Amazon Price: $70.00 $35.31 You save: $34.69 (50%). (as of December 13, 2017 14:58 –
Combines the popular Sybex CEH v9: Certified Ethical Hacker Version 9 Study Guide ISBN 978-1-119-25224-5 updated for the CEH v9 exam with the all new CEH v9: Certified Ethical Hacker Version 9 Practice Tests ISBN: 978-1-119-25215-3. With these you get:
The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material.
Continue reading “CEH v9: Certified Ethical Hacker Version 9 Kit”
Amazon Price: N/A (as of December 13, 2017 11:03 –
'The Dark Web – Double Deep Net' is a very special edition double pack available for a limited time only at this special price – don't miss out!
This special 2-pack guide includes:
'The Dark Web: Exploration of the Deep Web' &
'The Dark Net Black Book: Linking you to the Other Side'
Continue reading “The Dark Web: Double Deep Net”
The world is becoming ever more interconnected and vulnerable, as has been demonstrated by the recent cyber attacks on Estonia. Thus the need for stringent and comprehensive methods for combating cyber crime and terror have never before been needed more than now. CyberWar, CyberTerror, CyberCrime is a straightforward and pragmatic guide. It details how best practices and standards can be used to combat cyber criminals and terrorists. This book is written by Dr. Julie Mehan who is a Principal Analyst for a strategic consulting firm in the State of Virginia. She has been a Government Service employee, a strategic consultant, and an entrepreneur. Until November 2007, she was the co-founder of a small woman-owned company focusing on secure, assured software modernization and security services. She led business operations, as well as the information technology governance and information assurance-related services, including certification and accreditation, systems security engineering process improvement, and information assurance strategic planning and programme management. During previous years, Dr Mehan delivered information assurance and security-related privacy services to senior department of defense, federal government, and commercial clients working in Italy, Australia, Canada, Belgium, and the United States. Information security should not be an after thought. It should be ingrained into the organization's culture. This book will help you create this forward thinking culture using best practices and standards.
Click here to buy from Amazon
Amazon Price: N/A (as of April 1, 2016 14:37 –
"Un pamphlet tanto breve quanto fulminante" (Il Corriere della Sera – La Lettura)
Come nasce il movimento Anonymous? Cosa si nasconde dietro la maschera di V for Vendetta? Cosa distingue un vero Anonymous da un falso Anonymous? Che cos’è il progetto Mayhem, previsto per il 21 dicembre 2012? La storia e i paradossi del gruppo di hacker più famoso del mondo. Uno sguardo esterno a un movimento senza interno. Un libro anonimo per tempi anomali.
Amazon Price: N/A (as of December 13, 2017 13:38 –
Learn the Hidden Secrets of Computer Hackers! 2nd edition – Now in paperback!
Are you curious about the world of hacking? Do you know how hackers break down passwords and break into systems? Would you like to protect your computer systems – and your personal information?
Continue reading “Hacking: Penetration Testing, Basic Security and How To Hack (Hackers, Hacking, How to Hack, Penetration Testing, Internet Security, Computer Virus)”