Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website, Norberg Scott


Варианты приобретения
Цена: 41920.00T
Кол-во:
 о цене
Наличие: Отсутствует. Возможна поставка под заказ.

При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Norberg Scott
Название:  Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website
ISBN: 9781484260166
Издательство: Springer
Классификация:

ISBN-10: 1484260163
Обложка/Формат: Paperback
Страницы: 405
Вес: 0.74 кг.
Дата издания: 30.10.2020
Язык: English
Размер: 25.40 x 17.78 x 2.21 cm
Ссылка на Издательство: Link
Поставляется из: Германии
Описание: Intermediate-Advanced user level

Kali Linux - Assuring Security by Penetration Testing: With Kali Linux you can test the vulnerabilities of your network and then take steps to secure

Автор: Heriyanto Tedi, Allen Lee
Название: Kali Linux - Assuring Security by Penetration Testing: With Kali Linux you can test the vulnerabilities of your network and then take steps to secure
ISBN: 184951948X ISBN-13(EAN): 9781849519489
Издательство: Неизвестно
Рейтинг:
Цена: 60070.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals.


Key Features:

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits



Book Description:

Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.


Kali Linux - Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today's digital age.



What You Will Learn:

Develop the Kali Linux environment in your test lab by installing, configuring, running, and updating its core system components

Perform a formal Kali Linux testing methodology

Scope your target with definitive test requirements, limitations, business objectives, and schedule the test plan

Exercise a number of security tools from Kali Linux, logically divided into subcategories of testing methodology

Practice the processes of reconnaissance, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, and maintaining access to target for evaluation purposes

Document, report, and present your verified test results to the relevant authorities in a formal reporting structure

SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks

Автор: Caselli Edoardo, Galluccio Ettore, Lombari Gabriele
Название: SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks
ISBN: 183921564X ISBN-13(EAN): 9781839215643
Издательство: Неизвестно
Рейтинг:
Цена: 47810.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Web Application Security is a relevant aspect nowadays. Many operations and transactions happen every day on the Worldwide Web, often relying on Databases. SQL Injection Strategies will both show you SQL injection in action, alongside defensive measures. The book also deals with SQL Injection scenarios in the IoT and mobile environments

By Understanding the Maoist Approach to Revolution and Its Inherent Contradictions, Insights Will Be Gained on Taliban Vulnerabilities

Автор: Han Shepherd N.
Название: By Understanding the Maoist Approach to Revolution and Its Inherent Contradictions, Insights Will Be Gained on Taliban Vulnerabilities
ISBN: 124936356X ISBN-13(EAN): 9781249363569
Издательство: Неизвестно
Рейтинг:
Цена: 71050.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.

Maritime Security Risks, Vulnerabilities and Cooperation

Автор: Lee Cordner
Название: Maritime Security Risks, Vulnerabilities and Cooperation
ISBN: 3319627546 ISBN-13(EAN): 9783319627540
Издательство: Springer
Рейтинг:
Цена: 121110.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book uniquely employs risk and vulnerability approaches to advocate international policy options for enhancing maritime security cooperation in the Indian Ocean region. Understanding shared risks and common vulnerabilities that impact the achievement of mutual objectives in the oceanic domain present practical bases for progressing collective action. The Indian Ocean sea lanes are the world’s most important thoroughfares for energy resources (oil, gas and coal) and other cargoes. Secure maritime trade routes are vital to global, regional and national economies. Further, security challenges resulting from marine environmental degradation impacted by climate change are rising. Regional and extra-regional actors need to work more closely together to impose law and order at sea, control regional conflicts, respond to humanitarian crises and natural disasters, and conserve the marine environment. This book provides an invaluable resource for political leaders, policy advisers, academic researchers, military professionals, and students of international security and strategic studies.

Maritime Security Risks, Vulnerabilities and Cooperation

Автор: Lee Cordner
Название: Maritime Security Risks, Vulnerabilities and Cooperation
ISBN: 3319873857 ISBN-13(EAN): 9783319873855
Издательство: Springer
Рейтинг:
Цена: 83850.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book uniquely employs risk and vulnerability approaches to advocate international policy options for enhancing maritime security cooperation in the Indian Ocean region. Understanding shared risks and common vulnerabilities that impact the achievement of mutual objectives in the oceanic domain present practical bases for progressing collective action. The Indian Ocean sea lanes are the world’s most important thoroughfares for energy resources (oil, gas and coal) and other cargoes. Secure maritime trade routes are vital to global, regional and national economies. Further, security challenges resulting from marine environmental degradation impacted by climate change are rising. Regional and extra-regional actors need to work more closely together to impose law and order at sea, control regional conflicts, respond to humanitarian crises and natural disasters, and conserve the marine environment. This book provides an invaluable resource for political leaders, policy advisers, academic researchers, military professionals, and students of international security and strategic studies.

House Hearing, 110th Congress: Implications of Cyber Vulnerabilities on the Resilience and Security of the Electric Grid

Название: House Hearing, 110th Congress: Implications of Cyber Vulnerabilities on the Resilience and Security of the Electric Grid
ISBN: 1287867480 ISBN-13(EAN): 9781287867487
Издательство: Неизвестно
Цена: 18160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.

Privacy vulnerabilities and data security challenges in the iot

Название: Privacy vulnerabilities and data security challenges in the iot
ISBN: 0367334399 ISBN-13(EAN): 9780367334390
Издательство: Taylor&Francis
Рейтинг:
Цена: 158230.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book discusses the evolution of security and privacy issues in the Internet of things. The book focuses on bringing all security and privacy related technologies into one single source so that students, researchers, academicians, and those in the industry can easily understand the IoT security and privacy issues.

The Rise of the Indian Navy: Internal Vulnerabilities, External Challenges

Автор: Harsh V. Pant
Название: The Rise of the Indian Navy: Internal Vulnerabilities, External Challenges
ISBN: 1409430871 ISBN-13(EAN): 9781409430872
Издательство: Taylor&Francis
Рейтинг:
Цена: 153120.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The Indian Navy is gradually emerging as an indispensable tool of Indian diplomacy in recent years, making it imperative for Indian policy-makers and naval thinkers to think anew the role of nation`s naval forces in Indian strategy.

Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities

Автор: Rahalkar Sagar
Название: Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities
ISBN: 1838982663 ISBN-13(EAN): 9781838982669
Издательство: Неизвестно
Рейтинг:
Цена: 40450.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment.

Disclosure of Security Vulnerabilities

Автор: Alana Maurushat
Название: Disclosure of Security Vulnerabilities
ISBN: 1447150031 ISBN-13(EAN): 9781447150039
Издательство: Springer
Рейтинг:
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Much debate has been given as to whether computer security is improved through the full disclosure of security vulnerabilities versus keeping the problems private and unspoken.

Managing Security Information: Incidents, Treats & Vulnerabilities

Автор: Doraval Govender
Название: Managing Security Information: Incidents, Treats & Vulnerabilities
ISBN: 1868889106 ISBN-13(EAN): 9781868889105
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 26790.00 T
Наличие на складе: Невозможна поставка.
Описание: Offers a guide for both practitioners and students of security information management. It is useful in bringing information management practices and the literature resources together in one book, providing a holistic account of security information management and offering a model that security practitioners can use in their day-to-day activities.

Security Vulnerabilities A Complete Guide - 2019 Edition

Автор: Blokdyk Gerardus
Название: Security Vulnerabilities A Complete Guide - 2019 Edition
ISBN: 0655822542 ISBN-13(EAN): 9780655822547
Издательство: Неизвестно
Рейтинг:
Цена: 122770.00 T
Наличие на складе: Невозможна поставка.
Описание:

Is testing the best way to find security vulnerabilities in the development lifecycle? Is complexity really the enemy of software security? Will sdn pose network security vulnerabilities? What are the life-cycle stages and processes of security vulnerabilities and security incidents? Has executive management accepted responsibility for the management of security vulnerabilities during the design, engineering, construction, testing, start-up and operation of the transit system?

Defining, designing, creating, and implementing a process to solve a challenge or meet an objective is the most valuable role... In EVERY group, company, organization and department.

Unless you are talking a one-time, single-use project, there should be a process. Whether that process is managed and implemented by humans, AI, or a combination of the two, it needs to be designed by someone with a complex enough perspective to ask the right questions. Someone capable of asking the right questions and step back and say, 'What are we really trying to accomplish here? And is there a different way to look at it?'

This Self-Assessment empowers people to do just that - whether their title is entrepreneur, manager, consultant, (Vice-)President, CxO etc... - they are the people who rule the future. They are the person who asks the right questions to make Security Vulnerabilities investments work better.

This Security Vulnerabilities All-Inclusive Self-Assessment enables You to be that person.

All the tools you need to an in-depth Security Vulnerabilities Self-Assessment. Featuring 911 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will help you identify areas in which Security Vulnerabilities improvements can be made.

In using the questions you will be better able to:

- diagnose Security Vulnerabilities projects, initiatives, organizations, businesses and processes using accepted diagnostic standards and practices

- implement evidence-based best practice strategies aligned with overall goals

- integrate recent advances in Security Vulnerabilities and process design strategies into practice according to best practice guidelines

Using a Self-Assessment tool known as the Security Vulnerabilities Scorecard, you will develop a clear picture of which Security Vulnerabilities areas need attention.

Your purchase includes access details to the Security Vulnerabilities self-assessment dashboard download which gives you your dynamically prioritized projects-ready tool and shows your organization exactly what to do next. You will receive the following contents with New and Updated specific criteria:

- The latest quick edition of the book in PDF

- The latest complete edition of the book in PDF, which criteria correspond to the criteria in...

- The Self-Assessment Excel Dashboard

- Example pre-filled Self-Assessment Excel Dashboard to get familiar with results generation

- In-depth and specific Security Vulnerabilities Checklists

- Project management checklists and templates to assist with implementation

INCLUDES LIFETIME SELF ASSESSMENT UPDATES

Every self assessment comes with Lifetime Updates and Lifetime Free Updated Books. Lifetime Updates is an industry-first feature which allows you to receive verified self assessment updates, ensuring you always have the most accurate information at your fingertips.



Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия