Jesse Varsalone, Christopher Haller
The Hack Is Back (eBook, ePUB)
Techniques to Beat Hackers at Their Own Games
49,95 €
49,95 €
inkl. MwSt.
Sofort per Download lieferbar
25 °P sammeln
49,95 €
Als Download kaufen
49,95 €
inkl. MwSt.
Sofort per Download lieferbar
25 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
49,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
25 °P sammeln
Jesse Varsalone, Christopher Haller
The Hack Is Back (eBook, ePUB)
Techniques to Beat Hackers at Their Own Games
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The Hack is Back is tailored for both beginners and aspiring cybersecurity professionals to learn these techniques to evaluate and find risks on computer systems and networks. This book will benefit the offensive minded hacker (red-teamers) as well as those who focus on defense (blue-teamers).
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
Andere Kunden interessierten sich auch für
- Jesse VarsaloneThe Hack Is Back (eBook, PDF)49,95 €
- Gilbert HeldWindows Networking Tools (eBook, ePUB)57,95 €
- Mikhail V. BelovOptimal Enterprise (eBook, ePUB)46,95 €
- Felicia M. WetterCuring the Patch Management Headache (eBook, ePUB)118,95 €
- Debra S. HerrmannA Practical Guide to Security Engineering and Information Assurance (eBook, ePUB)58,95 €
- Bozidar LeviUNIX Administration (eBook, ePUB)134,95 €
- Cloud Reliability Engineering (eBook, ePUB)58,95 €
-
-
-
The Hack is Back is tailored for both beginners and aspiring cybersecurity professionals to learn these techniques to evaluate and find risks on computer systems and networks. This book will benefit the offensive minded hacker (red-teamers) as well as those who focus on defense (blue-teamers).
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Erscheinungstermin: 15. August 2024
- Englisch
- ISBN-13: 9781040098318
- Artikelnr.: 72282225
- Verlag: Taylor & Francis
- Erscheinungstermin: 15. August 2024
- Englisch
- ISBN-13: 9781040098318
- Artikelnr.: 72282225
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Jesse Varsalone is an Associate Professor of Cybersecurity Technology and the coach for the Cyber Team at University of Maryland University Global Campus. Jesse has been teaching Cyber Security related courses for 24 years, and has been teaching for a total of 30 years, Jesse has taught at undergraduate and graduate level at a number of colleges and universities including University of Maryland Global Campus, the Community College of Baltimore County, the Computer Career Institute at Johns Hopkins, UMBC Training Center, Champlain College, and Stevenson University. He also taught as a DoD contractor for 5 years at the Defense Cyber Investigations Training Academy (DCITA) where he taught courses as a Forensics and Intrusions in a Windows Environment, Network Exploitation Techniques, and Live Network Investigations.
Jesse holds several certifications in the IT field, including A+, CISSP, CEH, Cloud+, CYSA+, Linux+, Net+, Pentest+, Security+, and Server+. Jesse has spoken at several conferences including many of the DoD Cyber Crime Conferences. He was a member of the Red Team for several years on the Mid-Atlantic College Cyber Defense Competition. He has a master's degree from the University of South Florida (Tampa, FL), and a bachelor's from George Mason University (Fairfax VA). Jesse has written and contributed to several publications, including Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It by.
Jesse also wrote the entire series of labs for Security+, Ethical Hacking, Forensics, and Network Security for NDG's netlab. Jesse lives with his sons Mason and Levi, and daughter Kayla in Ellicott City Maryland in Howard County Maryland.
Christopher Haller is an accomplished cybersecurity expert with over 13 years of experience in Information Technology. Chris's background includes work with the US Navy's Cyber Defense Operations Command, Cyber Threat Intelligence, and Penetration Testing. His work has resulted in over a dozen CVEs, as well as mentorship and development of junior hackers. Chris is also the Red vs Blue Coach for the US Cyber Team, a machine creator for HackTheBox, and analysis online. Chris is certified as GIAC Security Expert #329, and also holds the CISSP, GXPN, GCPN, GPEN, GCIH, GWAPT, GICSP, GNFA, CASP+, Net+, Sec+, and more.
Jesse holds several certifications in the IT field, including A+, CISSP, CEH, Cloud+, CYSA+, Linux+, Net+, Pentest+, Security+, and Server+. Jesse has spoken at several conferences including many of the DoD Cyber Crime Conferences. He was a member of the Red Team for several years on the Mid-Atlantic College Cyber Defense Competition. He has a master's degree from the University of South Florida (Tampa, FL), and a bachelor's from George Mason University (Fairfax VA). Jesse has written and contributed to several publications, including Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It by.
Jesse also wrote the entire series of labs for Security+, Ethical Hacking, Forensics, and Network Security for NDG's netlab. Jesse lives with his sons Mason and Levi, and daughter Kayla in Ellicott City Maryland in Howard County Maryland.
Christopher Haller is an accomplished cybersecurity expert with over 13 years of experience in Information Technology. Chris's background includes work with the US Navy's Cyber Defense Operations Command, Cyber Threat Intelligence, and Penetration Testing. His work has resulted in over a dozen CVEs, as well as mentorship and development of junior hackers. Chris is also the Red vs Blue Coach for the US Cyber Team, a machine creator for HackTheBox, and analysis online. Chris is certified as GIAC Security Expert #329, and also holds the CISSP, GXPN, GCPN, GPEN, GCIH, GWAPT, GICSP, GNFA, CASP+, Net+, Sec+, and more.
1. Hacking and Securing Your Operating System
2. Update and Change Defaults
or Else!
3. Web Application Hacking and Defense
4. Obfuscation
Deception
and Detection
5. Vulnerability Identification
6. Exploitation and Reverse Shells
7. Privilege Escalation and Persistence
8. Data Exfiltration Leakage (Pwned)
9. Am I Hacked? How Do I Tell?
10. A Career in Cyber
2. Update and Change Defaults
or Else!
3. Web Application Hacking and Defense
4. Obfuscation
Deception
and Detection
5. Vulnerability Identification
6. Exploitation and Reverse Shells
7. Privilege Escalation and Persistence
8. Data Exfiltration Leakage (Pwned)
9. Am I Hacked? How Do I Tell?
10. A Career in Cyber
1. Hacking and Securing Your Operating System, 2. Update and Change Defaults, or Else!, 3. Web Application Hacking and Defense, 4. Obfuscation, Deception, and Detection, 5. Vulnerability Identification, 6. Exploitation and Reverse Shells, 7. Privilege Escalation and Persistence, 8. Data Exfiltration Leakage (Pwned), 9. Am I Hacked? How Do I Tell?, 10. A Career in Cyber
1. Hacking and Securing Your Operating System
2. Update and Change Defaults
or Else!
3. Web Application Hacking and Defense
4. Obfuscation
Deception
and Detection
5. Vulnerability Identification
6. Exploitation and Reverse Shells
7. Privilege Escalation and Persistence
8. Data Exfiltration Leakage (Pwned)
9. Am I Hacked? How Do I Tell?
10. A Career in Cyber
2. Update and Change Defaults
or Else!
3. Web Application Hacking and Defense
4. Obfuscation
Deception
and Detection
5. Vulnerability Identification
6. Exploitation and Reverse Shells
7. Privilege Escalation and Persistence
8. Data Exfiltration Leakage (Pwned)
9. Am I Hacked? How Do I Tell?
10. A Career in Cyber
1. Hacking and Securing Your Operating System, 2. Update and Change Defaults, or Else!, 3. Web Application Hacking and Defense, 4. Obfuscation, Deception, and Detection, 5. Vulnerability Identification, 6. Exploitation and Reverse Shells, 7. Privilege Escalation and Persistence, 8. Data Exfiltration Leakage (Pwned), 9. Am I Hacked? How Do I Tell?, 10. A Career in Cyber