104,95 €
104,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
52 °P sammeln
104,95 €
104,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
52 °P sammeln
Als Download kaufen
104,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
52 °P sammeln
Jetzt verschenken
104,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
52 °P sammeln
  • Format: ePub

Hackers' profiles, motivations, tricks, techniques, tools, methodologies, and strategies are revealed in this guide. It also discusses known system vulnerabilities and details how to mount countermeasures fast.

  • Geräte: eReader
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 16.16MB
Produktbeschreibung
Hackers' profiles, motivations, tricks, techniques, tools, methodologies, and strategies are revealed in this guide. It also discusses known system vulnerabilities and details how to mount countermeasures fast.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Dave Aitel is the founder of Immunity, Inc. (www.immunitysec.com), with prior experience at both private industry security consulting companies and the National Security Agency. His tools, SPIKE and SPIKE Proxy, are widely regarded as the best black box application assessment tools available.

Susan Young has worked in the security field for the past seven years, four of which have been spent in the security consulting arena, helping clients design and implement secure networks, training on security technologies, and conducting security assessments and penetration tests of client system or network defenses (so-called ethical hacking). Her experience has included consulting work in the defense sector and the financial industry, as well as time spent evaluating and deconstructing various security products. She currently works as a senior security consultant in the Boston area security practice of International Network Services (INS).