להקשיב ולקרוא

היכנסו לעולם אינסופי של סיפורים

  • קראו והקשיבו כמה שאתם רוצים
  • למעלה ממיליון כותרים
  • ספרים בלעדיים + Storytel Originals
  • ניתן לבטל מתי שרוצים
להרשמה
Details page - Device banner - 894x1036
Cover for Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.

Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.

4 דירוגים

3.5

משך
3 שעות ו-21 דקות
שפה
אנגלית
פורמט
קטגוריה

עיון

Ever found yourself being fascinated by the idea of being able to hack into any system? While modern culture has pushed hacking to a screen-based villainous role that can do miracles, there is much more to hacking that remains untold. Hardly anyone feels it necessary to mention how hacking can be an illustrious career option. Similarly, the ease with which cyberattacks can be diverted often remains untold.

Handling computers has gotten easier than before. However, do you know the world of the Internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how can you safeguard yourself from the different threats? Let’s find out.

© 2020 Alex Published (ספר מוקלט): 9781662275494

תאריך פרסום

ספר מוקלט: 17 באוגוסט 2020

אחרים גם נהנו...

  1. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
    Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  2. Biggest Cyber Crimes in the History
    Biggest Cyber Crimes in the History Introbooks Team
  3. Cloud Security For Dummies
    Cloud Security For Dummies Ted Coombs
  4. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
    Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  5. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  6. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  7. Ethical Hacking for Beginners: Comprehensive Introduction to the  World of Cybersecurity
    Ethical Hacking for Beginners: Comprehensive Introduction to the World of Cybersecurity Brandon Scott
  8. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  9. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  10. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  11. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication.
    Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  12. The Language of Deception: Weaponizing Next Generation AI
    The Language of Deception: Weaponizing Next Generation AI Justin Hutchens
  13. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  14. The NSA Report: Liberty and Security in a Changing World
    The NSA Report: Liberty and Security in a Changing World Richard A. Clarke
  15. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  16. They Know Everything About You: How Data-Collecting Corporations and Snooping Government Agencies Are Destroying Democracy
    They Know Everything About You: How Data-Collecting Corporations and Snooping Government Agencies Are Destroying Democracy Robert Scheer
  17. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  18. Striking Back: The End of Peace in Cyberspace—and How to Restore It
    Striking Back: The End of Peace in Cyberspace—and How to Restore It Lucas Kello
  19. The Great Depression: The Causes of the 1930s Economic Crices, and the Consequences on Society and Culture
    The Great Depression: The Causes of the 1930s Economic Crices, and the Consequences on Society and Culture History Retold
  20. Quantum Computing for Beginners: Unveiling the Future of Technology and Transforming Computational Horizons
    Quantum Computing for Beginners: Unveiling the Future of Technology and Transforming Computational Horizons Steve Abrams
  21. CompTIA A+ Certification Study Guide For 220-1102 Exam 2 Books In 1: Operating Systems, Software Troubleshooting, Security Awareness & Operational Procedures
    CompTIA A+ Certification Study Guide For 220-1102 Exam 2 Books In 1: Operating Systems, Software Troubleshooting, Security Awareness & Operational Procedures HISTORY FOREVER
