who are either new to software development, or dealing with a new part of the software life-cycle. This book: describes the process of software development, how...
  • Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg. InfoSecurity 2008 Threat Analysis
    InfoSecurity 2008 Threat Analysis
    Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg
    An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
  • Kevin Poulsen. Kingpin
    Kingpin
    Kevin Poulsen
    Kingpin
  • М. Фленов. Linux глазами хакера
    Linux глазами хакера
    М. Фленов
    Рассмотрены вопросы настройки ОС Linux на максимальную производительность и безопасность. Описано базовое администрирование и управление доступом, настройка Firewall, файлообменный сервер, WEB-, FTP- и Proxy-сервера, программы для доставки электронной почты, службы DNS, а также политика мониторинга системы и архивирование данных. Приведены потенциальные уязвимости, даны рекомендации по предотвращению возможных атак и показано, как действовать при атаке или взломе системы, чтобы максимально быстро восстановить ее работоспособность и предотвратить потерю данных. Операционная система Linux динамична и меняется постоянно, поэтому в четвертом издании некоторые главы полностью переписаны или дополнены новой информацией. На сайте издательства размещены дополнительная документация и программы в исходных кодах.
  • Georgia Weidman. Penetration Testing: A Hands-On Introduction to Hacking
    Penetration Testing: A Hands-On Introduction to Hacking
    Georgia Weidman
    Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment - including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. Learn how to: Crack passwords and wireless network keys with brute-forcing and wordlists Test web applications for vulnerabilities Use the Metasploit Framework to launch...
  • Михаил Фленов. PHP глазами хакера
    PHP глазами хакера
    Михаил Фленов
    Рассмотрены вопросы безопасности и оптимизации сценариев на языке PHP. Большое внимание уделено описанию типичных ошибок программистов, благодаря которым хакеры проникают на сервер, а также представлены методы и приведены практические рекомендации противостояния внешним атакам. Показаны реальные примеры взлома Web-сайтов и рекомендации, которые помогут создавать более защищенные сайты. В 3-м издании обновлена практически каждая глава в соответствии с современными реалиями безопасности.
  • Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse. Practical Reverse Engineering
    Practical Reverse Engineering
    Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse
    Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples; Covers x86, x64, and...
  • Bruce Dang, Alexandre Gazet, Elias Bachaalany. Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
    Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
    Bruce Dang, Alexandre Gazet, Elias Bachaalany
    Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on...
  • Холмогоров В.. Pro Вирусы
    Pro Вирусы
    Холмогоров В.
    Книга рассказывает об истории возникновения и развития технологий компьютерных вирусов, их разновидностях, внутренней архитектуре, способах распространения и принципах действия.
  • Dafydd Stuttard, Marcus Pinto. The Web Application: Hacker's Handbook
    The Web Application: Hacker's Handbook
    Dafydd Stuttard, Marcus Pinto
    Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This book shows you how they do it. This fully updated edition contains the very latest attack techniques and countermeasures, showing you how to break into today's complex and highly functional applications. Roll up your sleeves and dig in. Discover how cloud architectures and social networking have added exploitable attack surfaces to applications Leverage the latest HTML features to deliver powerful cross-site scripting attacks Deliver new injection exploits, including XML external entity and HTTP parameter pollution attacks Learn how to break encrypted session tokens and other sensitive data found in cloud services Discover how technologies like HTML5, REST, CSS and JSON can be exploited to attack...
  • Jonathan Littman. The Watchman : The Twisted Life and Crimes of Serial Hacker Kevin Poulsen
    The Watchman : The Twisted Life and Crimes of Serial Hacker Kevin Poulsen
    Jonathan Littman
    Written like a California noir thriller by way of William Gibson, The Watchman brings to life the wildest, most audacious crime spree in the history of cyberspace. Busted as a teenager for hacking into Pac Bell phone networks, Kevin Poulsen would find his punishment was a job with a Silicon Valley defense contractor. By day he seemed to have gone straight, toiling on systems for computer-aided war. But by night he burglarized telephone switching offices, adopting the personae and aliases of his favorite comic-book anti heroes - the Watchmen. When authorities found a locker crammed with swiped telecommunications equipment, Poulsen became a fugitive from the FBI, living the life of a cyberpunk in a neon Hollywood underground. Soon he made the front pages of the New York Times and became the first hacker charged with espionage. Littman takes us behind the headlines and into the world of Poulsen and his rogues' gallery of cyberthieves. Drawing on hundreds of hours of interviews with...
  • Jonathan Littman. The Fugitive Game : Online with Kevin Mitnick
    The Fugitive Game : Online with Kevin Mitnick
    Jonathan Littman
    Kevin David Mitnick was cyberspace's most wanted hacker. Mitnick could launch missiles or cripple the world's financial markets with a single phone call - or so went the myth. The FBI, phone companies, bounty hunters, even fellow hackers pursued him overthe Internet and through cellular airways. But while Mitnick's alleged crimes have been widely publicized, his story has never been told. Now Jonathan Littman takes us into the mind of a serial hacker. Drawing on over fifty hours of telephone conversations with Mitnick on the run, Littman reveals Mitnick's double life; his narrow escapes; his new identities, complete with college degrees of his choosing; his hacking techniques and mastery of "social engineering"; his obsession with revenge.
  • Kevin D. Mitnick. The Art of Intrusion
    The Art of Intrusion
    Kevin D. Mitnick
    The Art of Intrusion
  • Parmy Olson. We Are Anonymous: Insid the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
    We Are Anonymous: Insid the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
    Parmy Olson
    We Are Anonymous is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.

© 2017 books.iqbuy.ru