Scarica Libri Gratuiti

Scarica libri ed ebooks (I migliori libri in formato PDF, EPUB, etc)

Cerca negli ebook:

Numero totale di libri trovati 40 per la tua ricerca. Scarica gli ebook e divertiti!
Hackers

Hackers

Autore: Federico Mazzini

Numero di pagine: 101

L'hacking non nasce con i computer. Già agli inizi del Novecento dei giovani appassionati modificavano i propri apparecchi radio per ottenere prestazioni non previste dal loro produttore. Alcuni decenni dopo, negli anni '60, si diffondono i 'phone phreaks', degli 'hacker dei telefoni' che prefigurano molte caratteristiche della odierna cultura digitale. Con la diffusione dei PC i gruppi hacker diventano un fenomeno mediatico e di massa. Alla metà degli anni '80, quello che fino ad allora era stato considerato come un 'ragazzo prodigio' si trasforma in una potenziale minaccia come autore di clamorose truffe o altre pratiche criminali. Ma in quegli stessi anni le pratiche hacker cominciano ad assumere un valore politico: nascono il cosiddetto hacktivismo e le comunità Free Software e Open Source, che in poco tempo rivoluzioneranno l'industria del software e la cultura digitale nel suo complesso. Oggi il fenomeno hacker è arrivato a occupare un ruolo di primo piano nella geopolitica contemporanea grazie alla nascita di gruppi su scala globale come Anonymous e all'incorporazione dell'hacking nelle strutture militari e di intelligence.

The New Hacker's Dictionary, third edition

The New Hacker's Dictionary, third edition

Autore: Eric S. Raymond

Numero di pagine: 588

This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. Historically and etymologically richer than its predecessor, it supplies additional background on existing entries and clarifies the murky origins of several important jargon terms (overturning a few long-standing folk etymologies) while still retaining its high giggle value. Sample definition hacker n. [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating {hack value}. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in `a UNIX hacker'. (Definitions 1 through 5 are correlated, and...

Criminal Behavior

Criminal Behavior

Autore: Jacqueline B. Helfgott

Numero di pagine: 625

This textbook provides an interdisciplinary overview of theories of crime, explanations of how and why criminal typologies are developed, literature reviews for each of the major crime catagories, and discussions of how theories of crime are used at different stages of the criminal justice process.

CEH Certified Ethical Hacker Cert Guide

CEH Certified Ethical Hacker Cert Guide

Autore: Omar Santos , Michael Gregg

Numero di pagine: 1064

Certified Ethical Hacker (CEH) Cert Guide Your comprehensive guide to mastering ethical hacking and preparing for the CEH v15 exam. Bestselling authors and security experts Michael Gregg and Omar Santos bring you the most up-to-date and practical preparation guide for the CEH v15 exam. Whether you’re preparing to become a Certified Ethical Hacker or looking to deepen your knowledge of cybersecurity threats and defenses, this all-in-one guide delivers the essential content and hands-on practice you need to succeed. This newly updated edition reflects the latest EC-Council exam objectives and the evolving threat landscape, including cloud, IoT, AI-driven attacks, and modern hacking techniques. Designed for both exam readiness and long-term career success, this guide features Chapter-opening objective lists to focus your study on what matters most Key Topic indicators that highlight exam-critical concepts, figures, and tables Exam Preparation Tasks that include real-world scenarios, review questions, key term definitions, and hands-on practice A complete glossary of ethical hacking terms to reinforce essential vocabulary Master all CEH v15 topics, including Ethical hacking...

The Hacker Mindset

The Hacker Mindset

Autore: Garrett Gee

Numero di pagine: 192

USA TODAY BESTSELLER For the countless people feeling trapped in their jobs and whose talents aren’t being fully utilized, this book offers a wake-up call to break free from the constraints of ordinary employment and achieve true financial freedom. When boy genius Garrett Gee started working for the federal government at age 15, he figured fame and fortune were only a stone’s throw away. Despite impressive credentials and enormous potential in the world of computer hacking, Gee found himself years later as just another salaried employee. He soon realized that though he was a hacker at work, he was a slacker when it came to leading his own life. But as soon as he applied his meticulous hacker mindset to his personal life, everything changed—and success rolled in quickly. Those who feel unfulfilled and stuck in the system, unable to realize their dreams as their careers merely bump along, can use this same hacker mindset in any situation or industry to overcome obstacles and identify the quickest path to true success—a success they can define for themselves. Drawing on decades of experience in cybersecurity, Gee outlines our innate hacker abilities in the face of society’s ...

