Oblasti, naše knjige
Oblasti, drugi izdavači
Ukupno 23 – Strana 1 od 2
Naučite kako da borite protiv zlonamernih programa.
Cena 2200 RSD
Naša cena 2000 RSD
Understand the nitty-gritty of Cybersecurity with ease
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker.
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers
U knjizi Napadi na mrežne protokole autor James Forshaw, jedan od najvećih svetskih lovaca na programske greške, zaronio je duboko ispod površine bezbednosti mrežnih protokola. U ovom s
Cena 1800 RSD
Naša cena 1620 RSD
Discover the next level of network defense with the Metasploit framework
A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.
A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers.
A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world
Explore every nook and cranny of the Android OS to modify your device and guard it against security threats
Boost your confidence and get the competitive edge you need to crack the exam in just 21 days!
Secure your Linux machines and keep them secured with the help of exciting recipes
Ovladajte alatima i tehnikama za forenzičke istrage mobilnih uređaja
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them
This book provides a thorough and comprehensive introduction to computer security.
Perfect security is impossible. Nevertheless, it’s possible to build and operate security systems far more effectively. Thinking Security will help you do just that.
This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around.