Main background
img

Hacking

Books number: 34

Intrusion, hacking, hacker or security hacker in general is a person who examines and explores ways and methods to penetrate and exploit security holes in computer systems or network systems. Mainly these hackers do this practice due to several main reasons including earning money, acquiring information, some challenges and hobbies or for the purpose of examining security devices or systems with the intention of improving performance and protecting systems from hackers. Most security hackers are often under the name of an emerging subculture called the Crypto World. There is a lot of controversy over the concept of the word "penetrator", as this controversy revolves around the fact that the meaning of this word does not fit the current concept of most people. Computer programmers believe that the word "hacker" refers to a person who is proficient and proficient in computer science and network science, while the word "cracker" refers to a security hacker, a person who is always trying to penetrate the security system and computers. A security hacker is known as a black hat hacker, while a cybersecurity expert is known as a white hat hacker.
img

The Hacker Playbook 2: Practical Guide To Penetration Testing

img

Peter Kim

Hacking

(0)

img

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

img

Kevin Mitnick

Hacking

(0)

img

The art of invisibility : the world’s most famous hacker teaches you how to be safe in the age of Big Brother and big data

img

Kevin Mitnick

Hacking

(0)

img

The art of deception: controlling the human element of security

img

Kevin Mitnick

Hacking

(0)

img

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers

img

Kevin Mitnick

Hacking

(0)

img

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

img

Roger Grimes

Hacking

(0)

img

The Hacker Playbook Practical Guide To Penetration Testing

img

Peter Kim

Hacking

(0)

img

The Hacker Playbook 3: Practical Guide To Penetration Testing

img

Peter Kim

Hacking

(0)

img

Hardware Hacking: Have Fun While Voiding Your Warranty

img

Kevin Mitnick

Hacking

(0)

img

Hacking Multifactor Authentication

img

Roger Grimes

Hacking

(0)

img

Hacking: Hacking Practical Guide for Beginners

img

Jeff Simon

Hacking

(0)

img

No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing

img

Kevin Mitnick

Hacking

(0)

img

Unauthorised Access: Physical Penetration Testing For IT Security Teams

img

Kevin Mitnick

Hacking

(0)

img

Professional Windows Desktop and Server Hardening

img

Roger Grimes

Hacking

(0)

img

Cryptography and Network Security

img

William Stallings

Hacking

(0)

img

Ransomware Protection Playbook

img

Roger Grimes

Hacking

(0)

img

Honeypots for Windows

img

Roger Grimes

Hacking

(0)

img

Malicious Mobile Code: Virus Protection for Windows

img

Roger Grimes

Hacking

(0)

img

Hacking Secret Ciphers with Python

img

Al Sweigart

Hacking

(0)

img

Windows Vista Security: Securing Vista Against Malicious Attacks

img

Roger Grimes

Hacking

(0)

View more