Certified Ethical Hacker (CEH) Cert Guide

Certified Ethical Hacker (CEH) Cert Guide

Autore: Michael Gregg

Numero di pagine: 746

This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CEH v8 exam success with this cert guide from Pearson IT Certification, a leader in IT certification learning. Master CEH exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks Certified Ethical Hacker (CEH) Cert Guide is a best-of-breed exam study guide. Leading security consultant and certification expert Michael Gregg shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. You'll get a complete test preparation routine organized around proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you...

Certified Ethical Hacker (CEH) Version 10 Cert Guide

Certified Ethical Hacker (CEH) Version 10 Cert Guide

Autore: Omar Santos , Michael Gregg

Numero di pagine: 1037

In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 10 exam and advance your career in IT security. The authors’ concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book supports both efficient exam preparation and long-term mastery: · Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives · Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success · Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career · Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field’s essential terminology This study guide helps you master all the topics on the latest CEH exam, including ·...

Thinking Like a Hacker: Strategies for Innovative Problem-Solving and Security

Thinking Like a Hacker: Strategies for Innovative Problem-Solving and Security

Autore: Terra Stevenson

Numero di pagine: 128

Thinking Like a Hacker: Innovative Problem-Solving and Cybersecurity Secrets This comprehensive guide provides an insider's perspective on the mindset and techniques that drive successful problem-solvers and cybersecurity professionals. Uncover the secrets of hackers, master their analytical approach, and gain the skills to tackle complex challenges with creativity and innovation. The book delves into the key concepts of problem-solving, including reconnaissance, information gathering, and threat modeling. It explores the latest security threats and vulnerabilities, equipping readers with a deep understanding of cybersecurity risks and mitigation strategies. With hands-on exercises and real-world examples, readers will learn to think strategically, identify potential weaknesses, and develop effective solutions. This book is an essential resource for anyone aspiring to work in cybersecurity, software development, or any field that requires critical thinking and problem-solving abilities. It is also a valuable asset for individuals looking to enhance their cybersecurity knowledge and protect themselves against emerging threats. Why You Should Buy This Book: Gain a deep understanding ...

Hacker Culture A to Z

Hacker Culture A to Z

Autore: Kim Crawley

Numero di pagine: 289

Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones. Understand the relationship between hacker culture and cybersecurity Get to know the ideas behind the hacker ethos, like "knowledge should be free" Explore topics and publications central to hacker culture, including 2600 Magazine Appreciate the history of cybersecurity Learn about key figures in the history of hacker culture Understand the difference between hackers and cybercriminals

Exploring Malicious Hacker Communities

Exploring Malicious Hacker Communities

Autore: Ericsson Marin , Mohammed Almukaynizi , Soumajyoti Sarkar , Eric Nunes , Jana Shakarian , Paulo Shakarian , Edward G. Amoroso

Numero di pagine: 225

Cutting-edge models for proactive cybersecurity, applying AI, learning, and network analysis to information mined from hacker communities.

InfoWorld

InfoWorld

Numero di pagine: 76

InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.

Hack the hacker before they hack you

Hack the hacker before they hack you

Autore: Arya Tyagi

Numero di pagine: 49

I Wrote this book with empathy for your excursion as an Entrepreneur, Digital Marketing Consultant and Cyber Security Researcher. This book is comprehensive guide to Ethical Hacking and Cyber Security. By reading this book you get knowledge and concept clearing regarding Ethical Hacking and cyber Security.This Book will assist all the social media users/Internet users to understand all the grey areas regarding the social media attacks and how to prevent with them.

Hacker Culture and the New Rules of Innovation

Hacker Culture and the New Rules of Innovation

Autore: Tim Rayner

Numero di pagine: 195

Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company’s innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals. Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world’s most innovative companies proudly display their hacker credentials. Hacker culture grew up on the margins of the computer industry. It entered the business world in the twenty-first century through agile software development, design thinking and lean startup method, the pillars of the contemporary startup industry. Startup incubators today are filled with hacker entrepreneurs, running fast, cheap experiments to push against the limits of the unknown. As corporations, not-for-profits and government departments pick up on these practices, seeking to replicate the creative energy of the startup industry, hacker culture is changing how we think about leadership, work and innovation. This book is for business leaders, entrepreneurs and academics interested in how digital ...

Certified Ethical Hacker (CEH) v12 312-50 Exam Guide

Certified Ethical Hacker (CEH) v12 312-50 Exam Guide

Autore: Dale Meredith

Numero di pagine: 664

Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam Key Features Learn how to look at technology from the standpoint of an attacker Understand the methods that attackers use to infiltrate networks Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock tests Book DescriptionWith cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book. This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on...

