Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
28,90 €*
Versandkostenfrei per Post / DHL
auf Lager, Lieferzeit 4-7 Werktage
Kategorien:
Beschreibung
How to Hack Like a Ghost takes readers deep inside the mind of a hacker as they carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way.
• A fast-paced hands-on guide to hacking modern cloud systems.
• Readers shadow a hacker as they describe, with detailed code, how they might hack a tech company and escape detection.
• While the account is fictional, the tech company's vulnerabilities are drawn from real-life weaknesses common in today's corporate, cloud-based systems
• By following along and studying the code, the reader learns practical, cutting-edge hacking techniques
• A fast-paced hands-on guide to hacking modern cloud systems.
• Readers shadow a hacker as they describe, with detailed code, how they might hack a tech company and escape detection.
• While the account is fictional, the tech company's vulnerabilities are drawn from real-life weaknesses common in today's corporate, cloud-based systems
• By following along and studying the code, the reader learns practical, cutting-edge hacking techniques
How to Hack Like a Ghost takes readers deep inside the mind of a hacker as they carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way.
• A fast-paced hands-on guide to hacking modern cloud systems.
• Readers shadow a hacker as they describe, with detailed code, how they might hack a tech company and escape detection.
• While the account is fictional, the tech company's vulnerabilities are drawn from real-life weaknesses common in today's corporate, cloud-based systems
• By following along and studying the code, the reader learns practical, cutting-edge hacking techniques
• A fast-paced hands-on guide to hacking modern cloud systems.
• Readers shadow a hacker as they describe, with detailed code, how they might hack a tech company and escape detection.
• While the account is fictional, the tech company's vulnerabilities are drawn from real-life weaknesses common in today's corporate, cloud-based systems
• By following along and studying the code, the reader learns practical, cutting-edge hacking techniques
Über den Autor
Sparc Flow is a computer security expert specializing in ethical hacking, who has presented his research at international security conferences like Black Hat, DEF CON, Hack In The Box, and more. While his day job consists mainly of performing penetration tests against companies so they can patch vulnerabilities, his passion is writing and sharing hacking knowledge through his acclaimed Hack the Planet books.
Inhaltsverzeichnis
Introduction
Part 1
1. Becoming Anonymous
2. Return of Command and Control
3. Let There Be Infrastructure
Part 2
4. Healthy Stalking
5. Vulnerability Seeking
6. Fracture
Part 37. Behind the Curtain
8. Shawshank Redemption: Breaking Out
9. Sticky Shell
Part 4
10. The Enemy Inside
11. Nevertheless, We Persisted
12. Apotheosis
13. Final Cut
Part 1
1. Becoming Anonymous
2. Return of Command and Control
3. Let There Be Infrastructure
Part 2
4. Healthy Stalking
5. Vulnerability Seeking
6. Fracture
Part 37. Behind the Curtain
8. Shawshank Redemption: Breaking Out
9. Sticky Shell
Part 4
10. The Enemy Inside
11. Nevertheless, We Persisted
12. Apotheosis
13. Final Cut
Details
Erscheinungsjahr: | 2021 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9781718501263 |
ISBN-10: | 1718501269 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Flow, Sparc |
Hersteller: |
Random House LLC US
No Starch Press |
Verantwortliche Person für die EU: | Produktsicherheitsverantwortliche/r, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de |
Maße: | 232 x 177 x 18 mm |
Von/Mit: | Sparc Flow |
Erscheinungsdatum: | 03.05.2021 |
Gewicht: | 0,504 kg |
Über den Autor
Sparc Flow is a computer security expert specializing in ethical hacking, who has presented his research at international security conferences like Black Hat, DEF CON, Hack In The Box, and more. While his day job consists mainly of performing penetration tests against companies so they can patch vulnerabilities, his passion is writing and sharing hacking knowledge through his acclaimed Hack the Planet books.
Inhaltsverzeichnis
Introduction
Part 1
1. Becoming Anonymous
2. Return of Command and Control
3. Let There Be Infrastructure
Part 2
4. Healthy Stalking
5. Vulnerability Seeking
6. Fracture
Part 37. Behind the Curtain
8. Shawshank Redemption: Breaking Out
9. Sticky Shell
Part 4
10. The Enemy Inside
11. Nevertheless, We Persisted
12. Apotheosis
13. Final Cut
Part 1
1. Becoming Anonymous
2. Return of Command and Control
3. Let There Be Infrastructure
Part 2
4. Healthy Stalking
5. Vulnerability Seeking
6. Fracture
Part 37. Behind the Curtain
8. Shawshank Redemption: Breaking Out
9. Sticky Shell
Part 4
10. The Enemy Inside
11. Nevertheless, We Persisted
12. Apotheosis
13. Final Cut
Details
Erscheinungsjahr: | 2021 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9781718501263 |
ISBN-10: | 1718501269 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Flow, Sparc |
Hersteller: |
Random House LLC US
No Starch Press |
Verantwortliche Person für die EU: | Produktsicherheitsverantwortliche/r, Europaallee 1, D-36244 Bad Hersfeld, gpsr@libri.de |
Maße: | 232 x 177 x 18 mm |
Von/Mit: | Sparc Flow |
Erscheinungsdatum: | 03.05.2021 |
Gewicht: | 0,504 kg |
Sicherheitshinweis