Free Delivery Over $100
735 books were found.
Discusses techniques used by malicious attackers in real-world situations; details unorthodox penetration testing... Read More >>
Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits... Read More >>
This one-of-a-kind collection consists of actual cases written by fraud examiners out in the field. These cases... Read More >>
Read More >>
Details the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including... Read More >>
Lists the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying... Read More >>
Pinpoints the dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks... Read More >>
A work from Cengage Learning on hands-on ethical hacking and network defense. Read More >>
"""Don't look now, but your fingerprints are all over the cover of this book. Simply picking it up off the shelf... Read More >>
This fascinating and timely book traces the emergence and evolution of cybercrime as an increasingly intransigent... Read More >>
The information given in this underground handbook will put you into a hacker's mindset and teach you all of the... Read More >>
A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It's bad enough... Read More >>
Identity theft and other confidential information theft have topped the charts as the number 1 cybercrime. In particular,... Read More >>
Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by... Read More >>
The federal computer fraud and abuse statute, 18 U S C 1030, outlaws conduct that victimises computer systems. It... Read More >>
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized... Read More >>