Steal This Computer Book 4.0

Steal This Computer Book 4.0

Autore: Wallace Wang

Numero di pagine: 384

If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you’ll discover: –How to manage and fight spam and spyware –How Trojan horse programs and rootkits work and how to defend against them –How hackers steal software and defeat copy-protection...

Russian Hackers and the War in Ukraine

Russian Hackers and the War in Ukraine

Autore: Julia Sweet

Numero di pagine: 140

Since the beginning of the Russian aggression in Ukraine (February 2022), hackers have become more active on a global scale. The clashes between Russian and Ukrainian “cyber armies” are at its central front line. Russian Hackers and the War in Ukraine: Digital Threats and Real-World Consequences scrutinizes the unique situation where cyber criminals, who usually operate clandestinely, have surfaced and looked for public attention and approval. This book does not cover technical aspects of hacking. Instead, it scrutinizes the public activity of Russian hacker groups including building their brand, communicating with supporters, their financial situation, and other crucial aspects. This research draws mainly on open sources such as social media entries comprised of texts, videos, images, and chat comments which were collected through daily monitoring of the hacking groups’ activities.

CEH Certified Ethical Hacker Study Guide

CEH Certified Ethical Hacker Study Guide

Autore: Kimberly Graves

Numero di pagine: 426

Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf

THE ETHICAL HACKER'S HANDBOOK

THE ETHICAL HACKER'S HANDBOOK

Autore: Anup Bolshetty

Numero di pagine: 54

In the digital age, cybersecurity has become a top priority for individuals and businesses alike. With cyber threats becoming more sophisticated, it's essential to have a strong defense against them. This is where ethical hacking comes in - the practice of using hacking techniques for the purpose of identifying and fixing security vulnerabilities. In "THE ETHICAL HACKER'S HANDBOOK" you'll learn the tools and techniques used by ethical hackers to protect against cyber attacks. Whether you're a beginner or a seasoned professional, this book offers a comprehensive guide to understanding the latest trends in cybersecurity. From web application hacking to mobile device hacking, this book covers all aspects of ethical hacking. You'll also learn how to develop an incident response plan, identify and contain cyber attacks, and adhere to legal and ethical considerations. With practical examples, step-by-step guides, and real-world scenarios, "THE ETHICAL HACKER'S HANDBOOK" is the ultimate resource for anyone looking to protect their digital world. So whether you're a business owner looking to secure your network or an individual looking to safeguard your personal information, this book has ...

Secret Hacker Networks

Secret Hacker Networks

Autore: Lucas Lee , Ai

Numero di pagine: 126

Secret Hacker Networks explores the intricate world of cybercrime by examining the collaborative networks that empower hackers. Moving beyond the image of lone individuals, the book uncovers the architecture, tools, and real-world impacts of these interconnected groups. These networks often thrive on shared resources like stolen data markets and hacking tool repositories, amplifying the scale and sophistication of cyber attacks. The book traces the evolution of hacker networks, highlighting factors like readily available hacking tools, the rise of cryptocurrency, and globalized communication, which have fueled their growth. By analyzing firsthand accounts, leaked data, and case studies, Secret Hacker Networks provides a comprehensive view into how these networks operate and maintain anonymity. Understanding these dynamics is vital for developing effective cybersecurity strategies, making the book essential for cybersecurity professionals, technology enthusiasts, and anyone seeking to navigate the increasingly complex landscape of online security and cybercrime. The book progresses from basic concepts of hacker networks to examining shared resources and incentives for...

The Hacker Crackdown

The Hacker Crackdown

Autore: Bruce Sterling

Numero di pagine: 222

The bestselling cyberpunk author “has produced by far the most stylish report from the computer outlaw culture since Steven Levy’s Hackers” (Publishers Weekly). Bruce Sterling delves into the world of high-tech crime and punishment in one of the first books to explore the cyberspace breaches that threaten national security. From the crash of AT&T’s long-distance switching system to corporate cyberattacks, he investigates government and law enforcement efforts to break the back of America’s electronic underground in the 1990s. In this modern classic, “Sterling makes the hackers—who live in the ether between terminals under noms de net such as VaxCat—as vivid as Wyatt Earp and Doc Holliday. His book goes a long way towards explaining the emerging digital world and its ethos” (Publishers Weekly). This edition features a new preface by the author that analyzes the sobering increase in computer crime over the twenty-five years since The Hacker Crackdown was first published. “Offbeat and brilliant.” —Booklist “Thoroughly researched, this account of the government’s crackdown on the nebulous but growing computer-underground provides a thoughtful report on the...

