Tag: Hacking

  • Hacking: The Art of Exploitation, 2nd Edition

    Hacking: The Art of Exploitation, 2nd Edition


    Price: $49.95 – $35.53
    (as of Nov 25,2024 09:15:15 UTC – Details)


    From the Publisher

    Copy of Hacking: The Art of Exploitation on black background with No Starch Press logoCopy of Hacking: The Art of Exploitation on black background with No Starch Press logo

    Image of open book on yellow background

    Image of open book on yellow background

    Image of two books stacked on top of each other

    Image of two books stacked on top of each other

    Image of open book on yellow background

    Image of open book on yellow background

    ‘A Rare Find’

    “A book this good is a rare find, and certainly worth the read for any individual interested in security. Rating: 9/10”

    —Slashdot

    ‘Highly Accessible’

    “Like all good books, Hacking: The Art of Exploitation, 2nd Edition encourages you to get your hands dirty. Each chapter focuses on a series of examples with finely worded guidance from Erickson. It’s not a beast of a read either; it is highly accessible with an emphasis on allowing practice of the examples rather than drowning the reader in hacking theory.”

    —The Register

    ‘A Security Professional’s Paradise’

    “A security professional’s paradise, burrowing down to the code level of dozens of different loopholes and explaining the underlying logic behind the attacks.”

    —GeekDad on Wired.com

    Author headshotAuthor headshot

    About the Author

    Jon Erickson has a formal education in computer science and has been hacking and programming since he was five years old. He speaks at computer security conferences and trains security teams around the world. Currently, he works as a vulnerability researcher and security specialist in Northern California.

    No Starch Press logo. A black circle with a white iron with a star in the centerNo Starch Press logo. A black circle with a white iron with a star in the center

    About the Publisher

    No Starch Press has published the finest in geek entertainment since 1994, creating both timely and timeless titles like Python Crash Course, Python for Kids, How Linux Works, and Hacking: The Art of Exploitation. An independent, San Francisco-based publishing company, No Starch Press focuses on a curated list of well-crafted books that make a difference. They publish on many topics, including computer programming, cybersecurity, operating systems, and LEGO. The titles have personality, the authors are passionate experts, and all the content goes through extensive editorial and technical reviews. Long known for its fun, fearless approach to technology, No Starch Press has earned wide support from STEM enthusiasts worldwide.

    Publisher ‏ : ‎ No Starch Press; 2nd edition (February 4, 2008)
    Language ‏ : ‎ English
    Paperback ‏ : ‎ 488 pages
    ISBN-10 ‏ : ‎ 1593271441
    ISBN-13 ‏ : ‎ 978-1593271442
    Item Weight ‏ : ‎ 2.31 pounds
    Dimensions ‏ : ‎ 7 x 1.06 x 9.25 inches

    Customers say

    Customers find the book well-written and easy to understand. They say it’s a good introduction to hacking, great for novice to intermediate hackers, and the best book for technical security professionals. Readers describe the book as nice, cool, and amazing. They appreciate the examples that carry over perfectly. They mention it comes with a DVD to boot from and practice what they’re learning. However, some customers have reported issues with the CD and dated content.

    AI-generated from the text of customer reviews


    In this post, we will discuss the book “Hacking: The Art of Exploitation, 2nd Edition” by Jon Erickson. This book is a comprehensive guide to the world of hacking and cybersecurity, providing readers with a hands-on introduction to the tools and techniques used by hackers.

    The book covers a wide range of topics, including programming, network security, cryptography, and exploitation. Readers will learn how to write their own programs to exploit security vulnerabilities, analyze network traffic, and crack passwords. The book also delves into the ethical considerations of hacking, discussing the difference between white hat and black hat hacking, as well as the legal implications of hacking.

    Whether you are a beginner looking to learn the basics of hacking or an experienced cybersecurity professional looking to expand your skills, “Hacking: The Art of Exploitation, 2nd Edition” is a valuable resource. With its practical approach and real-world examples, this book will help you understand the mindset of hackers and improve your own security practices.
    #Hacking #Art #Exploitation #2nd #Edition

  • Hacking and Security: The – Paperback, by Kofler Michael; Gebeshuber – Very Good

    Hacking and Security: The – Paperback, by Kofler Michael; Gebeshuber – Very Good



    Hacking and Security: The – Paperback, by Kofler Michael; Gebeshuber – Very Good

    Price : 65.98

    Ends on : N/A

    View on eBay
    If you’re interested in learning more about hacking and security, then “Hacking and Security: The – Paperback” by Kofler Michael and Gebeshuber is a must-read. This book provides a comprehensive overview of the latest techniques and tools used by hackers, as well as practical advice on how to protect yourself and your data from cyber threats. With a focus on real-world examples and hands-on exercises, this book is perfect for both beginners and experienced professionals looking to enhance their skills in the field of cybersecurity. Overall, “Hacking and Security: The – Paperback” is a very good resource for anyone looking to stay ahead of the curve in today’s rapidly evolving digital landscape.
    #Hacking #Security #Paperback #Kofler #Michael #Gebeshuber #Good

  • Hacking Exposed 7: Network Security Secrets and Solutions

    Hacking Exposed 7: Network Security Secrets and Solutions


    Price: $55.00 – $32.99
    (as of Nov 25,2024 05:59:11 UTC – Details)


    From the brand

    Your professional path begins here. Let us help guide your way.Your professional path begins here. Let us help guide your way.

    About UsAbout Us

    As a leading global education company, our mission is to partner with educators, learners, and professionals to help them access all the value that education can offer, no matter where their starting points may be.

    For over 130 years, we have never stopped innovating to meet the ever-changing needs of educators and learners around the world – and will continue to support and celebrate their efforts every step of the way.

    Lifelong learnerLifelong learner

    Publisher ‏ : ‎ McGraw Hill; 7th edition (August 1, 2012)
    Language ‏ : ‎ English
    Paperback ‏ : ‎ 768 pages
    ISBN-10 ‏ : ‎ 0071780289
    ISBN-13 ‏ : ‎ 978-0071780285
    Item Weight ‏ : ‎ 2.75 pounds
    Dimensions ‏ : ‎ 7.4 x 1.5 x 9.1 inches

    Customers say

    Customers find the book’s content great, updated, and easy to read and follow. They also appreciate the informative, well-explained concepts and examples. Readers describe the book as an organized, easy reference for anyone.

    AI-generated from the text of customer reviews


    Are you looking to up your network security game? Look no further than “Hacking Exposed 7: Network Security Secrets and Solutions”. In this book, renowned cybersecurity experts reveal the latest threats and vulnerabilities facing networks today, along with practical solutions to protect against them.

    From advanced persistent threats to insider attacks, this book covers it all with real-world examples and actionable advice. Learn how to secure your network against hackers and cybercriminals, and stay one step ahead in the ever-evolving world of cybersecurity.

    Don’t wait until it’s too late – arm yourself with the knowledge and tools you need to protect your network with “Hacking Exposed 7: Network Security Secrets and Solutions”.
    #Hacking #Exposed #Network #Security #Secrets #Solutions

  • Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity (Rheinwerk Computing)

    Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity (Rheinwerk Computing)


    Price: $59.95 – $42.64
    (as of Nov 22,2024 08:23:12 UTC – Details)


    From the Publisher

    Hacking and Security: The Comprehensive Guide to Penetration Testing and CybersecurityHacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity

    Explore penetration testing and cybersecurity using this guide!

    Hacking and Security: The Comprehensive Guide to Penetration Testing and CybersecurityHacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity

    The best hacking book for administrators, security professionals, and software developers!

    “Attack is the secret of defense; defense is the planning of an attack.” — Sun Tzu

    You can only make your systems truly secure if you understand how an attacker thinks. This comprehensive guide is the key to advanced security for your IT systems. Get the know-how you need to protect your infrastructure from attacks with over 1,200 pages of practical examples.

    Improve your cyber security by following cases from real attack scenarios to find out which security measures really work. Using examples from the perspective of a hacker, you can detect weaknesses in your own systems and employ all the tools provided to protect against attacks.

