Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way
This practical guide reveals the powerful weapons and devious methods cyber-terrorist……続きを見る
Learn how people break websites and how you can, too.
Real-World Bug Hunting is the premier field guide to finding software bugs. Whether you're a cyber-security beginner who wants to make the inter……続きを見る
This book is an introduction to writing Linux shell scripts and installation of certain important tools for industry usage.
Topics included are the use of commands and shortcuts in shell scripting, ……続きを見る
Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The……続きを見る
This book is written based on practical usage and research on computer security and networks. Basically everyone has strong concern about computer security networks where by it can sabotage the busi……続きを見る
Hi Everyone,
We have created this e-magazine for any IT experts out there to contribute and express on any IT knowledge in our article sections. Well this is our first issue of the month. We hope th……続きを見る
Hackercool October 2016 Issue comes with many improvements.
Real Time Hacking Scenario : Yes, we are going to show you a real time hacking scenario of hacking a web server.
Sending the package :……続きを見る
Here's what you will find in Hackercool December 2016 Issue . 1. Editor's Note : As always no explanation
Real Time Hacking Scenario : Web Server Forensics(cont'd) Every hacker leaves his trails, ……続きを見る
Here's what you will find in the Hackercool February 2017 Issue .
1.Real Time Hacking Scenario - Hacking my friends : Hacking my friiends systems by bypassing antivirus.
Installit :See how to inst……続きを見る
Here's what you will find in the Hackercool March 2017 Issue .
Real Time Hacking Scenario - Hacking my friends (Cont'd) : In the last issue, we have seen how hackers bypass antivirus and hack thei……続きを見る
Incorporate the assembly language routines in your high level language applications
About This Book
Understand the Assembly programming concepts and the benefits of examining the AL codes generated……続きを見る
Here's what you will find in the Hackercool August 2017 Issue .
Malware Malware (Conclusion) : Cover Story : Worms, Spyware, Keylogger, Logic Bomb, Bots,Rootkit and Ransomware.
Installit : Insta……続きを見る
Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes
About This Book
Expose wireless security threats through the eyes of an attacker,
Recipes to help you pro……続きを見る
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated a……続きを見る
Buku tentang WHM / cPanel ini bisa menjadi rujukan bagi perusahaan yang ingin mengelola sendiri Domain, Web atau Manajemen DNS atau bagi yang ingin berbisnis hosting atau menjadi reseller hosting.
M……続きを見る
Threats categories, computer security, Risk Analysis, Threats prioritization,Possible attack scenarios, Security policy for the usage of smartphones in the organization premises
Paperback: 32 pages
……続きを見る
Threats categories, computer security, Risk Analysis, Threats prioritization,Possible attack scenarios, Security policy for the usage of smartphones in the organization premises
Paperback: 32 pages
……続きを見る
Hi readers of Hackercool,
Welcome to the March 2018 Issue of our Hackercool Magazine. The highlight of this issue is the Real World Hacking Scenario section. In this section, we have for the first t……続きを見る
Hi readers of Hackercool,
Welcome to the fourth issue of the First edition of the Magazine. First we would like to apologize for the acute delay in releasing this issue. The first issue of this year……続きを見る
Hi readers of Hackercool,
Welcome to the fifth issue of the First edition of the magazine. The highlight of this issue is the Installit section. In this section, we have shown our readers how to cre……続きを見る
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build bo……続きを見る
Learn to identify security incidents and build a series of best practices to stop cyber attacks before they create serious consequences
Key Features
Discover Incident Response (IR), from its evolut……続きを見る
著者:Aditya K. Sood PhD
出版社: Mercury Learning and Information
発売日: 2021年04月15日
This book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning pr……続きを見る
著者:Lin Yang, Quan Yu
出版社: World Scientific Publishing Company
発売日: 2021年06月08日
The book puts forward dynamically enabled cyber defense technology as a solution to the system homogenization problem. Based on the hierarchy of the protected information system entity, the book ela……続きを見る
Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use cases
Key Features
Discover tips and expert advice from the leading CISO and author of many cybe……続きを見る
Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscape Key Features • Updated for ransomware prevention, security posture managemen……続きを見る
Knowing your threat actors together with your weaknesses and the technology will master your defense
KEY FEATURES
● Gain practical experience with cyber threat intelligence by using the book's lab s……続きを見る
著者:Aditya K. Sood PhD
出版社: Mercury Learning and Information
発売日: 2023年06月30日
The second edition of the book has been updated with the latest research and developments in the field of cloud security. The content has been refined and streamlined to make it more accessible and ……続きを見る
Go on a journey through the threat detection engineering lifecycle while enriching your skill set and protecting your organizationKey FeaturesGain a comprehensive understanding of threat validationL……続きを見る