Jump to content
Click or hover over image to zoom in

[Set of 5] Hacker attack and defense books

(1 review)
$50
Content abstract
In the Internet era, data security and personal privacy are challenged, and various novel attack technologies emerge in an endless stream. How can we better protect our data? White Hat on Web Security (Commemorative Edition) will take you into the world of Web security and introduce you to all aspects of Web security. Hackers are no longer mysterious, attack techniques are so old, small websites can find their own safe path. How do big companies do security, and why do they choose such a solution? You can find the answer in White Hats on Web Security (Commemorative Edition). Detailed analysis, so that you can not only "know", but also "know why".
"White hat on Web security (Commemorative edition)" according to the security treasure Vice president Wu Hanqing in the Internet company before several years of practical work experience and written, in the solution has a strong operability; In-depth analysis of many wrong methods and misunderstandings, security workers have a good reference value; The introduction of security development process and operation also has profound industry guidance significance. The content of the Commemorative Edition is the same as that of the previous edition. It is only a special edition published in multiple languages to commemorate the original work. Please select it as required.
Content abstract
This book summarizes the causes, attack methods and solutions of the current popular high-risk vulnerabilities, and reproduces the vulnerability prototype through a large number of sample code, making a simulation environment, to better help readers to understand the vulnerabilities in Web applications, and prevent them from happening.
This book introduces the Web security system step by step, from attack to defense, from principle to actual combat. The book is divided into 4 chapters and 16 chapters. In addition to introducing the basic knowledge of Web security, it also introduces the common security vulnerabilities in Web applications, the attack flow and defense of open source programs, and focuses on analyzing the attack means used by hackers in the event of "drag library". In addition, some other detection methods of penetration test engineers are also introduced.
Content abstract
This book is a comprehensive and systematic introduction to the means of Intranet attack and defense, and strives to make the language easy to understand, simple and clear examples, easy to read and understand. At the same time, combined with specific cases to explain, readers can be immersive, quickly understand and master the mainstream Intranet vulnerability utilization technology and Intranet penetration testing skills.
A background in penetration testing is not required; It will be easier to understand if you have relevant experience. This book can also be used as a teaching material for information security in universities and colleges.


 Share

About [Set of 5] Hacker attack and defense books

Content abstract

In the Internet era, data security and personal privacy are challenged, and various novel attack technologies emerge in an endless stream. How can we better protect our data? White Hat on Web Security (Commemorative Edition) will take you into the world of Web security and introduce you to all aspects of Web security. Hackers are no longer mysterious, attack techniques are so old, small websites can find their own safe path. How do big companies do security, and why do they choose such a solution? You can find the answer in White Hats on Web Security (Commemorative Edition). Detailed analysis, so that you can not only "know", but also "know why".

"White hat on Web security (Commemorative edition)" according to the security treasure Vice president Wu Hanqing in the Internet company before several years of practical work experience and written, in the solution has a strong operability; In-depth analysis of many wrong methods and misunderstandings, security workers have a good reference value; The introduction of security development process and operation also has profound industry guidance significance. The content of the Commemorative Edition is the same as that of the previous edition. It is only a special edition published in multiple languages to commemorate the original work. Please select it as required.

Content abstract

This book summarizes the causes, attack methods and solutions of the current popular high-risk vulnerabilities, and reproduces the vulnerability prototype through a large number of sample code, making a simulation environment, to better help readers to understand the vulnerabilities in Web applications, and prevent them from happening.

This book introduces the Web security system step by step, from attack to defense, from principle to actual combat. The book is divided into 4 chapters and 16 chapters. In addition to introducing the basic knowledge of Web security, it also introduces the common security vulnerabilities in Web applications, the attack flow and defense of open source programs, and focuses on analyzing the attack means used by hackers in the event of "drag library". In addition, some other detection methods of penetration test engineers are also introduced.

Content abstract

This book is a comprehensive and systematic introduction to the means of Intranet attack and defense, and strives to make the language easy to understand, simple and clear examples, easy to read and understand. At the same time, combined with specific cases to explain, readers can be immersive, quickly understand and master the mainstream Intranet vulnerability utilization technology and Intranet penetration testing skills.

A background in penetration testing is not required; It will be easier to understand if you have relevant experience. This book can also be used as a teaching material for information security in universities and colleges.

47c8d821d1aee77a.jpga4048c6ac7e5e0f7.jpgc082acd1d6748be5 (1).jpg


This CHT

  

非常适合初学者的书籍,大家可以多看看。有什么不懂的在论坛提问,谢谢。

Link to review
×
×
  • Create New...