  22. Greatest Hackers in the History
    Greatest Hackers in the History Introbooks Team
  23. Auto Repair For Dummies: 2nd Edition
    Auto Repair For Dummies: 2nd Edition Deanna Sclar
  24. Mafia Wars in the History
    Mafia Wars in the History Introbooks Team
  25. Studying the chemistry of cannabis: cannabinoid extraction methods
    Studying the chemistry of cannabis: cannabinoid extraction methods Pharmacology University
  26. Nikola Tesla and Thomas Edison: (2 Books in 1) The Rival Inventors Who Powered the Modern Era
    Nikola Tesla and Thomas Edison: (2 Books in 1) The Rival Inventors Who Powered the Modern Era Michael W. Simmons
  27. How Great Generals Win
    How Great Generals Win Bevin Alexander
  28. Re-Made in the USA: How We Can Restore Jobs, Retool Manufacturing, and Compete With the World
    Re-Made in the USA: How We Can Restore Jobs, Retool Manufacturing, and Compete With the World Todd Lipscomb
  29. Industrial Development: Aeronautical, Aerospace, Civil, and Industrial Engineering (5 in 1)
    Industrial Development: Aeronautical, Aerospace, Civil, and Industrial Engineering (5 in 1) Phil Gilberts
  30. RYA Yacht Sailing Techniques (A-G94): Describes the Basic Skills that a Skipper and Crew Require to Enjoy their Cruising in Good Conditions
    RYA Yacht Sailing Techniques (A-G94): Describes the Basic Skills that a Skipper and Crew Require to Enjoy their Cruising in Good Conditions Jeremy Evans
  31. That's Not Funny: How the Right Makes Comedy Work for Them
    That's Not Funny: How the Right Makes Comedy Work for Them Nick Marx
  32. Tech Monopoly: (The MIT Press Essential Knowledge series)
    Tech Monopoly: (The MIT Press Essential Knowledge series) Herbert Hovenkamp
  33. Defending the Free Market: The Moral Case for a Free Economy
    Defending the Free Market: The Moral Case for a Free Economy Robert Sirico
  34. The History of the Oberlin-Wellington Rescue
    The History of the Oberlin-Wellington Rescue Herbert Addison Burns
  35. Long Hard Road: The Lithium-Ion Battery and the Electric Car
    Long Hard Road: The Lithium-Ion Battery and the Electric Car Charles J. Murray
  36. Confessions of a Radical Tax Protestor: An Inside Expose of the Tax Resistance Movement
    Confessions of a Radical Tax Protestor: An Inside Expose of the Tax Resistance Movement Larry R. Williams
  37. Unequal: How extreme inequality is damaging democracy and what we can do about it
    Unequal: How extreme inequality is damaging democracy and what we can do about it David Buckham
  38. Earth's Acidifying Oceans
    Earth's Acidifying Oceans John Rafferty
  39. Across the Board: The Mathematics of Chessboard Problems
    Across the Board: The Mathematics of Chessboard Problems John J. Watkins
  40. Fatal Risk: A Cautionary Tale of AIG's Corporate Suicide
    Fatal Risk: A Cautionary Tale of AIG's Corporate Suicide Roddy Boyd
  41. They Never Let a Crisis Go to Waste: The Truth About Disaster Liberalism
    They Never Let a Crisis Go to Waste: The Truth About Disaster Liberalism Jason Chaffetz
  42. Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power
    Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power Matthew S. Cohen
  43. Debt, Deficits, and the Demise of the American Economy
    Debt, Deficits, and the Demise of the American Economy Jeff Cox

איזה מינוי מתאים לך?

  • מאות אלפי ספרים

  • מצב ילדים (תוכן שמתאים לקטנטנים)

  • הורדת ספרים לקריאה והאזנה בלי אינטרנט

  • אפשר לבטל בכל עת

הבחירה הכי פופולרית
המבצע בתוקף עד 15.10.2025

Unlimited

האזנה וקריאה בלי הגבלה.

49.90 ש"ח /חוֹדֶשׁ
  • חשבון 1

  • גישה בלתי מוגבלת

  • האזנה וקריאה בלי הגבלה

  • קריאה והאזנה גם בלי אינטרנט

  • אפשר לבטל בכל עת

בחירה

Family

גלו ספרים לכל המשפחה. היכנסו יחד לתוך עולם של סיפורים.

69.90 ש"ח /חוֹדֶשׁ
  • 2 חשבונות

  • גישה בלתי מוגבלת

  • שני חשבונות

  • האזנה וקריאה בלי הגבלה

  • אפשר לבטל בכל עת

נסה עכשיו