Télécharger le livre :  Hacking et contre hacking : La sécurité informatique
Ajouter à ma liste d'envies
Feuilleter
Ce livre permet de comprendre, via les témoignages de hackers célèbres, comment hacker les hackers ! Tout savoir sur les rock stars de la cybersécurité ! Jour après jour, les whitehats(bienveillants) et les blackhats (criminels) s’affrontent dans le cyberespace pour le...

Editeur : De Boeck Supérieur
Parution : 2019-08-14
Collection : Hors collection Sciences
ePub

19,99
Télécharger le livre :  Taming the Hacking Storm
Ajouter à ma liste d'envies
A transformative new approach to Internet security from an experienced industry expert Taming the Hacking Storm:A Framework for Defeating Hackers and Malware is a groundbreaking new roadmap to solving the ubiquitous Internet security issues currently plaguing countries,...

Editeur : Wiley
Parution : 2025-03-26

PDF, ePub

36,08
Télécharger le livre :  Fighting Phishing
Ajouter à ma liste d'envies
Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to...

Editeur : Wiley
Parution : 2024-01-19

PDF, ePub

25,32
Télécharger le livre :  Ransomware Protection Playbook
Ajouter à ma liste d'envies
Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook,...

Editeur : Wiley
Parution : 2021-09-14

PDF, ePub

25,32
Télécharger le livre :  Hacking Multifactor Authentication
Ajouter à ma liste d'envies
Protect your organization from scandalously easy-to-hack MFA security “solutions”  Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online...

Editeur : Wiley
Parution : 2020-09-28

PDF

36,08
Télécharger le livre :  Cryptography Apocalypse
Ajouter à ma liste d'envies
Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take...

Editeur : Wiley
Parution : 2019-10-15

PDF, ePub

31,65
Télécharger le livre :  Hacking the Hacker
Ajouter à ma liste d'envies
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race....

Editeur : Wiley
Parution : 2017-04-19

PDF, ePub

24,26
Télécharger le livre :  Honeypots for Windows
Ajouter à ma liste d'envies
Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help. But...

Editeur : Apress
Parution : 2006-11-22

PDF

46,34