Search

Categories

    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss

Filter By Price

$
-
$

Dietary Needs

Top Rated Product

product-img product-img

Modern Chair

$165.00
product-img product-img

Plastic Chair

$165.00
product-img product-img

Design Rooms

$165.00

Brands

  • Wooden
  • Chair
  • Modern
  • Fabric
  • Shoulder
  • Winter
  • Accessories
  • Dress

Welcome and thank you for visiting us. For any query call us on 0799 626 359 or Email [email protected]

Offcanvas Menu Open

Shopping Cart

Africa largest book store

Sub Total:

Search for any Title

Hacker's Handbook : The Strategy Behind Breaking into and Defending Networks

By: Susan Young Dave Aitel (Author)

Ksh 19,440.00
Format :

Format(s): DRM PDF

ISBN-13: 9780203490044

Publisher: CRC Press

Imprint: Auerbach Publications

Publication Date: November 24th, 2003

Language: English

Pages: 896

Physical Edition EAN: 9780849308888

More ebooks on Domestic trade

  • Description

  • Author Bio

This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Get Hacker's Handbook by at the best price and quality guranteed only at Werezi Africa largest book ecommerce store. The book was published by and it has pages. Enjoy Shopping Best Offers & Deals on books Online from Werezi - Receive at your doorstep - Fast Delivery - Secure mode of Payment


Digital Rights Management (DRM)

The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.


Required software

To read this ebook on a mobile device (phone or tablet) you'll need to install one of these free apps:



To download and read this eBook on a PC or Mac:


  • Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

More Ebooks by Susan Young