Libros importados con hasta 40% OFF + Envío gratis a todo USA  Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada Conoce Todo Sobre Hacking Práctico en Internet y Redes de Ordenadores (Colecciones abg - Informática y Computación)
Type
Physical Book
Year
2020
Language
Spanish
Pages
294
Format
Paperback
ISBN13
9781681657585

Conoce Todo Sobre Hacking Práctico en Internet y Redes de Ordenadores (Colecciones abg - Informática y Computación)

Antonio ÁNgel Ramos VarÓN; Carlos A. Barbero MuÑOz (Author) · · Paperback

Conoce Todo Sobre Hacking Práctico en Internet y Redes de Ordenadores (Colecciones abg - Informática y Computación) - Antonio ÁNgel Ramos VarÓN; Carlos A. Barbero MuÑOz

Physical Book

$ 22.06

$ 27.95

You save: $ 5.89

21% discount
  • Condition: New
It will be shipped from our warehouse between Monday, May 13 and Tuesday, May 14.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "Conoce Todo Sobre Hacking Práctico en Internet y Redes de Ordenadores (Colecciones abg - Informática y Computación)"

El objetivo de este libro es introducirte en el mundo del pentesting o hacking de sistemas informáticos, desde el punto de vista de un atacante o hacker, así como del lado de un administrador de sistemas o responsable de la seguridad informática de una red, para saber qué medidas preventivas ayudarán a proteger tu infraestructura de las debilidades de seguridad (Description in English below).Description in English: The objective of this book is to introduce readers to the world of pentesting or hacking of computer systems, from the point of view of an attacker or hacker, as well as on a system’s administrator viewpoint or by the person responsible for the computer security of a network, to know what preventive measures will help protect your infrastructure from security weaknesses.In a first block, the necessary protocols are described to understand in detail how the information systems and the applications that run on them communicate. In addition, the techniques used to identify systems that may be susceptible to attack will be shown, as well as the collection of information regarding users, in order to create a defined and effective attack vector.Under the main operating systems, Microsoft Windows and Linux, the second block will focus on exploiting and discovering vulnerabilities, as well as how to use automated tools to exploit them, maintaining a session once security is compromised, and breaking of passwords. In addition, the main exploiting techniques will be explained and used, and the main Internet sites will be shown, essential to learn how to download and execute these techniques efficiently in real life.All chapters of the book begin with a description of the techniques to be used. After that, the installation, configuration and administration processes are explained with practical examples.

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in Español.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews