Nejnižší cena za posledních 60 dní: 1 289 Kč
Ceny a dostupnost se mohou měnit i několikrát za den. Zkontrolujte si aktuální údaje přímo v e-shopech. Všechny dostupné barvy a velikosti naleznete přímo v e-shopech.
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition.
-Build and launch spoofing exploits with Ettercap
-Induce error conditions and crash
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced
A fully updated fifth edition of the bestselling RSPB Handbook of British Birds--a complete, single source of information on our most familiar birds. This is a revised and updated fifth edition of our bestselling RSPB Handbook of British Birds. This unique guide provides a biography of 280 of the
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety
The Lion Handbook to the Bible was first published in 1973 and has been continuously in print ever since, selling over 3 million copies worldwide. This fascinating guide to the book that has intrigued and inspired millions of people for thousands of years comprises an authoritative yet accessible
Now in its fifth edition, the Oxford Handbook of Emergency Medicine is the essential rapid-reference guide to emergency medicine for everyone from junior doctors to specialist registrars, nurse practitioners, and paramedics. New and improved, the Handbook has been thoroughly revised throughout,
See your app through a hacker's eyes to find the real sources of vulnerabilityThe Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been
The fifth edition of this best-selling handbook features the same detailed approach that has made it the trusted source for raising healthy, productive rabbits -- plus a total redesign with color photos and graphics. Whether you're interested in raising rabbits for show, meat, fur, or as pets, this
The industry bible for communication design and illustration professionals, with updated information, listings, and pricing guidelines. Graphic Artists Guild Handbook is the industry bible for communication design and illustration professionals. A comprehensive reference guide, the Handbook helps
The new Fifth Edition of The SAGE Handbook of Qualitative Research has been significantly revised, and draws together a team of leading scholars to present the latest in the theory and practice of qualitative
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security
Thousands of practitioners and students have relied on this handbook, now thoroughly revised, for authoritative information on the links between psychological and medical issues from infancy through adolescence. Sponsored by the Society of Pediatric Psychology, the volume explores psychosocial
Portable and easy to use, Rogers' Handbook of Pediatric Intensive Care, Fifth Edition, contains key information from the best-selling Rogers' Textbook in a handy format designed for everyday use. Nearly 100 chapters offer a clinically relevant synopsis of core information needed for quick reference
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful,
2018 Reprint of 1941 Fifth Edition. Full facsimile of the original edition, not reproduced with Optical Recognition software. The Robert Collier Letter Book remains one of the more useful books on writing sales letters. As every great copywriter knows, these techniques are directly transferable to
A twenty-fifth anniversary edition of award-winning, bestselling author Kate Atkinson's debut novel, Behind the Scenes at the Museum, a deeply moving and deeply funny family story of happiness and heartbreak National Bestseller Winner of the Whitbread Book of the YearA New York Times Book Review
Updated and revised, Ethics: The Basics, Second Edition, introduces students to fundamental ethical concepts, principles, theories, and traditions while providing them with the conceptual tools necessary to think critically about ethical
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With
The second edition of Ethical Theory: An Anthology features a comprehensive collection of more than 80 essays from classic and contemporary philosophers that address questions at the heart of moral philosophy. Brings together 82 classic and contemporary pieces by renowned philosophers, from
Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team,
New and updated, The Fitness Instructor's Handbook, 4th edition is the essential guide for anyone working in, or wishing to enter, the fitness industry: the ultimate resource for students and qualified fitness professionals alike. This edition includes new text on how to avoid poor exercise