23,99 €
Statt 29,99 €**
23,99 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar
23,99 €
Statt 29,99 €**
23,99 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
Als Download kaufen
Statt 29,99 €****
23,99 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar
Jetzt verschenken
Statt 29,99 €****
23,99 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Broschiertes Buch)
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
  • Format: PDF

In my work, I keep coming across networks and websites with significant security problems. In this book, I try to show the reader how easy it is to exploit security holes with various tools. Therefore, in my opinion, anyone who operates a network or a website should know to some extent how various hacking tools work to understand how to protect themselves against them. Many hackers don't even despise small home networks. Even if the topic is very technical, I will try to explain the concepts in a generally comprehensible form. A degree in computer science is by no means necessary to follow…mehr

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 11.07MB
Produktbeschreibung
In my work, I keep coming across networks and websites with significant security problems. In this book, I try to show the reader how easy it is to exploit security holes with various tools. Therefore, in my opinion, anyone who operates a network or a website should know to some extent how various hacking tools work to understand how to protect themselves against them. Many hackers don't even despise small home networks. Even if the topic is very technical, I will try to explain the concepts in a generally comprehensible form. A degree in computer science is by no means necessary to follow this book. Nevertheless, I don't just want to explain the operation of various tools, I also want to explain how they work in such a way that it becomes clear to you how the tool works and why a certain attack works.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Mark B. has been working as a freelancer in the field of software and web development since 2001 and has been intensively involved in IT security and web pentesting for several years.