Cantitate/Preț
Produs

HACKING: Hacking Firewalls & Bypassing Honeypots

Autor Alex Wagner
en Limba Engleză Hardback – 14 aug 2019
In order to understand hackers and protect the network infrastructure you must think like a hacker in today's expansive and eclectic internet and you must understand that nothing is fully secured. Considering that you are preparing to became an Ethical Hacker, IT Security Analyst, IT Security Engineer, or a Cybersecurity Specialist, yet still in doubt and want to know about Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems or Honeypots, you will find this book extremely useful. If you attempt to use any of the tools or techniques discussed in this book on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this book for WHITE HAT USE ONLY. The main focus of this book is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems or Honeypots work. Your reading of this book will boost your knowledge on what is possible in today's hacking world and help you to become an Ethical Hacker aka Penetration Tester. BUY THIS BOOK NOW AND GET STARTED TODAY! IN THIS BOOK YOU WILL LEARN ABOUT: •What is The OSI Model •What are Zone Based Firewalls •Firewall Behavior and TCP State Table •Network Address Translation •Port Address Translation •Demilitarized Zone •TCP & UDP Traffic on Firewalls •Client Connection Process •System Intrusion Indicators •Indicators of Network Intrusion •Anomalous Behaviour •Firewall Implementations & Architectures •Packet Filtering Firewalls •Circuit-level Gateway •Application Firewalls •Stateful Firewalls •Next-Gen Firewalls •Detecting Firewalls •IP address spoofing •Source Routing •Tiny fragment attack •Tunneling •Evasion Tools •Intrusion Detection Systems •Signature-based IDS •Statistical Anomaly-based IDS •Network-Based IDS •Host Intrusion Detection System •Evasion by Confusion •Fragmentation attack •Overlapping Fragments Attack •Time-to-Live attack •DoS Attack & Flooding Attack •IDS weakness Detection •Honeypot Types & Honeypot Detection BUY THIS BOOK NOW AND GET STARTED TODAY!
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (7) 11207 lei  22-36 zile
  Sabi Shepherd Ltd – 15 aug 2019 11207 lei  22-36 zile
  Sabi Shepherd Ltd – 14 aug 2019 11254 lei  22-36 zile
  Sabi Shepherd Ltd – 14 aug 2019 12986 lei  22-36 zile
  Sabi Shepherd Ltd – 15 aug 2019 13236 lei  22-36 zile
  Sabi Shepherd Ltd – 14 aug 2019 14198 lei  22-36 zile
  Sabi Shepherd Ltd – 14 aug 2019 23159 lei  22-36 zile
  Sabi Shepherd Ltd – 15 aug 2019 24862 lei  43-57 zile
Hardback (9) 13234 lei  43-57 zile
  Sabi Shepherd Ltd – 14 aug 2019 13333 lei  22-36 zile
  Sabi Shepherd Ltd – 15 aug 2019 20284 lei  22-36 zile
  Sabi Shepherd Ltd – 15 aug 2019 29167 lei  22-36 zile
  Sabi Shepherd Ltd – 15 aug 2019 31775 lei  22-36 zile
  Sabi Shepherd Ltd – 15 aug 2019 13234 lei  43-57 zile
  Sabi Shepherd Ltd – 14 aug 2019 17061 lei  43-57 zile
  Sabi Shepherd Ltd – 14 aug 2019 17423 lei  43-57 zile
  Sabi Shepherd Ltd – 15 aug 2019 24073 lei  43-57 zile
  Sabi Shepherd Ltd – 14 aug 2019 33026 lei  43-57 zile

Preț: 17423 lei

Preț vechi: 21778 lei
-20% Nou

Puncte Express: 261

Preț estimativ în valută:
3334 3464$ 2770£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781839381171
ISBN-10: 1839381175
Pagini: 212
Dimensiuni: 157 x 235 x 16 mm
Greutate: 0.45 kg
Editura: Sabi Shepherd Ltd
Colecția Hacking Firewalls & Bypassing Honeypots
Seria Hacking Firewalls & Bypassing Honeypots


Descriere

Descriere de la o altă ediție sau format:
THIS BOOK INCLUDES 3 MANUSCRIPTS:BOOK 1: Hacking with Kali Linux: Penetration Testing Hacking BibleBOOK 2: Social Engineering Attacks, Techniques & PreventionBOOK 3: Hacking Firewalls & Bypassing Honeypots