Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way
This practical guide reveals the powerful weapons and devious methods cyber-terrorist……続きを見る
Learn how people break websites and how you can, too.
Real-World Bug Hunting is the premier field guide to finding software bugs. Whether you're a cyber-security beginner who wants to make the inter……続きを見る
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in conte……続きを見る
Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal in……続きを見る
This book is an introduction to writing Linux shell scripts and installation of certain important tools for industry usage.
Topics included are the use of commands and shortcuts in shell scripting, ……続きを見る
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, t……続きを見る
Protect your privacy and use the internet safely!
Don’t let news about internet risks deter you from taking full advantage of its benefits! The web is such an amazing and useful resource for connect……続きを見る
Defending your web applications against hackers and attackers
The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applicat……続きを見る
This book is written based on practical usage and research on computer security and networks. Basically everyone has strong concern about computer security networks where by it can sabotage the busi……続きを見る
Hackercool October 2016 Issue comes with many improvements.
Real Time Hacking Scenario : Yes, we are going to show you a real time hacking scenario of hacking a web server.
Sending the package :……続きを見る
Here's what you will find in Hackercool December 2016 Issue . 1. Editor's Note : As always no explanation
Real Time Hacking Scenario : Web Server Forensics(cont'd) Every hacker leaves his trails, ……続きを見る
Statistics about identity theft from the Federal Trade Commission (FTC) are staggering. The FTC now says that as many as one in every eight adults and one in every four households has been victimize……続きを見る
Here's what you will find in the Hackercool February 2017 Issue .
1.Real Time Hacking Scenario - Hacking my friends : Hacking my friiends systems by bypassing antivirus.
Installit :See how to inst……続きを見る
Here's what you will find in the Hackercool March 2017 Issue .
Real Time Hacking Scenario - Hacking my friends (Cont'd) : In the last issue, we have seen how hackers bypass antivirus and hack thei……続きを見る
著者:Kimberly A. McCabe
出版社: Rowman & Littlefield Publishers
発売日: 2017年09月15日
As parents, our main job is to protect our children. These days, protection from includes not only the individuals we can see but, also, the individuals that we cannot see – yet who wish to harm our……続きを見る
Here's what you will find in the Hackercool August 2017 Issue .
Malware Malware (Conclusion) : Cover Story : Worms, Spyware, Keylogger, Logic Bomb, Bots,Rootkit and Ransomware.
Installit : Insta……続きを見る
Security Smarts for the Self-Guided IT Professional
“Get to know the hackersーor plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed w……続きを見る
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated a……続きを見る
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats
Key Features
Protect your financial environment with cybersecurity practices and methodolo……続きを見る
Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition
Key Features
Rely on the most updated version of Kali to formulate your pentesting strat……続きを見る
Threats categories, computer security, Risk Analysis, Threats prioritization,Possible attack scenarios, Security policy for the usage of smartphones in the organization premises
Paperback: 32 pages
……続きを見る
Threats categories, computer security, Risk Analysis, Threats prioritization,Possible attack scenarios, Security policy for the usage of smartphones in the organization premises
Paperback: 32 pages
……続きを見る
It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of informat……続きを見る
The internet is the most effective weapon the government has ever built.
In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the internet, tracing it back to……続きを見る
Hi readers of Hackercool,
Welcome to the March 2018 Issue of our Hackercool Magazine. The highlight of this issue is the Real World Hacking Scenario section. In this section, we have for the first t……続きを見る
Hi readers of Hackercool,
Welcome to the fourth issue of the First edition of the Magazine. First we would like to apologize for the acute delay in releasing this issue. The first issue of this year……続きを見る
Hi readers of Hackercool,
Welcome to the fifth issue of the First edition of the magazine. The highlight of this issue is the Installit section. In this section, we have shown our readers how to cre……続きを見る
Great POSSIBILITIES and high future prospects to become ten times folds in the near FUTURE
The book "Handbook of Cloud Computing" provides the latest and in-depth information of this relatively new ……続きを見る
Todos los que manipulen una máquina computadora tienen que saber lo que tiene que hacer para evitar contagios y propagaciones de virus, tomar medidas de contingencia y reparar los daños causados por……続きを見る
著者:Seema Yasmin
出版社: Johns Hopkins University Press
発売日: 2021年01月12日
Dissecting the biggest medical myths and pseudoscience, Viral BS explores how misinformation can spread faster than microbes.
Can your zip code predict when you will die? Should you space out childh……続きを見る