Entre em um mundo infinito de histórias
5
Não-ficção
The objective of the book is to summarize to the user with main topics in computer networking hacking. The book consists of the following parts: Part 1: Lab Setup Part2: Foot printing and Reconnaissance Part 3: Scanning Methodology Part 4: Enumeration Part 5:System Hacking Part 6: Trojans and Backdoors and Viruses Part 7: Sniffer and Phishing Hacking Part 8: Hacking Web Servers Part 9:Hacking Windows and Linux Systems Part 10: Wireless Hacking Part 11: Hacking Mobile Applications
© 2020 Dr. Hidaia Mahmood Alassouli (Ebook): 9783969443545
Data de lançamento
Ebook: 21 de agosto de 2020
Tags
5
Não-ficção
The objective of the book is to summarize to the user with main topics in computer networking hacking. The book consists of the following parts: Part 1: Lab Setup Part2: Foot printing and Reconnaissance Part 3: Scanning Methodology Part 4: Enumeration Part 5:System Hacking Part 6: Trojans and Backdoors and Viruses Part 7: Sniffer and Phishing Hacking Part 8: Hacking Web Servers Part 9:Hacking Windows and Linux Systems Part 10: Wireless Hacking Part 11: Hacking Mobile Applications
© 2020 Dr. Hidaia Mahmood Alassouli (Ebook): 9783969443545
Data de lançamento
Ebook: 21 de agosto de 2020
Tags
Português
Brasil