Datakommunikasjon og nettverk
Filter
Go H*ck Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you'll …
This introduction to hacking covers everything you need to know to start your own journey to becoming an ethical hacker. With help from a lab setup that lets you hack along to each …
Bug bounty programmes are company-sponsored programmes that invite researchers to search for vulnerabilities on their applications and reward them for their findings. This book is …
Today, companies find themselves targeted by sophisticated nation state cyber attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide …
Step into the shoes of a master hacker as he breaks into an intelligent, highly defensive Windows environment. You'll be infiltrating the suspicious (fictional) offshoring company …
You'll learn how REST and GraphQL APIs work in the wild and set up a streamlined API testing lab with Burp Suite and Postman. Then you'll master tools useful for reconnaissance, …
It s easy to capture packets with Wireshark, the world s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what s …
Foundations of Information Security provides readers with fundamental knowledge of information security in both theoretical and practical aspects. Each chapter explores one main …
Written by leading macOS threat analyst Patrick Wardle, The Art of Mac Malware Analysis covers the knowledge and hands-on skills required to analyze Mac malware. Using real-world …
Network security is not simply about building impenetrable walls determined attackers will eventually overcome traditional defenses. The most effective computer security strategies …