Ethical Hacker

Ethical Hacker

Autore: Virginia Loh-hagan

Numero di pagine: 36

From the interesting and intriguing to the weird and wonderful Odd Jobs: Ethical Hacker is HIGH interest combined with a LOW level of complexity to help struggling readers along. The carefully written, considerate text will hold readers’ interest and allow for successful mastery, understanding, and enjoyment of reading about Ethic Hackers. Clear, full-color photographs with captions provide additional accessible information. A table of contents, glossary with simplified pronunciations, and index all enhance achievement and comprehension.

Encyclopedia of White-Collar & Corporate Crime

Encyclopedia of White-Collar & Corporate Crime

Autore: Lawrence M. Salinger

Numero di pagine: 1013

In a thorough reappraisal of the white-collar and corporate crime scene, this Second Edition builds on the first edition to complete the criminal narrative in an outstanding reference resource.

Certified Ethical Hacker (CEH) Version 9 Cert Guide

Certified Ethical Hacker (CEH) Version 9 Cert Guide

Autore: Michael Gregg

Numero di pagine: 1098

This is the eBook edition of the Certified Ethical Hacker (CEH) Version 9 Cert Guide. This eBook does not include the practice exam that comes with the print edition. In this best-of-breed study guide, Certified Ethical Hacker (CEH) Version 9 Cert Guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael’s concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book is designed to support both efficient exam preparation and long-term mastery: · Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives · Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success · Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and ...

Halting the Hacker

Halting the Hacker

Autore: Donald L. Pipkin

Numero di pagine: 388

Get into the hacker's mind--and outsmart him! Fully updated for the latest threats, tools, and countermeasures Systematically covers proactive, reactive, and preemptive security measures Detailed, step-by-step techniques for protecting HP-UX, Linux, and UNIX systems "Takes on even more meaning now than the original edition!" --Denny Georg, CTO, Information Technology, Hewlett-Packard Secure your systems against today's attacks--and tomorrow's. Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Top Hewlett-Packard security architect Donald L. Pipkin has updated this global bestseller for today's most critical threats, tools, and responses. Pipkin organizes this book around the processes hackers use to gain access, privileges, and control--showing you exactly how they work and the best ways to respond. Best of all, Pipkin doesn't just tell you what to do, but why. Using dozens of new examples, he gives you the skills and mindset to protect yourself against any current exploit--and attacks that haven't even been...

Webster's New World Hacker Dictionary

Webster's New World Hacker Dictionary

Autore: Bernadette Hlubik Schell , Clemens Martin

Numero di pagine: 433

The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect. Cyberspace has a language all its own. Understanding it is vital if you're concerned about Internet security, national security, or even personal security. As recent events have proven, you don't have to own a computer to be the victim of cybercrime—crackers have accessed information in the records of large, respected organizations, institutions, and even the military. This is your guide to understanding hacker terminology. It's up to date and comprehensive, with: Clear, concise, and accurate definitions of more than 875 hacker terms Entries spanning key information-technology security concepts, organizations, case studies, laws, theories, and tools Entries covering general terms, legal terms, legal cases, and people Suggested further reading for definitions This unique book provides a chronology of hacker-related developments beginning with the advent of the computer and continuing through current events in what is...

IT Governance

IT Governance

Autore: Alan Calder , Steve Watkins

Numero di pagine: 388

"This new edition of a unique handbook is fully updated for the latest regulatory and technological developments. Containing the 2005 revisions to BS7799 and ISO17799, it guides business managers through the issues involved in achieving ISO certification in information Security Management and covers all aspects of data security." "Written by business managers for business managers, it is an essential resource to be used in organizations of all shapes and sizes, and particularly those with well-developed internal IT systems and those focussed on e-commerce."--Jacket.

Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management

Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management

Autore: Hossein Bidgoli

Numero di pagine: 1154

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Bad Girls

Bad Girls

Autore: A. Susan Owen , Leah R. Vande Berg , Sarah R. Stein

Numero di pagine: 292

Bad Girls examines representational practices of film and television stories beginning with post-Vietnam cinema and ending with postfeminisms and contemporary public disputes over women in the military. The book explores a diverse range of popular media texts, from the Alien saga to Ally McBeal and Sex and the City, from The Net and VR5 to Sportsnight and G.I. Jane. The research is framed as a study of intergenerational tensions in portrayals of women and public institutions - in careers, governmental service, and interactions with technology. Using iconic texts and their contexts as a primary focus, this book offers a rhetorical and cultural history of the tensions between remembering and forgetting in representations of the American feminist movement between 1979 and 2005. Looking forward, the book sets an agenda for discussion of gender issues over the next twenty-five years and articulates with authority the manner in which «transgression» itself has become a site of struggle.