    From securing the Active Directory and using Kali Linux to searching for exploits and hardening web servers, use this guide to become a security expert!

    Penetration testing Offline hacking Active Directory Linux Mobile security IoT security Cloud security IT Forensics

     Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity

    Inside the book:

    System administrators, security engineers, software developers, and general IT professionals will develop a strong foundation in security techniques that will help protect your system against imposing cyber threats.

    This book includes:

    1,200+ pages of expert knowledge about hacking, cybersecurity, and penetration testingA thorough review of security tools and techniquesDetailed practical examples and scenariosDiagrams, charts, tables, note boxes, definitions, and background informationNumerous illustrations and screenshotsA comprehensive index

    Hacking and Security: The Comprehensive Guide to Penetration Testing and CybersecurityHacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity

    Meet the authors:

    Michael Kofler wrote this manual together with a team of security specialists. The authors have many years of experience as pen testers, administrators and developers, and know how hackers work. They introduce you to common attack scenarios and show you specific solutions and tools that you can use to defend yourself effectively.

    Add to Cart

    Add to Cart

    Add to Cart

    Add to Cart

    Add to Cart

    Customer Reviews

    4.7 out of 5 stars

    86

    4.5 out of 5 stars

    66

    4.5 out of 5 stars

    26

    4.7 out of 5 stars

    20

    4.0 out of 5 stars

    13

    Price

    $39.21$39.21 $34.36$34.36 $42.80$42.80 $40.43$40.43 $45.85$45.85

    Publisher ‏ : ‎ Rheinwerk Computing; First Edition (July 27, 2023)
    Language ‏ : ‎ English
    Paperback ‏ : ‎ 1141 pages
    ISBN-10 ‏ : ‎ 1493224255
    ISBN-13 ‏ : ‎ 978-1493224258
    Item Weight ‏ : ‎ 4.4 pounds
    Dimensions ‏ : ‎ 7 x 2.25 x 9.75 inches


    Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity (Rheinwerk Computing)

    In today’s digital age, the importance of cybersecurity cannot be overstated. With cyber attacks becoming increasingly sophisticated and prevalent, it has never been more crucial for individuals and organizations to protect their sensitive information and data.

    One of the most effective ways to ensure the security of your systems and networks is through penetration testing. This process involves simulating an attack on your own systems to identify vulnerabilities and weaknesses that could be exploited by malicious actors.

    In “Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity,” published by Rheinwerk Computing, readers are provided with a comprehensive overview of the tools, techniques, and best practices for conducting successful penetration tests. From initial reconnaissance to exploiting vulnerabilities and reporting findings, this book covers all aspects of the penetration testing process in detail.

    Additionally, the book delves into the fundamentals of cybersecurity, including threat modeling, risk assessment, and incident response. By understanding the latest cybersecurity trends and threats, readers can better protect their systems and networks from potential attacks.

    Whether you are a seasoned cybersecurity professional or a novice looking to enhance your skills, “Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity” is a valuable resource for anyone looking to safeguard their digital assets. With practical guidance and real-world examples, this book is an essential tool for staying ahead of cyber threats in today’s ever-evolving landscape.
    #Hacking #Security #Comprehensive #Guide #Penetration #Testing #Cybersecurity #Rheinwerk #Computing

  • Data Blocker, 4-in-1 Universal USB Data Blocker, Protection from Illegal Downloading, Hacking Proof 100% Guaranteed, for iPhone 15 and Any USB Device Charging. 2-Pack (Red)

    Data Blocker, 4-in-1 Universal USB Data Blocker, Protection from Illegal Downloading, Hacking Proof 100% Guaranteed, for iPhone 15 and Any USB Device Charging. 2-Pack (Red)


    Price: $9.99
    (as of Nov 19,2024 21:11:16 UTC – Details)


    Product Description

    HackerHacker

    Refuse Hacking Provide Safe Charging

    Are you worried about the risk of mobile phone data leakage or uploading viruses when you use a charging station to recharge? Worried about spyware or hacking attacks on your mobile device while charging?

    Don’t worry, choosing a data blocker is an effective measure to prevent these potential risks.

