Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 500 000 títulos
  • Títulos exclusivos + Storytel Originals
  • 14 días de prueba gratis, luego $24,900 COP/al mes
  • Cancela cuando quieras
Descarga la app
CO -Device Banner Block 894x1036

Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.

4 Calificaciones

3.5

Duración
3H 21min
Idioma
Inglés
Format
Categoría

No ficción

Ever found yourself being fascinated by the idea of being able to hack into any system? While modern culture has pushed hacking to a screen-based villainous role that can do miracles, there is much more to hacking that remains untold. Hardly anyone feels it necessary to mention how hacking can be an illustrious career option. Similarly, the ease with which cyberattacks can be diverted often remains untold.

Handling computers has gotten easier than before. However, do you know the world of the Internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how can you safeguard yourself from the different threats? Let’s find out.

© 2020 Alex Published (Audiolibro ): 9781662275494

Fecha de lanzamiento

Audiolibro : 17 de agosto de 2020

Etiquetas

    Otros también disfrutaron ...

    1. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
    2. Cybersecurity For Dummies Joseph Steinberg
    3. Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes
    4. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    5. Coders: Who They Are, What They Think and How They Are Changing Our World Clive Thompson
    6. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    7. Cloud Security For Dummies Ted Coombs
    8. Ethical Hacking Introbooks Team
    9. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
    10. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    11. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    12. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    13. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
    14. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
    15. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
    16. Social Engineering: The Science of Human Hacking 2nd Edition Christopher Hadnagy
    17. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    18. The Art of Deception: Controlling the Human Element of Security William L. Simon
    19. Cybercrime Investigators Handbook Graeme Edwards
    20. CCNA: 3 in 1- Beginner's Guide+ Tips on Taking the Exam+ Simple and Effective Strategies to Learn About CCNA (Cisco Certified Network Associate) Routing And Switching Certification Walker Schmidt
    21. Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Bart R. McDonough
    22. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
    23. Cyberdeterrence and Cyberwar Martin C. Libicki
    24. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
    25. CompTIA Network+: 3 in 1- Beginner's Guide+ Tips and Tricks+ Simple and Effective Strategies to Learn About CompTIA Network+ Certification Walker Schmidt
    26. Tor and the Dark Art of Anonymity Lance Henderson
    27. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    28. Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Lance Henderson
    29. Exploding Data: Reclaiming Our Cyber Security in the Digital Age Michael Chertoff
    30. Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA) Benjamin Walker
    31. Darknet: A Beginner's Guide to Staying Anonymous Online Lance Henderson
    32. Computer Programming and Cybersecurity for Beginners: All You Need to Know to Get Started with Python for Data Science, Excel and Ethical Hacking Kevin Clark
    33. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    34. Blockchain For Dummies Tiana Laurence
    35. Data Science John D. Kelleher
    36. A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Bruce Schneier
    37. What is the Dark Web?: The truth about the hidden part of the internet Evan J. Rodgers
    38. Permanent Record: A Memoir of a Reluctant Whistleblower Edward Snowden
    39. Cryptography: A Very Short Introduction Sean Murphy
    40. Pegasus: The Story of the World's Most Dangerous Spyware Laurent Richard
    41. Networking For Dummies (11th Edition): 11th Edition Doug Lowe
    42. Cyber Privacy: Who Has Your Data and Why You Should Care April Falcon Doss
    43. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
    44. Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux | 7 books in 1 HUGO HOFFMAN
    45. Hacking: How to Hack Alex Wagner
    46. Linux for Beginners: 37 Linux Commands you Must Know ATTILA KOVACS
    47. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
    48. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS