Hacking Handbuch

Hacking Handbuch: Penetrationstests planen und durchführen, seien Sie schneller als die Hacker

Hacking Handbuch: Penetrationstests planen und durchführen, seien Sie schneller als die Hacker von Dr Patrick Engebretson
Deutsch | 27. Juli 2015 | ISBN: 3645604170 | 340 Seiten | PDF (True) | 8.43 MB

Seien Sie schneller als die Hacker und nutzen Sie deren Techniken und Tools: Kali Linux, Metasploit, Armitage, Wireshark, JtR, Rootkits, Netcat, Meterpreter und mehr.
Hacking mit Metasploit: Das umfassende Handbuch zu Penetration Testing und Metasploit

Hacking mit Metasploit: Das umfassende Handbuch zu Penetration Testing und Metasploit von Michael Messner
Deutsch | 2. Apr 2015 | ISBN: 386490224X | 586 Seiten | AZW3/EPUB/PDF (conv) | 54 MB

Metasploit ist ein Penetration-Testing-Werkzeug, das in der Toolbox eines jeden Pentesters zu finden ist. Dieses Buch stellt das Framework detailliert vor und zeigt, wie Sie es im Rahmen unterschiedlichster Penetrationstests einsetzen.

Ethical Hacking and Cyber security Course Hacking Approach  eBooks & eLearning

Posted by naag at Sept. 23, 2017
Ethical Hacking and Cyber security Course  Hacking Approach

Ethical Hacking and Cyber security Course Hacking Approach
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 7 | 309 MB
Genre: eLearning | Language: English

Ethical Hacking , Cyber Security , Kali linux , Web Penetration testing , Bug Bounty , CISSP , metasploit , Wireshark

Hacking: Ultimate Hacking Guide: Hacking For Beginners And Tor Browser  eBooks & eLearning

Posted by naag at Sept. 15, 2017
Hacking: Ultimate Hacking Guide: Hacking For Beginners And Tor Browser

Hacking: Ultimate Hacking Guide: Hacking For Beginners And Tor Browser
English | 2017 | ASIN: B075CX7T6G | 93 pages | AZW3 | 0.2 Mb

Pluralsight - Ethical Hacking: Hacking Mobile Platforms  eBooks & eLearning

Posted by house23 at July 6, 2017
Pluralsight - Ethical Hacking: Hacking Mobile Platforms

Pluralsight - Ethical Hacking: Hacking Mobile Platforms
MP4 | AVC 489kbps | English | 1280x720 | 15fps | 4h 41mins | AAC stereo 72kbps | 667 MB
Genre: Video Training

Your company has decided to start allowing BYOD, plus upper management just purchased multiple mobile devices. Some Apple based, some Android based, some Windows based, and guess who gets to make sure everything stays secure?! This course is part of the Ethical Hacking Series.
WiFi Hacking for Beginners: Learn Hacking by Hacking WiFi networks (Penetration testing, Hacking, Wireless Networks)

WiFi Hacking for Beginners: Learn Hacking by Hacking WiFi networks (Penetration testing, Hacking, Wireless Networks)
English | 2017 | ASIN: B073PL9JF6 | 24 pages | AZW3/PDF/EPUB (conv) | 1 Mb

Hacking kompakt: Die Kunst des Penetration Testing - der Einstieg in die Welt der  eBooks & eLearning

Posted by AlenMiler at Jan. 27, 2016
Hacking kompakt: Die Kunst des Penetration Testing - der Einstieg in die Welt der

Hacking kompakt: Die Kunst des Penetration Testing - der Schnelleinstieg in die Welt der Hacker (Security.Edition) von Holger Reibold
Deutsch | 1. Mai 2015 | ISBN: 3954441608 | 170 Seiten | AZW3/EPUB/PDF (conv) | 7.44 MB

Fast täglich kann man den Medien Berichte über Hacker-Attacken entnehmen. Prominente Angriffe wie der auf den des Deutschen Bundestags sind nur die Spitze des Eisbergs. Täglich werden in Deutschland tausende Unternehmen attackiert.
Certified Ethical Hacker: Ethical Hacking and Countermeasures CEHv6 - Training Labs

Certified Ethical Hacker: Ethical Hacking and Countermeasures CEHv6
EC-Council | 2008 | 4 x DVD ISO (3.72Gb+3.35Gb+3.34Gb+1.21Gb)


EC-Council Course Description
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions  eBooks & eLearning

Posted by Alexpal at Sept. 29, 2009
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
McGraw-Hill Osborne | December 17, 2007 | ISBN: 0071494618 | 258 pages | PDF | 6 MB

Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE7 shortcomings.

Datenanalyse, Abstimmung und Entwicklung (Handbuch Rennwagentechnik)  eBooks & eLearning

Posted by hill0 at Sept. 22, 2017
Datenanalyse, Abstimmung und Entwicklung (Handbuch Rennwagentechnik)

Datenanalyse, Abstimmung und Entwicklung (Handbuch Rennwagentechnik) by Philipp Eder
German | 4 Aug. 2017 | ISBN: 3658155469 | 409 Pages | PDF | 14.06 MB

Einmal Renningenieur zu sein, davon träumen viele Motorsportfans und -Ingenieure. Dieses Buch gibt einen Einblick in den Arbeitsalltag eines Renningenieurs. Es werden die verschiedenen Darstellungsformen von Daten und deren Interpretation beschrieben.