566 products were found matching your search for hacking in 3 shops:
-
Hacking Movable Type
Vendor: Abebooks.com Price: 41.00 $Ready to push Movable Type to the max? Movable Type, that amazingly powerful personal publishing application, is the superhero of the Internet age. But when you push, poke, stretch, and otherwise coax it into producing even more, the possibilities for your Web content are simply superlative. Roll up your sleeves and get moving-here's the first book to tell you how. Discover how to do all this and more * Hack the perfect installation * Hack the database * Play with Atom, Perl, and XML-RPC APIs * Write advanced plug-ins * Master dynamic publishing * Hack a super-powered blog app * Ban comment spam * Build customized templates
-
Positive Promotions 3 UltraClub Men's Dawson Quilted Hacking Jackets - Embroidered Personalization Available
Vendor: Positivepromotions.com Price: 269.97 $FREE Setup Charge on 24 pieces or more! Save $35 when personalizing this item! Fabric: Body: 100% nylon taslon with water resistant finish; Lining: 100% polyester taffeta; Insulation: 120 gsm thermal polyfill Center front coil zipper with semi-autoblock slider and rubber toggle Storm flap with metal snap closure Double front chest and lower pockets with pocket flaps and snap closures Active fit Easy Care Personalization featured on left chest Men's sizes: S-4XL Individually folded and bagged with size sticker for easy distribution
-
Positive Promotions 3 UltraClub Women's Dawson Quilted Hacking Jackets - Embroidered Personalization Available
Vendor: Positivepromotions.com Price: 269.97 $FREE Setup Charge on 24 pieces or more! Save $35 when personalizing this item! Fabric: Body: 100% nylon taslon with water resistant finish; Lining: 100% polyester taffeta; Insulation: 120 gsm thermal polyfill Center front coil zipper with semi-autoblock slider and rubber toggle Storm flap with metal snap closure Lower pockets with snap closures Princess seam for flattering feminine fit Active fit Easy care Personalization featured on left chest Women's sizes: XS-3XL Individually folded and bagged with size sticker for easy distribution
-
VEVOR Faraday Bag, 4 Pack Faraday Pouch Set for Laptop(16.9x15), Tablet(13x10.2), Phone(7.9x4.7) & Radio(10.6x7.9), Fireproof Signal Blocking Holder Faraday Pouch for Anti-Theft & Anti-Hacking
Vendor: Vevor.com Price: 28.99 $VEVOR Faraday Bag, 4 Pack Faraday Pouch Set for Laptop(16.9x15), Tablet(13x10.2), Phone(7.9x4.7) & Radio(10.6x7.9), Fireproof Signal Blocking Holder Faraday Pouch for Anti-Theft & Anti-HackingMulti-functional Signal Shielding Bag SetSuper Signal Blocking PowerSplashproof & High Temperature ResistantLarge Capacity SetFolding and Easy to CarrySimple to UseRadio Bag Size: 10.6 × 7.9 in / 270 × 200 mm,Computer Bag Size: 16.9 × 15.0 in / 430 × 381 mm,Color: Black,Material: Fiberglass + Nickel-copper RFID,Tablet Bag Size: 13.0 × 10.2 in / 330 × 260 mm,Model Number: SF-2,High-temperature Resistance: Yes,Net Weight: 1.21 lbs / 0.55 kg,Signal Shielding: WiFi (2.4 & 5GHz), Bluetooth, Phone Signals, 5G Networks, GPS, RFID, and All Device Signals,Phone Bag Size: 7.9 × 4.7 in / 200 × 120 mm
-
VEVOR Faraday Bag, 4 Pack Faraday Pouch Set for Laptop(16.9x15), Tablet(13x10.2), Phone(7.9x4.7) & Radio(10.6x7.9), Fireproof Signal Blocking Holder Faraday Pouch for Anti-Theft & Anti-Hacking
Vendor: Vevor.com Price: 34.99 $VEVOR Faraday Bag, 4 Pack Faraday Pouch Set for Laptop(16.9x15), Tablet(13x10.2), Phone(7.9x4.7) & Radio(10.6x7.9), Fireproof Signal Blocking Holder Faraday Pouch for Anti-Theft & Anti-HackingMulti-functional Signal Shielding Bag SetSuper Signal Blocking PowerSplashproof & High Temperature ResistantLarge Capacity SetFolding and Easy to CarrySimple to UseRadio Bag Size: 10.6 × 7.9 in / 270 × 200 mm,Computer Bag Size: 16.9 × 15.0 in / 430 × 381 mm,Color: Black,Material: Fiberglass + Nickel-copper RFID,Tablet Bag Size: 13.0 × 10.2 in / 330 × 260 mm,Model Number: SF-3,High-temperature Resistance: Yes,Net Weight: 1.89 lbs / 0.86 kg,Extra-Large Size: 18.9 × 16.9 in / 480 × 430 mm,Signal Shielding: WiFi (2.4 & 5GHz), Bluetooth, Phone Signals, 5G Networks, GPS, RFID, and All Device Signals,Phone Bag Size: 7.9 × 4.7 in / 200 × 120 mm
-
Hacking and Security : The Comprehensive Guide to Penetration Testing and Cybersecurity
Vendor: Abebooks.com Price: 52.45 $Unread book in perfect condition.