    Data BlockerData Blocker USBUSB Data BlockerUSB C Data Blocker

    USB Data Blocker & USB C Data Blocker .USB-A to USB-A & USB-C to USB-C Data Blocker Only for Charge, Protect Against Juice Jacking, Refuse Hacking Provide Safe Charging

    data blocker

    data blocker

    USB Data blocker

    USB Data blocker

    Type-C Data blocker

    Type-C Data blocker

    Meet your needs, easy to carry

    Suitable for all USB A devices and USB C devices

    Charging only

    Against juice jacking, no data transmission

    USB C Data Blocker Kit

    -Protect Against Juice Jacking

    In Hotel

    In Hotel

    Aunge of an airport

    Aunge of an airport

    At Restaurant

    At Restaurant

    At Library

    At Library

    In Hotel

    Aunge of an airport

    At Restaurant

    At Library

    Data BlockerData Blocker

    Store Other Data Blocker

    Click on the link below to choose from a variety of interception devices

    Add to Cart

    Add to Cart

    Add to Cart

    Add to Cart

    Add to Cart

    Add to Cart

    Customer Reviews

    4.4 out of 5 stars

    177

    4.1 out of 5 stars

    52

    4.5 out of 5 stars

    6

    4.3 out of 5 stars

    170

    3.9 out of 5 stars

    92

    Price

    $7.99$7.99 $7.99$7.99 $7.99$7.99 $9.99$9.99 $9.99$9.99 $9.99$9.99

    Price

    【4-in-1 Data Blocker】 We have combined the USB-A to USB-C and USB-A to USB-A, USB-C to USB-A, USB-C to USB-C data blocker into one, Suitable for connecting various USB charging ports.
    【Multi functional transformation】 just one data blocker can meet the convenience of charging two devices at the same time. No need to worry about finding the right charging port. Supports up to 3A charging for a single device.
    【PROTECT YOUR PHONE / TABLET】 : Think about that Traveling or going out in public areas one time when you needed a charge at an airport but were too scared to get juice jacked. That is why we brought this data blocker for you. Charge your device with this powerful USB data blocker without worrying about any hacker getting in your device.
    【HIGH SPEED CHARGING】: USB defenders are made for blocking the hacker as well as fast charging, The 4th generation design chip can be used for the universal charging standards automatically switch to, Compatible with Various brands of smartphones, ensure compatibility with your device. and charge at up to 2.4 Amps. USB C to C Support Safe Fast Charging up to 20V/4A.
    【to make high quality safety products】:Advance manufacturing process design The metal shell material has multiple safety protection functions such as heat dissipation and fire safety, USB Data Blocker are used by the governments of the USA, Canada, UK and New Zealand as well as 100s of corporations around the world to secure their devices,100% guarantee against hacker attack.
    【METAL QUALITY, PLEASE REST ASSURED】:We make the best quality.12-Month worry free period, If you are unsatisfied with the product for any reason simply contact us and we will issue with our “no hassle” return policy, in use have any questions, we will resolve your issue within 24 hours.


    Introducing the Data Blocker – the ultimate solution for protecting your devices from illegal downloading and hacking. Our 4-in-1 Universal USB Data Blocker is 100% guaranteed to keep your iPhone 15 and any USB device charging safe and secure.

    With our Data Blocker, you can rest easy knowing that your personal information is protected from prying eyes. Whether you’re charging your phone at a public USB port or syncing your devices on a shared computer, the Data Blocker ensures that only power is flowing through your USB cable, not data.

    The Data Blocker comes in a convenient 2-pack of vibrant red blockers, making it easy to keep one at home and one on the go. With its compact design, the Data Blocker is perfect for travel and everyday use.

    Don’t take any chances with your data security – invest in the Data Blocker today and enjoy peace of mind knowing that your devices are safe from unauthorized access. Order now and protect your devices with the best in USB data security.
    #Data #Blocker #4in1 #Universal #USB #Data #Blocker #Protection #Illegal #Downloading #Hacking #Proof #Guaranteed #iPhone #USB #Device #Charging #2Pack #Red