Protection against corporate network hackers

Protection against corporate network hackers

book type
0 Review(s) 
FL/822617/UA
Ukrainian
In stock
грн105.00
грн94.50 Save 10%

  Instant download 

after payment (24/7)

  Wide range of formats 

(for all gadgets)

  Full book 

(including for Apple and Android)

The book examines a modern view of hacking, reengineering and information security. The authors offer readers a list of laws that determine the operation of computer security systems and tell how these laws can be applied in hacking technologies. Describes the types of attacks and the possible damage they can cause to computer systems. The book widely introduces various hacking methods, such as finding differences, methods for recognizing ciphers, the basics of breaking them, and encoding schemes. Covers security issues that arise as a result of unpredictable user input, methods of using machine-oriented language, the possibility of using network communications monitoring, and tunneling mechanisms for intercepting network traffic. The book provides basic information about hardware hacking, viruses, Trojan horses and worms. In this book, the reader will learn about methods that, if used incorrectly, will lead to violation of the law and the associated consequences. The best defense is an attack. In other words, the only way to stop a hacker is to think like him. These phrases embody the approach that, according to the authors, will best ensure the security of an information system. Translation: Alexander Petrenko



The text of the book was translated from the original language using an artificial intelligence program. For the most part, the translation of the text is of very high quality, but in some cases, due to the imperfection of the technology, there may be incorrect phrase translations in the text, as well as single words and expressions may not be translated.
FL/822617/UA

Data sheet

Name of the Author
Автор Неизвестен
Language
Ukrainian

Reviews

Write your review

Protection against corporate network hackers

The book examines a modern view of hacking, reengineering and information security. The authors offer readers a list of laws that determine the operation of ...

Write your review

15 books by the same author:

Products from this category: