Hacking: Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast (Paperback)
暫譯: 駭客技術:駭客入門、滲透測試駭客書籍、逐步實作與示範指南,快速學習(平裝本)
Alex Wagner
- 出版商: CreateSpace Independ
- 出版日期: 2017-11-12
- 售價: $1,310
- 貴賓價: 9.5 折 $1,245
- 語言: 英文
- 頁數: 584
- 裝訂: Paperback
- ISBN: 1979683239
- ISBN-13: 9781979683234
-
相關分類:
Penetration-test、駭客 Hack
無法訂購
買這商品的人也買了...
-
深入淺出 Python (Head First Python)$780$616 -
$1,365Systems Performance: Enterprise and the Cloud (Paperback) -
跟我學 Excel VBA-將複雜的操作用一個按鍵就搞定!(適用2013/2010/2007)$450$356 -
anidees 黑色鋁製外殼(B+ / Pi 2 / Pi3 適用)$1,200$1,140 -
Node.js 模組參考手冊$580$458 -
精通 Python|運用簡單的套件進行現代運算 (Introducing Python: Modern Computing in Simple Packages)$780$616 -
最新行銷王 - Facebook 廣告沒有說的業績倍增活用術
$350$273 -
Swift - AR 擴增實境與感應器開發$480$408 -
TensorFlow + Keras 深度學習人工智慧實務應用$590$460 -
CentOS 7.3 建置、管理與伺服器架設實戰$580$452 -
寫程式前就該懂的演算法 ─ 資料分析與程式設計人員必學的邏輯思考術 (Grokking Algorithms: An illustrated guide for programmers and other curious people)$390$308 -
Python 架站特訓班 -- Django 最強實戰$450$356 -
Python:期貨演算法交易實務 121個關鍵技巧詳解$500$390 -
輕課程 遇見 micro:bit 用 JavaScript Blocks 積木玩轉新世界$150$135 -
輕課程 micro:bit 微型電腦帶著走:使用 Python 輕鬆玩$150$135 -
演算法圖鑑:26種演算法 + 7種資料結構,人工智慧、數據分析、邏輯思考的原理和應用 step by step 全圖解$450$356 -
為你自己學 Git$500$425 -
Arduino 軟硬體協調設計開發聖經$490$417 -
Python 入門邁向高手之路王者歸來$699$594 -
彼得潘的 Swift 程式設計入門$450$356 -
Powershell: The ultimate beginner’s guide to Powershell, making you a master at Windows Powershell command line fast!$525$515 -
How Cybersecurity Really Works: A Hands-On Guide for Total Beginners (Paperback)$1,470$1,397 -
電腦網路原理, 6/e (含ITS Networking 網路管理與應用國際認證模擬試題)$360$284 -
2024 新趨勢計算機概論 (適合資管、商管學群)$580$458 -
Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World (Paperback)$1,558$1,476
商品描述
HACKING - 5 BOOKS IN 1
- The history of hacking, What motivates Hackers, and how to differentiate one to another
- Networking fundamentals, and basic system requirements
- Where to find the best operating systems for the purpose of Hacking
- What virtualization is, and how to install Hacking software
Penetrating Wired Networks
- Exploiting systems in multiple ways,
- Implementing Man in the Middle attack in multiple ways,
- How to use Social Engineering Toolkits,
- Creating a fake packet and find vulnerabilities,
- How to manipulate the network
Wireless Hacking
- How to own adevice connected remotely
- How to find hidden wireless networks, How to implement a Rouge Wireless Access Point
- Discovering networking devices through wireless
- Exploiting systems in multiple ways using wireless technologies
- Implementing Man in the Middle attack in multiple ways, How to become a wireless access point using your laptop
Hacking Attacks
- ADVWARE
- SPYWARE
- MALWARE
- MAN IN THE MIDDLE
- LOCKY
- TRAFFIC REDIRECTION
- PAYLOAD INJECTION
- ARP POISIONING
- WORMS
- DE-AUTHENTICATION ATTACKS
- COLLISION ATTACKS
- REPLAY ATTACKS
- PHISHING
- VISHING
- WHALING
- SMISHING
- SPEAR PHISHING
- DUMPSTER DIVING
- SHOULDER SURFING
- BRUTE FORCE ATTACK
- DICTIONARY ATTACKS
- RAINBOW TABLES
- KEYSTROKE LOGGINGS
- SPOOFINS
- SOCIAL ENGINEERING
- SPAMMING
- SQL INJECTIONS
- DDOS ATTACKS
- TCP SYN FLOOD ATTACK
- PING OF DEATH
- VIRUSES
- ROOTKITS
- LOGIC BOMBS
- TROJAN HORSES
- WANNAYCRY RANSOMWARE
- BOTNETS
CyberGangs
- Cutting sword of justice,
- Guardians of Peace,
- Honker Union,
- Anonymous
- Syrian Electronic Army,
- LulzSec,
- Carbanac,
- Equation Group,
- The Shadow Brokers
商品描述(中文翻譯)
**駭客技術 - 5 本書合一**
**書籍 1: 初學者指南**
**書籍 2: 無線駭客技術**
**書籍 3: 每位駭客必備的 17 種工具**
**書籍 4: 17 種最危險的駭客攻擊**
**書籍 5: 10 大最危險的網路黑幫**
-------------------------------------------
在本書中,您將學習到:
-------------------------------------------
**基本知識**
- 駭客的歷史、駭客的動機,以及如何區分不同的駭客
- 網路基礎知識及基本系統需求
- 如何找到最適合駭客用途的作業系統
- 什麼是虛擬化,以及如何安裝駭客軟體
**滲透有線網路**
- 以多種方式利用系統
- 以多種方式實施中間人攻擊
- 如何使用社交工程工具包
- 創建假封包並尋找漏洞
- 如何操控網路
**無線駭客技術**
- 如何控制遠端連接的設備
- 如何找到隱藏的無線網路,如何實施惡意無線接入點
- 通過無線發現網路設備
- 使用無線技術以多種方式利用系統
- 以多種方式實施中間人攻擊,如何使用筆記型電腦成為無線接入點
**駭客攻擊**
- ADVWARE
- SPYWARE
- MALWARE
- MAN IN THE MIDDLE
- LOCKY
- TRAFFIC REDIRECTION
- PAYLOAD INJECTION
- ARP POISONING
- WORMS
- DE-AUTHENTICATION ATTACKS
- COLLISION ATTACKS
- REPLAY ATTACKS
- PHISHING
- VISHING
- WHALING
- SMISHING
- SPEAR PHISHING
- DUMPSTER DIVING
- SHOULDER SURFING
- BRUTE FORCE ATTACK
- DICTIONARY ATTACKS
- RAINBOW TABLES
- KEYSTROKE LOGGINGS
- SPOOFING
- SOCIAL ENGINEERING
- SPAMMING
- SQL INJECTIONS
- DDOS ATTACKS
- TCP SYN FLOOD ATTACK
- PING OF DEATH
- VIRUSES
- ROOTKITS
- LOGIC BOMBS
- TROJAN HORSES
- WANNACRY RANSOMWARE
- BOTNETS
**網路黑幫**
- 正義之劍
- 和平守護者
- 鳴響聯盟
- 匿名者
- 敘利亞電子軍
- LulzSec
- Carbanac
- Equation Group
- The Shadow Brokers
