Bild 1 von 3



Galerie
Bild 1 von 3



Ähnlichen Artikel verkaufen?
Ethisches Hacking: Eine praktische Einführung in das Einbrechen
US $34,99
Ca.CHF 28,06
oder Preisvorschlag
Artikelzustand:
Gut
Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr geringfügige Beschädigungen auf, wie z.B. kleinere Schrammen, er hat aber weder Löcher, noch ist er eingerissen. Bei gebundenen Büchern ist der Schutzumschlag möglicherweise nicht mehr vorhanden. Die Bindung weist geringfügige Gebrauchsspuren auf. Die Mehrzahl der Seiten ist unbeschädigt, das heißt, es gibt kaum Knitter oder Einrisse, es wurden nur in geringem Maße Bleistiftunterstreichungen im Text vorgenommen, es gibt keine Textmarkierungen und die Randbereiche sind nicht beschrieben. Alle Seiten sind vollständig vorhanden. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
US $5,22 (ca. CHF 4,19) USPS Media MailTM.
Standort: Columbia, Missouri, USA
Lieferung:
Lieferung zwischen Mi, 15. Okt und Di, 21. Okt nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Verkäufer zahlt Rückversand.
Zahlungen:
Sicher einkaufen
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:186391108595
Artikelmerkmale
- Artikelzustand
- Subject
- Ethics
- ISBN
- 9781718501874
Über dieses Produkt
Product Identifiers
Publisher
No Starch Press, Incorporated
ISBN-10
1718501870
ISBN-13
9781718501874
eBay Product ID (ePID)
9050389924
Product Key Features
Number of Pages
376 Pages
Language
English
Publication Name
Ethical Hacking : a Hands-On Introduction to Breaking in
Subject
Engineering (General), Security / Online Safety & Privacy, Security / Networking, Programming Languages / Python
Publication Year
2021
Type
Textbook
Subject Area
Computers, Technology & Engineering
Format
Trade Paperback
Dimensions
Item Height
0.9 in
Item Weight
25.8 Oz
Item Length
9.3 in
Item Width
7 in
Additional Product Features
Intended Audience
Trade
LCCN
2021-940441
Reviews
" Ethical Hacking is great! I've been using it in my Computer Science, Cybersecurity and Machine Learning high-school classrooms. I really love the idea of having a VM lab that kids can understand and use. Well done!" --William Heldman PhD, Technology Educator " Ethical Hacking: A Hands On Introduction to Breaking In by Daniel G. Graham is on my list for book recommendations for those interested and new to cyber. Very well detailed and simple enough for most to understand. Another great book published by No Starch Press." --Jered Bare, @jeredbare " Ethical Hacking is filled with great exercises that give you a much deeper understanding of important, complicated topics by having you go through the details of implementation. Making deep fakes, implementing a botnet and other topics are enlightening, lots of fun and will help you defend against these threats, possibly by also helping you find bugs and issues which can disable them!" --Jamie G., Advanced Reviewer "Good for beginners in cybersecurity, ethical hacking and offensive security. . . . 4.5 / 5.0" --Uday Mittal, Cybersecurity Professional, " Ethical Hacking is great! I've been using it in my Computer Science, Cybersecurity and Machine Learning high-school classrooms. I really love the idea of having a VM lab that kids can understand and use. Well done!" --William Heldman PhD, Technology Educator, " Ethical Hacking is great! I've been using it in my Computer Science, Cybersecurity and Machine Learning high-school classrooms. I really love the idea of having a VM lab that kids can understand and use. Well done!" --William Heldman PhD, Technology Educator " Ethical Hacking: A Hands On Introduction to Breaking In by Daniel G. Graham is on my list for book recommendations for those interested and new to cyber. Very well detailed and simple enough for most to understand. Another great book published by No Starch Press." --Jered Bare, @jeredbare " Ethical Hacking is filled with great exercises that give you a much deeper understanding of important, complicated topics by having you go through the details of implementation. Making deep fakes, implementing a botnet and other topics are enlightening, lots of fun and will help you defend against these threats, possibly by also helping you find bugs and issues which can disable them!" --Jamie G., Advanced Reviewer
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Synopsis
Ethical Hacking is a crash course in modern hacking techniques. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin by capturing a victim's network traffic with an ARP spoofing attack and then view the packet capture in Wireshark. Next, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and craft fake emails like the ones used in phishing attacks. You'll also learn how to fuzz software for new vulnerabilities, create trojans and rootkits, exploit websites with SOL injection, and escalate your privileges in order to extract credentials to traverse a private network. Along the way, you'll work with a wide range of professional pentesting tools (such as the Metasploit Framework, mimikatz, and BeEF), discover how advanced fuzzers work behind the scenes, see how internet traffic gets encrypted, and explore the inner mechanisms of nation-state malware like Drovorub. You'll also learn how to: Execute cross-site scripting attack to deliver sophisticated JavaScript payloads, Write your own hacking tools in Python, Capture passwords in a corporate Windows network, Scan countless devices on the internet to find potential victims, Install Linux rootkits that modify a victim's operating system, Ethical Hacking addresses modern cybersecurity issues and teaches you the fundamental skills you need to become an ethical hacker. Take the first step in your pentesting career by learning how the experts break in. Book jacket., A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics- capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network. You'll work with a wide range of professional penetration testing tools-and learn to write your own tools in Python-as you practice tasks like- Deploying the Metasploit framework's reverse shells and embedding them in innocent-seeming files Capturing passwords in a corporate Windows network using Mimikatz Scanning (almost) every device on the internet to find potential victims Installing Linux rootkits that modify a victim's operating system Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you'll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you'll be able to think like an ethical hacker- someone who can carefully analyze systems and creatively gain access to them., A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network. You'll work with a wide range of professional penetration testing tools--and learn to write your own tools in Python--as you practice tasks like: Deploying the Metasploit framework's reverse shells and embedding them in innocent-seeming files Capturing passwords in a corporate Windows network using Mimikatz Scanning (almost) every device on the internet to find potential victims Installing Linux rootkits that modify a victim's operating system Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you'll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you'll be able to think like an ethical hacker someone who can carefully analyze systems and creatively gain access to them.
LC Classification Number
TK5105.59
Artikelbeschreibung des Verkäufers
Info zu diesem Verkäufer
dealallday8
100% positive Bewertungen•809 Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Verkäuferbewertungen (263)
- Automatyczna opinia eBay- Bewertung vom Käufer.Letzter MonatZamówienie zostało dostarczone na czas bez problemów
- 9***t (2887)- Bewertung vom Käufer.Letzter MonatBestätigter Kaufgreat value, safe fast shipping, 5 stars, thank you!!!!
- 9***t (2887)- Bewertung vom Käufer.Letzter MonatBestätigter Kaufgreat value, safe fast shipping, 5 stars, thank you!!!!
Noch mehr entdecken:
- Praktische Theologie Studium und Erwachsenenbildung,
- Theologie-Praktische-Theologie-Taschenbuch Studium und Erwachsenenbildung,
- Deutsche Studium und Erwachsenenbildung Praktische Theologie,
- Theologie-Praktische-Theologie Deutsche Studium und Erwachsenenbildung,
- Bücher für Studium & Erwachsenenbildung Theologie praktische Theologie,
- Theologie-Praktische-Theologie-Gebundene - Ausgabe Studium und Erwachsenenbildung,
- Theologie-Praktische-Theologie-Taschenbuch Deutsche Studium und Erwachsenenbildung