eBooks „Vulnerability“

21 eBooks were found for the search term „Vulnerability“.



Books (21)


Evaluation of Some Intrusion Detection and Vulnerability Assessment Tools
Dr. Hedaya Mahmood Alasooly Evaluation of Some Intrusion Detection and Vulnerability Assessment Tools
  • Computers
  • English
  • 4096 Words
  • No Age Recommendation
  • 250
  • 0
The paper evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities [more]

Keywords: Vulnerability Assessment Tools, Intrusion Detection Tools, LANguard, Nessus, Snort, BASE, Rman, OSSEC, Sguil

$4.99

All about those sex offenders
Alyce Queensbury All about those sex offenders
  • Education
  • English
  • 586 Words
  • Ages 18 and up
  • 10
  • 0
This is my collection of short stories dedicated to sex offenders as well as survivors of sexual assault [more]

Keywords: Rage, Sexual assault, Advice, Hero, Vulnerability, Survivors, Sex offenders, I have questions, Anger

For Free

Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools
Dr. Hedaya Alasooly Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools
  • Computers
  • English
  • 16016 Words
  • No Age Recommendation
  • 56
  • 0
Burp Suite is an integrated platform/graphical tool for performing security testing of web applications. Burp suite is a [more]

Keywords: DVWA, BurpSuite, Computer Networks, Computer Security, Hacking, Vulnerability, SQL injection, CSRF, Cross site scripting, File upload, Local and Remote File Inclusion, Commix, SQLmap, Fimap, XSSer, Linux, Windows

$14.99

ETHICAL HACKING GUIDE-Part 1
POONAM DEVI ETHICAL HACKING GUIDE-Part 1

Comprehensive Guide to Ethical Hacking world

  • Education
  • English
  • 5796 Words
  • No Age Recommendation
  • 23
  • 0
Ethical hacking, also known as penetration testing or white-hat hacking, is a practice of deliberately probing and assessing [more]

Keywords: Ethical hacking, white-hat hacking, penetration testing, cybersecurity, network security, vulnerability assessment, IT security, cyber defense, digital security, security testing, hacking prevention, secure coding, cyber threat analysis, information security, data protection, cyber risk management, web application security, network penetration, [more]

$2.99

ETHICAL HACKING GUIDE-Part 2
Poonam Devi ETHICAL HACKING GUIDE-Part 2

Comprehensive Guide to Ethical Hacking world

  • Education
  • English
  • 8516 Words
  • No Age Recommendation
  • 28
  • 0
Ethical hacking, also known as penetration testing or white-hat hacking, is a practice of deliberately probing and assessing [more]

Keywords: Ethical hacking eBook, Cybersecurity guide, Hacker techniques book, Penetration testing manual, Learn ethical hacking, White hat hacking resources, Cyber defense eBook, Network security guide, Vulnerability assessment handbook, IT security eBook, Certified ethical hacker guide, Hacking prevention techniques, Cyber risk management resource, Data breach prevention eBook, Malware analysis guide, Web application security handbook, Ethical hacking techniques, Cyber incident response manual, [more]

$2.99

ETHICAL HACKING GUIDE-Part 3
POONAM DEVI ETHICAL HACKING GUIDE-Part 3

Comprehensive Guide to Ethical Hacking world

  • Education
  • English
  • 5890 Words
  • No Age Recommendation
  • 23
  • 0
Ethical hacking, also known as penetration testing or white-hat hacking, is a practice of deliberately probing and assessing [more]

Keywords: Ethical hacking ebook, cybersecurity guide, hacker techniques book, penetration testing manual, lean ethical hacking, white hat hacking resources, cyber defense ebook, network security guide, vulnerability assessment handbook, IT security ebook, Certified ethical hacker guide, hacking prevention techniques, cyber risk management resource, data breach prevention ebook, malware analysis guide, web application security handbook, ethical hacking techniques, cyber incident response manual, [more]

$2.99

Evaluation of Some Windows and Linux Intrusion Detection Tools
Dr. Hedaya Alasooly Evaluation of Some Windows and Linux Intrusion Detection Tools
  • Computers
  • English
  • 4096 Words
  • No Age Recommendation
  • 96
  • 0
The paper evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities [more]

Keywords: Vulnerability Assessment Tools, Intrusion Detection Tools, Intrusion Detection Tools, LANguard, Snort, Nessus, BASE, OSSEC, Sguil

$4.99

Down Memory Lane
Sarah Crutchfield Down Memory Lane

"A Tale of The Librarian"

  • Fiction
  • English
  • 30000 Words
  • Ages 16 and up
  • 69
  • 0
When days become overbearing, our imaginations are often spurred to the greatest depths in an attempt to reclaim [more]

Keywords: adventure, healing, mind palace, internal trauma, growth, inspiration, charming, books, heroine, companionship, mindfulness, self control, duty, sincerity, creativity, intuition, composure, vulnerability, [more]

$7.49

Penetration Testing Fundamentals-2
Devi Prasad Penetration Testing Fundamentals-2

Penetration Testing Study Guide To Breaking Into Systems

  • Computers
  • English
  • 6396 Words
  • No Age Recommendation
  • 18
  • 0
Unlock the art of ethical hacking and fortify your cybersecurity arsenal with 'Penetration Mastery: A Comprehensive Guide to [more]

Keywords: Ethical Hacking Guide, Penetration Testing Techniques, Cybersecurity Strategies, Network Vulnerability Assessment, Web Application Security, Advanced Threat Detection, Security Assessment Tools, Exploitation and Defense Tactics, Penetration Testing Frameworks, IT Security Best Practices, Cyber Threat Intelligence, Red Team Exercises, Digital Forensics Insights, Risk Mitigation Strategies, Hacker Mindset Training, Security Auditing Procedures, Incident Response Planning, Wireless Network Security, [more]

$2.99

Penetration Testing Fundamentals -1
Devi Prasad Penetration Testing Fundamentals -1

Penetration Testing Study Guide To Breaking Into Systems

  • Computers
  • English
  • 4458 Words
  • No Age Recommendation
  • 20
  • 0
Unlock the art of ethical hacking and fortify your cybersecurity arsenal with 'Penetration Mastery: A Comprehensive Guide to [more]

Keywords: Ethical Hacking Guide, Penetration Testing Techniques, Cybersecurity Strategies, Network Vulnerability Assessment, Web Application Security, Advanced Threat Detection, Security Assessment Tools, Exploitation and Defense Tactics, Penetration Testing Frameworks, IT Security Best Practices, Cyber Threat Intelligence, Red Team Exercises, Digital Forensics Insights, Risk Mitigation Strategies, Hacker Mindset Training, Security Auditing Procedures, Incident Response Planning, Wireless Network Security, [more]

$2.99


To ensure optimal functioning, our website uses cookies. By using the website you agree to the use of cookies. More info
OK
Top of page