Search Results - security hacker

Refine Results
  1. 1

    Hacker

    Published 2003
    Book
  2. 2

    The hacker diaries confessions of teenage hackers by Verton

    Published 2002
    Book
  3. 3

    Hacker's challenge test your incident respons skills using 20 scenarios by Schiffman

    Published 2001
    Subjects: “…Computer hackers…”
    Book
  4. 4

    Profiling hackers by Chiesa, Raoul 1973-

    Published 2009
    Subjects: “…Computer hackers…”
    Book
  5. 5

    The Hacker's handbook the strategy behind breaking into and defending networks by Young lhSusan

    Subjects: “…Computer networks Security measures…”
    Book
  6. 6

    The hacker's handbook the strategy behind breaking into and defending network by Young 1968-

    Published 2004
    Book
  7. 7

    The antivirus hacker's handbook by Koret, Joxean, Bachaalany, Elias

    Published 2015
    Book
  8. 8

    The Mac hacker's handbook by Miller, Charles Alfred

    Published 2009
    Book
  9. 9

    The web application hacker's handbook discovering and exploiting security flaws by Stuttard, Dafydd

    Published 2008
    Book
  10. 10

    The web application hacker's handbook finding and exploiting security flaws by Stuttard, Dafydd

    Published 2011
    Book
  11. 11

    The Browser Hacker's Handbook by Alcorn, Wade

    Published 2014
    Book
  12. 12

    Hacking the hacker :œblearn from the experts who take down hackers by Grimes, Roger A.,œeauthor

    Published 2017
    Book
  13. 13

    The web application hacker's handbook finding and exploiting security flaws by Stuttard, Dafydd 1972-, Pinto, Marcus 1978-

    Published 2011
    Table of Contents: “…. -- Web application (in)security -- Core defense mechanisms -- Web application technologies -- Mapping the application -- Bypassing client-side controls -- Attacking authentication -- Attacking session management -- Attacking access controls -- Injecting code -- Exploiting path traversal -- v. 2. -- Attacking application logic -- Attacking other users -- Automating bespoke attacks -- Exploiting information disclosure -- Attacking compiled applications -- Attacking application architecture -- Attacking the Web server -- Finding vulnerabilities in source code -- A Web application hacker's toolkit -- A Web application hacker's methodology…”
    Book
  14. 14

    Anti-hacker tool kit by Shema, Mike

    Published 2014
    Book
  15. 15

    Gray Hat Hacking: The Ethical Hacker's Handbook by Harper, Allen

    Published 2022
    Subjects: “…Hackers…”
    Book
  16. 16

    Gray hat hacking the ethical hacker's handbook by Harris, Shon

    Published 2008
    Subjects: “…Computer hackers…”
    Book
  17. 17

    Gray hat hacking the ethical hacker's handbook

    Published 2011
    Subjects: “…Computer hackers.…”
    Book
  18. 18

    Certified Ethical Hacker (CEH) Foundation Guide/ by Rahalkar, Sagar Ajay

    Published 2016
    Table of Contents: “…Operating system basics -- Database basics -- Networking basics -- Programming basics for security enthusiasts and hackers -- Virtualization and cloud basics -- Information security basics -- Penetrating testing -- Information gathering -- Hacking basics -- Web application hacking -- Wireless hacking -- Hacking mobile platforms -- IDSes, firewalls, and honeypots -- Cryptography -- Career tracks available after CEH -- Interview questions -- Answers for sample questions.…”
    Book
  19. 19

    Penetration testing essentials by Oriyano, Sean-Philip

    Published 2017
    Subjects: “…Hackers…”
    Book
  20. 20

    Certified ethical hacker (CEH) version 9 cert guide by Gregg, Michael

    Published 2017
    Book