The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1 available in Hardcover, Paperback, eBook
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1
- ISBN-10:
- 0471782661
- ISBN-13:
- 9780471782667
- Pub. Date:
- 12/27/2005
- Publisher:
- Wiley
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1
Related collections and offers
Product Details
| ISBN-13: | 9780471782667 |
|---|---|
| Publisher: | Wiley |
| Publication date: | 12/27/2005 |
| Pages: | 288 |
| Sales rank: | 378,091 |
| Product dimensions: | 6.08(w) x 8.76(h) x 0.85(d) |
About the Author
Customer Reviews
Explore More Items
If you’ve got incredible iOS ideas, get this book and bring them to life!
iOS 7 represents the most significant update to Apple’s mobile operating system since the first iPhone was
The cryptocurrency market moves quickly and miners and investors need the latest information to stay ahead of the game. This
Fine art might seem intimidating at first. But with the right guide, anyone can learn to appreciate and understand the
Looking to kick start your own property management career? Check out Foreclosure Investing For Dummies, which
'A must read for anyone who wants to start a mobile app business' Riccardo Zacconi, founder and CEO King Digital (maker of Candy Crush Saga)
'A
The whirlwind of social media, online dating, and smartphones can make life a dream–or a nightmare. For every trustworthy website, there are countless jerks, bullies, and scam artists who would
Preventive strategies for deterring today’s most malicious and least understood risks to enterprise security
Advanced Persistent Threats: Offensive Tactics for IT Security offers a
Network Security Monitoring (NSM) is the the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions. Practical Network Security Monitoring teaches IT and
Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right
Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.
Security has become a "big data" problem. The growth rate of
Need networking know-how, but don't know where to turn? Run—don't walk—to the no-nonsense networking
Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and
The highly successful security book returns with a new edition, completely updated
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal