Astu tarinoiden maailmaan
5
Tietokirjallisuus
The objective of the book is to summarize to the user with main topics in computer networking hacking. The book consists of the following parts: Part 1: Lab Setup Part2: Foot printing and Reconnaissance Part 3: Scanning Methodology Part 4: Enumeration Part 5:System Hacking Part 6: Trojans and Backdoors and Viruses Part 7: Sniffer and Phishing Hacking Part 8: Hacking Web Servers Part 9:Hacking Windows and Linux Systems Part 10: Wireless Hacking Part 11: Hacking Mobile Applications
© 2020 Dr. Hidaia Mahmood Alassouli (E-kirja): 9783969443545
Julkaisupäivä
E-kirja: 21. elokuuta 2020
Avainsanat
5
Tietokirjallisuus
The objective of the book is to summarize to the user with main topics in computer networking hacking. The book consists of the following parts: Part 1: Lab Setup Part2: Foot printing and Reconnaissance Part 3: Scanning Methodology Part 4: Enumeration Part 5:System Hacking Part 6: Trojans and Backdoors and Viruses Part 7: Sniffer and Phishing Hacking Part 8: Hacking Web Servers Part 9:Hacking Windows and Linux Systems Part 10: Wireless Hacking Part 11: Hacking Mobile Applications
© 2020 Dr. Hidaia Mahmood Alassouli (E-kirja): 9783969443545
Julkaisupäivä
E-kirja: 21. elokuuta 2020
Avainsanat
Suomi
Suomi