Computer Forensics

Computer Forensics

Autore: Michael Sheetz

Numero di pagine: 180

Would your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks. The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs. Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the computer crimes that can annoy, interrupt--and devastate--a business. Readers are equipped not only with a solid understanding of how computers facilitate fraud and...

Human Factors Analysis of 23 Cyberattacks

Human Factors Analysis of 23 Cyberattacks

Autore: Abbas Moallem

Numero di pagine: 207

As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.4 billion a day. While technical issue analyses are fundamental in understanding how to improve system security, analyzing the roles of human agents is crucial. Human Factors Analysis of 23 Cyberattacks addresses, through examples, the human factors behind cybersecurity attacks. Focusing on human factors in individual attack cases, this book aims to understand the primary behaviors that might result in the success of attacks. Each chapter looks at a series of cases describing the nature of the attack through the reports and reviews of the experts, followed by the role and human factors analysis. It investigates where a human agent's intervention was a factor in starting, discovering, monitoring, or suffering from the attacks. Written in an easy-to-understand way and free from technical jargon, the reader will develop a thorough understanding of why cyberattacks occur and how they can be mitigated by comparison to the practical examples provided. This title will appeal to students and practitioners in the fields of...

CEH: Official Certified Ethical Hacker Review Guide

CEH: Official Certified Ethical Hacker Review Guide

Autore: Kimberly Graves

Numero di pagine: 267

Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so you’ll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.

CEH: Certified Ethical Hacker Version 8 Study Guide

CEH: Certified Ethical Hacker Version 8 Study Guide

Autore: Sean-philip Oriyano

Numero di pagine: 514

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and much more. A companion website includes additional study tools, Including practice exam and chapter review questions and electronic flashcards. Security remains the fastest growing segment of IT, and CEH certification provides unique skills The CEH also satisfies the Department of Defense’s 8570 Directive, which requires all Information Assurance government positions to hold one of the approved certifications This Sybex study guide is perfect for candidates studying on their own as well as those who are taking the CEHv8 course Covers all the exam objectives with an easy-to-follow approach...

Maximum Security

Maximum Security

Autore: Anonymous

Numero di pagine: 981

Security issues are at an all-time high. This volume provides updated, comprehensive, platform-by-platform coverage of security issues, and includes to-the-point descriptions of techniques hackers use to penetrate systems. This book provides information for security administrators interested in computer and network security and provides techniques to protect their systems.

CSO

CSO

Numero di pagine: 40

The business to business trade publication for information and physical Security professionals.

Basi di Linux per hacker

Basi di Linux per hacker

Autore: Occupy Theweb

Numero di pagine: 268

Questo libro è il perfetto punto di partenza per tutti coloro che sono interessati all’hacking e alla cybersecurity. Il testo illustra le basi del sistema operativo Linux, con particolare attenzione alla distribuzione Kali, la più usata nel mondo dell’hacking. Per prima cosa viene spiegato come installare Kali su una macchina virtuale e vengono presentati i concetti di base di Linux. Si passa quindi agli argomenti più avanzati, come la manipolazione del testo, le autorizzazioni di file e directory e la gestione delle variabili d’ambiente. Infine, sono presentati i concetti fondamentali dell’hacking, come la cybersecurity e l’anonimato, e viene introdotto lo scripting con bash e Python. Il testo è arricchito da molti esempi ed esercizi per testare le competenze acquisite.

Quaderno dei lavori 2007 - Terzo Seminario Nazionale di Sociologia del Diritto (AIS- Sezione di Sociologia del Diritto)

Quaderno dei lavori 2007 - Terzo Seminario Nazionale di Sociologia del Diritto (AIS- Sezione di Sociologia del Diritto)

Numero di pagine: 147
Hack I.T.

Hack I.T.

Autore: T. J. Klevinsky , Scott Laliberte , Ajay Gupta

Numero di pagine: 550

CD-ROM contains: Freeware tools.

Redefining Management Practices and Marketing in Modern Age

Redefining Management Practices and Marketing in Modern Age

Autore: Dr.dilip B. Patil , Dr.dinesh D.bhakkad

Numero di pagine: 249
Computerworld

Computerworld

Numero di pagine: 124

For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.

Ultimi ebook e autori ricercati