-
Hacking ISIS: How to Destroy the Cyber Jihad
Vendor: Abebooks.com Price: 4.39 $This book is written by two of the leading terrorist experts in the world - Malcolm Nance, NBC News and MSNBC terrorism analyst and New York Times bestselling author of Defeating ISIS and the forthcoming Hacking ISIS, and Christopher Sampson, cyber-terrorist expert. Malcolm Nance is a 35 year practitioner in Middle East Special Operations and terrorism intelligence activities. Chris Sampson is the terrorism media and cyber warfare expert for the Terror Asymmetric Project and has spent 15 years collecting and exploiting terrorism media. For two years, their Terror Asymmetrics Project has been attacking and exploiting intelligence found on ISIS Dark Web operations.Hacking ISIS will explain and illustrate in graphic detail how ISIS produces religious cultism, recruits vulnerable young people of all religions and nationalities and disseminates their brutal social media to the world.More, the book will map out the cyberspace level tactics on how ISIS spreads its terrifying content, how it distributes tens of thousands of pieces of propaganda daily and is winning the battle in Cyberspace and how to stop it in its tracks.Hacking ISIS is uniquely positioned to give an insider’s view into how this group spreads its ideology and brainwashes tens of thousands of followers to join the cult that is the Islamic State and how average computer users can engage in the removal of ISIS from the internet.
-
Hacking Capitalism
Vendor: Abebooks.com Price: 30.75 $Used book that is in excellent condition. May show signs of wear or have minor defects.
-
Hacking APIs: Breaking Web Application Programming Interfaces
Vendor: Abebooks.com Price: 27.68 $This book is in good condition. The cover has minor creases or bends. The binding is tight and pages are intact. Some pages may have writing or highlighting.
-
Hacking Group Work: 11 Ways to Build Student Engagement, Accountability, and Cooperation with Collaborative Teams (Hack Learning Series)
Vendor: Abebooks.com Price: 33.46 $Acceptable/Fair condition. Book is worn, but the pages are complete, and the text is legible. Has wear to binding and pages, may be ex-library. 0.93
-
Hacking with Python and Kali-Linux: Develop your own Hackingtools with Python in Kali-Linux
Vendor: Abebooks.com Price: 45.41 $Book is in Used-VeryGood condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain very limited notes and highlighting. 0.82
-
Hacking Exposed Mobile: Security Secrets & Solutions
Vendor: Abebooks.com Price: 35.15 $Book is in NEW condition. 1.23
-
Hacking Marketing: Agile Practices to Make Marketing Smarter, Faster, and More Innovative (Hardback or Cased Book)
Vendor: Abebooks.com Price: 22.36 $Apply software-inspired management concepts to accelerate modern marketing In many ways, modern marketing has more in common with the software profession than it does with classic marketing management. As surprising as that may sound, it's the natural result of the world going digital. Marketing must move faster, adapt more quickly to market feedback, and manage an increasingly complex set of customer experience touchpoints. All of these challenges are shaped by the dynamics of software—from the growing number of technologies in our own organizations to the global forces of the Internet at large. But you can turn that to your advantage. And you don't need to be technical to do it. Hacking Marketing will show you how to conquer those challenges by adapting successful management frameworks from the software industry to the practice of marketing for any business in a digital world. You'll learn about agile and lean management methodologies, innovation techniques used by high-growth technology companies that any organization can apply, pragmatic approaches for scaling up marketing in a fragmented and constantly shifting environment, and strategies to unleash the full potential of talent in a digital age. Marketing responsibilities and tactics have changed dramatically over the past decade. This book now updates marketing management to better serve this rapidly evolving discipline. Increase the tempo of marketing's responsiveness without chaos or burnout Design "continuous" marketing programs and campaigns that constantly evolve Drive growth with more marketing experiments while actually reducing risk Architect marketing capabilities in layers to better scale and adapt to change Balance strategic focus with the ability to harness emergent opportunities As a marketer and a manager, Hacking Marketing will expand your mental models for how to lead marketing in a digital world where everything—including marketing—flows with the speed and adaptability of software.
