Udvidet returret til d. 31. januar 2025

Bøger af Attila Kovács

Filter
Filter
Sorter efterSorter Populære
  • af Attila Kovács
    195,95 - 302,95 kr.

  • - 37 Linux Commands you Must Know
    af Attila Kovács
    212,95 kr.

  • - How to Install the Linux OS
    af Attila Kovács
    212,95 kr.

  • - How to Build Your Pen Test Lab Fast
    af Attila Kovács
    287,95 - 367,95 kr.

  • - Pre-Engagement Process Execution
    af Attila Kovács
    206,95 kr.

    Do you want learn about how to begin with a Penetration-Testing Objectives?Do you want a practical book that explains step-by-step how to create a Pen-Test Checklist of Requirements?Do you want to become an Ethical Hacker or Pen-Tester?If the answer is yes to the above questions, this book is for you!Frequently Asked Questions-Question: I am new to IT, and I don't have any experience in the field of Hacking, should I get this book?-Answer: This book is designed to those interested in Penetration Testing aka Ethical Hacking, and having limited, or no experience in the realm of Cybersecurity.-Question: I am not a hacker. Are there any technical prerequisites for reading this book?-Answer: No. This book is written in everyday English, and no technical experience required.-Question: I have been reading similar books before, but I am still not sure if I should buy this book. How do I know this book is any good?-Answer: This book is written by a Security Architect, having over a decade of experience on platforms such as: Cisco Systems, Checkpoint, Palo Alto, Brocade, Back Track / Kali Linux, RedHat Linux, CentOS, Orion, Prime, DLP, IPS, IDS, Nexus, and much more… Learning from someone with real life experience is extremely valuable. You will learn about real life technologies and methodologies used in today's IT Infrastructure, and Cybersecurity Division.BUY THIS BOOK NOW, AND GET STARTED TODAY!IN THIS BOOK YOU WILL LEARN:How to Establish Pen-Test ObjectivesWhat Types of Penetration Tests ExistsWhat's is a Pre-engagement aka Stage 1How to build a Checklist of RequirementsHow to create a Client site Security ChecklistHow to Compromise the Target aka Stage 2What to include in your Post-attack aka Stage 3What Pen-Test Standard Suits you bestWhat kinds of Target Footprinting Methods you should utilizeWhat steps are involved in the Reconnaissance ProcessWhat kinds of Target Scanning Techniques you should utilizeHow to Check for existing VulnerabilitiesSNMP & NMAP Enumeration TechniquesNTP & SMTP Enumeration Techniques, and much more…BUY THIS BOOK NOW, AND GET STARTED TODAY!

  • - HOW TO DEFEND AGAINST HACKERS & MALWARE
    af Kovacs Attila Kovacs
    287,95 - 367,95 kr.

    Do you want to know what Critical Responsibilities a Cybersecurity Specialist have?Do you want to know what tools and techniques are used in Cybersecurity?Do you want to know what daily tasks you must do to protect your Infrastructure?If the answer is yes to the above questions, this book is for you!

  • - How to Get a Job in Cybersecurity
    af Attila Kovács
    277,95 - 317,95 kr.

  • - What You Must Know about Cybersecurity
    af Attila Kovács
    277,95 - 317,95 kr.

  • - Comprehensive Approach to Acquiring Complex Facilities and Projects
    af Attila Kovács
    2.197,95 - 2.283,95 kr.

    Enhancing Procurement Practices is organised around four main points: -overview and analysis of procurement principles, -practical approach to drafting of solicitation and contract documents, -conduct of procurement procedures, -overview of the e-procurement arena.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.