Norges billigste bøker

Bøker utgitt av NO STARCH PR

Filter
Filter
Sorter etterSorter Populære
  • av Renita Murimi
    427,-

    Algorithms are critical to online cryptographic data protection, and this book gives you a tour of the 10 most significant among them - covering their operation, applications, and flaws. Through real-world examples using each algorithm, you'll get a big-picture view of why cryptography matters and how it can help keep our everyday networked environments safe. Rather than focusing on mathematical and computational theory, the author - an award-winning scholar - demonstrates how to select the right solution for real-world security problems. Each chapter gives an in-depth understanding of a different algorithm, discussing its history, operation, and applications for data protection. You'll learn how these algorithms operate in practice, without sacrificing mathematical rigor. You'll also learn how the algorithms were improved over time, giving you an in-depth understanding of the history of their development and how to work with their existing flaws.

  • av OccupyTheWeb
    429,-

    The second edition of this bestselling introduction to the Linux operating system for hackers and penetration testers has been fully updated and revised, covering the latest version of Kali.If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, this book is an excellent first step. Using Kali Linux—an advanced penetration testing distribution of Linux—you’ll quickly pick up the basics of using the Linux operating system, and acquire the tools and techniques you’ll need to take control of a Linux environment. Later chapters focus on foundational hacking concepts like security, anonymity and scripting, along with practical tutorials and exercises that test your skills.This fully revised second edition covers the latest version of Kali, includes new options for setting up a Linux virtual machine, and discusses some differences between the bash and Z shells used on the newest versions of the distribution. It also addresses contemporary examples of real-world hacking, such as the cyberwar between Russia and Ukraine.You’ll learn how to:Install Kali on a virtual machine and build your own hacking tools Perform common tasks like manipulating text and controlling file and directory permissionsCover your tracks by leveraging the rsyslog logging utilityHide your internet activity using Tor, proxy servers, VPNs, and encrypted emailWrite bash and Python scripts to scan open ports for potential targetsIf you’re ready to dive into hacking, cybersecurity, or pentesting, Linux Basics for Hackers, 2nd Edition is exactly what you need to get going.

  • av Alexei Sisulu Abrahams
    391,-

    Learn how to build a panoramic observatory app for monitoring and collecting datasets from major social-media platforms and online communities—no prior programming experience required! Whether you’re a security researcher, a journalist, an activist, or a scholar, this book is an essential blueprint for building your window into online worlds.Analyzing the billions of social media posts published daily online provides essential data for modern researchers—and this book gives you the tools to build a panoramic view of the digital-community discourse out there waiting to be discovered. Social Media Observatory is an in-depth beginner’s guide to coding web applications that monitor commentary on the major platforms in real time, giving you unparalleled insights into the cultural and political conversations of our time, then empowering you to reach your own conclusions.You’ll first set up a working observatory for public channels on the instant messaging app Telegram, then incorporate Instagram and Twitter with help from the Wayback Machine. You’ll detect Twitter bots via account birth charts, extract text-embedded URLs for analysis, plot interactive Telegram networks to enumerate media bubbles, and map the structure of a social movement on Instagram. Finally, you’ll deploy your observatory to a remote server to collaborate with other investigators. By the end of the book, you’ll have a working website that allows team members to log in, request data collection, and perform analysis of collected data, via an intuitive and user-friendly interface. Along the way, you’ll learn to:Use Python libraries to retrieve Telegram data from a remote APIAnalyze the data you’ve retrieved with PostgreSQL, RabbitMQ, and other toolsStore data in a relational databaseCreate and securely deploy an interactive dashboard for data collection and analysis in the cloudModify your observatory’s functionality to suit your needsWhether you’re a security researcher, a journalist, an activist, or a scholar, Social Media Observatory is an essential blueprint for building your window into online worlds.

  • av David Kennedy
    608,-

    The second edition of the international bestseller Metasploit is written by some of the world’s best hackers and is the only introduction you’ll ever need to the legendary Framework. Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you’ll learn Metasploit’s module system, conventions, and interfaces as you launch simulated attacks.The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world’s top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors. This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module. You’ll learn:Modern pentesting techniques, including network reconnaissance and enumerationThe Metasploit Framework's conventions, interfaces, and module systemClient-side attacksWireless exploitsTargeted social-engineering attacksIn a digital ecosystem increasingly driven by cloud-based and industrial attacks, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.