An Introduction to Hacking and Crimeware

A quick overview of the more serious threats posed by hackers and online criminals, and how you might combat them.

An Introduction to Hacking and Crimeware

A quick overview of the more serious threats posed by hackers and online criminals, and how you might combat them.

More Books:

Tribe of Hackers
Language: en
Pages: 304
Authors: Marcus J. Carey, Jennifer Jin
Categories: Computers
Type: BOOK - Published: 2019-07-20 - Publisher: John Wiley & Sons

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release
Ethical Hacking
Language: en
Pages: 556
Authors: Joe Grant
Categories: Computers
Type: BOOK - Published: 2020-11-12 - Publisher:

Do you know if you were hacked? Do you know if some personal information was stolen from your system or account? Have you always wanted to learn how to protect your system from such attacks? If you answered yes to all these questions, you've come to the right place. Unlike
The Hacker's Guide to OS X
Language: en
Pages: 248
Authors: Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Categories: Computers
Type: BOOK - Published: 2012-12-31 - Publisher: Newnes

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the
Penetration Testing
Language: en
Pages: 528
Authors: Georgia Weidman
Categories: Computers
Type: BOOK - Published: 2014-06-14 - Publisher: No Starch Press

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a
Steal this Computer Book
Language: en
Pages: 462
Authors: Wally Wang
Categories: Computers
Type: BOOK - Published: 2001 - Publisher:

Explains how computer viruses are created and spread and covers computer harassment, online con artists, encryption, Trojan Horse programs, network security, damage control, and data recovery.