-
Hacking VoIP: Protocols, Attacks, and Countermeasures
Vendor: Abebooks.com Price: 2.97 $Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishingAudit VoIP network securityAssess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and VonageUse common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAXIdentify the many vulnerabilities in any VoIP networkWhether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.
-
Hacking Group Work: 11 Ways to Build Student Engagement, Accountability, and Cooperation with Collaborative Teams (Hack Learning Series)
Vendor: Abebooks.com Price: 42.65 $New! This book is in the same immaculate condition as when it was published 1.02
-
Hacking: Ultimate Hacking for Beginners, How to Hack
Vendor: Abebooks.com Price: 20.56 $Hacking 101 Your Ultimate Hacking Guide! So you want to be a hacker? You want to know how to get into a system and look like a genius while you spot system vulnerabilities. In this world, you can either be a good hacker or a bad hacker. Whichever that is, totally depends on your choice. This book teaches ethical hacking and guides anyone interested to an in-depth discussion about what hacking is all about. Also, this book provides the right hacking mindset that will turn you into a trustworthy hacker. You will learn how to classify various kinds of hackers, and identify types of hacking attacks, how to hack an email password and many more! You Can Check Out Further Discussions Including: · Common Attacks and Viruses · Spoofing Techniques · Hacking Tools · Mobile Hacking · Penetration Testing · Tips for Ethical Hacking · General Tips of Computer Safety We hope you put this book to good use, just like any other, you can make hacking a hobby or make a career out of it. Get busy with Hacking: Ultimate Hacking for Beginners How to Hack. Happy Hacking!
-
Hacking Exposed Wireless: Wireless Security Secrets & Solutions (Paperback or Softback)
Vendor: Abebooks.com Price: 5.31 $Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you’ll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave. Assemble a wireless attack toolkit and master the hacker’s weaponsEffectively scan and enumerate WiFi networks and client devicesLeverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suiteDevelop and launch client-side attacks using Ettercap and the WiFi PineappleHack cellular networks with Airprobe, Kraken, Pytacle, and YateBTSExploit holes in WPA and WPA2 personal and enterprise security schemesLeverage rogue hotspots to deliver remote access software through fraudulent software updatesEavesdrop on Bluetooth Classic and Bluetooth Low Energy trafficCapture and evaluate proprietary wireless technology with Software Defined Radio toolsExplore vulnerabilities in ZigBee and Z-Wave-connected smart homes and officesAttack remote wireless networks using compromised Windows systems and built-in tools
-
Hacking the Human: Social Engineering Techniques and Security Countermeasures
Vendor: Abebooks.com Price: 42.11 $Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available.There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. Ian Mann provides a rich mix of examp
-
Hacking Life After 50: 10 Ways to Beat Father Time and Live a Long, Healthy, Joy-Filled Life (Hack Learning Life)
Vendor: Abebooks.com Price: 21.21 $**PLEASE READ** Cover may have some rubbing and or light scratches. There may not be some highlighting handwriting in this book. FAST shipping, FREE tracking, and GREAT customer service! We also offer EXPEDITED and TWO DAY shipping options on qualifying orders.
-
Hacking Engagement Again: 50 Teacher Tools That Will Make Students Love Your Class (Hack Learning Series)
Vendor: Abebooks.com Price: 24.07 $Book is in NEW condition. 0.62
566 results in 0.219 seconds
Related search terms
© Copyright 2024 shopping.eu