熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 19 筆, 頁數 1 / 1
呈現:
Hands-On Penetration Testing with Kali NetHunter
|
|||
Kali Linux Wireless Penetration Testing Cookbook
The security of wireless networks is more important than ever before due to widespread usage of WiFi... more |
|||
Cryptography: InfoSec Pro Guide
Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher fo... more |
|||
Client-Side Attacks and Defense
Client-Side Attacks and Defense offers background networks against its attackers. The book examines ... more |
|||
CEH v9: Certified Ethical Hacker Version 9
The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version... more |
|||
Ethical Hacking: Techniques, Tools, and Countermeasures
Previous edition: Hacker techniques, tools, and incident handling. Third edition. Burlington, MA: Jo... more |
|||
Hacker Techniques, Tools and Incident Handling
Print Textbook & Virtual Security Cloud Lab Access: 180-day subscription. Please confirm the ISBNs u... more |
|||
Hacker Techniques, Tools, and Incident Handling
Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools... more |
|||
滲透測試入門實戰
掩藏痕跡、探測並攻擊無線網絡、逃避攻擊檢測、建立滲透測試實驗室和開發滲透測試工具箱、采用先進的方法滲透系統。 作者:Sean-Philip Oriyano是一位資深安全專業人士和企業家。在過去的25年中,他將時間分別投入到安全研究、咨詢和提供...... more |
|||
Lms Bundle
|
|||
Hacker Techniques, Tools, & Incident Response Bundle
|
|||
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetr... more |
|||
The Penetration Tester’s Handbook: The First Steps to Ceh Certification
|
|||
Certified Ethical Hacker Version 9 Kit
|
|||
Ethical Hacking and Web Hacking Handbook + Study Guide
|
|||
Cehv8 Certified Ethical Hacker Version 8: Exam 312-50/Eco-350
|
|||
Hacker Techniques, Tools, and Incident Response
|
|||
Hacker Techniques, Tools, and Incident Handling
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key ter... more |
|||
Hacker Techniques, Tools, and Incident Handling
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Hacker Tec... more |