Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced compute[...]
Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-t[...]
Master CEH v9 and identify your weak spots "CEH: Certified Ethical Hacker Version 9 Practice Tests" are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts[...]
Combines the popular Sybex CEH v9: Certified Ethical Hacker Version 9 Study Guide ISBN 978-1-119-25224-5 updated for the CEH v9 exam with the all new CEH v9: Certified Ethical Hacker Version 9 Practice Tests ISBN: 978-1-119-25215-3. With these you get: The "CEH v9: Certified Ethical Hacker Version 9[...]
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top[...]
HACK YOUR WORKPLACE CULTURE FOR GREATER PROFITS AND PRODUCTIVITY "I LOVE THIS BOOK "
--CHESTER ELTON, New York Times bestselling author of All In and What Motivates Me "When companies focus on culture, the positive effects ripple outward, benefiting not just employees but customers and profits. [...]
HACK YOUR WORKPLACE CULTURE FOR GREATER PROFITS AND PRODUCTIVITY "e;I LOVE THIS BOOK!"e; CHESTER ELTON, New York Times bestselling author of All In and What Motivates Me "e;When companies focus on culture, the positive effects ripple outward, benefiting not just employees but customers a[...]
As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certif[...]
Make your Android device truly your ownAre you eager to make your Android device your own but you're not sure where to start? Then this is the book for you. XDA is the world's most popular resource for Android hacking enthusiasts, and a huge community has grown around customizing Android devices wit[...]
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource to help you pursue the most recognized, respected hacking certification in the world. As experienced instructors of the International Council of Electronic Commerce Consultants (EC-Council), the authors draw on fi[...]
Fully up-to-date coverage of every topic on the CEH v9 certification exam Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tool[...]
Don't Let the Real Test Be Your First Test! Fully updated for the CEH v9 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council's Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanati[...]
Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guide This thoroughly updated, money-saving self-study set gathers essential exam-focused resources to use in preparation for the latest Certified Ethical Ha[...]
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Up-to-date coverage of every topic on the CEH v10 examThoroughly updated for CEH v10 exam objectives, this integ[...]
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into n[...]
The Laboratory Manual Version 1.5 to Accompany Hacker Techniques, Tools, and Incident Handling is the lab companion to Sean-Philip Oriyano's text, Hacker Techniques, Tools, and Incident Handling.It provides hands-on exercises using the Jones & Bartlett Learning Virtual Security Cloud Labs, that prov[...]
Python is a wonderful programming language that is being used more and more in a lot of different industries. It is fast, flexible, and comes with batteries included. Most of the books you read about Python teach you the language basics. But once you've learnt them, you are on your own designing you[...]
Python is a wonderful programming language that is being used more and more in a lot of different industries. It is fast, flexible, and comes with batteries included. Most of the books you read about Python teach you the language basics. But once you've learnt them, you are on your own designing you[...]