Marknadens största urval
Snabb leverans

Böcker av Black Hat Kathy

Filter
Filter
Sortera efterSortera Populära
  • av Black Hat Kathy
    499,-

    Secure Coding Practices: Fortifying Applications Against Cyber Threats is a comprehensive guide that explores the importance of secure coding, the fundamentals of cyber threats, common vulnerabilities, best practices in code development, authentication and authorization techniques, code review and testing, security in the software development life cycle, case studies, future trends in secure coding, and more. This book is essential for developers, IT professionals, and anyone interested in safeguarding their applications against cyber threats.

  • av Black Hat Kathy
    735,-

    The End of Human Art by Black Hat Kathy takes readers on a gripping journey into the unsettling future of art and creativity, exploring the overwhelming supremacy of AI, the loss of human touch, and the profound implications for society. This book delves deep into the dark corridors of the digital age's blessings, forcing readers to confront the unsettling question: Is the end of human art not a possibility, but an inevitability? Brace yourself for a revelation that will challenge your beliefs and values in art.

  • av Black Hat Kathy
    1 379,-

    The Secrets of Currency Watermarks and Advanced Security Features is a comprehensive exploration of the history, technology, and future of currency security, revealing hidden insights, cutting-edge techniques, and the ongoing battle against counterfeiting; currency security, watermarks, advanced security features, history of currency security, printing techniques, emerging technologies, digital counterfeiting, currency design, cultural influences, future of currency security, privacy concerns, cashless society debate.

  • av Black Hat Kathy
    1 705,-

    "The 10 Most Famous Hacks in History" by Black Hat Kathy takes readers on a thrilling journey through the fascinating world of hacking, exploring notorious hacks such as the Morris Worm, Kevin Mitnick's exploits, and the global cyber pandemonium caused by WannaCry ransomware.

  • av Black Hat Kathy
    1 705,-

    "The 10 Most Famous Hacks in History" by Black Hat Kathy takes readers on a thrilling journey through the fascinating world of hacking, exploring notorious hacks such as the Morris Worm, Kevin Mitnick's exploits, and the global cyber pandemonium caused by WannaCry ransomware.

  • av Black Hat Kathy
    1 709,-

    "Red Team, Blue Team: A White Hacking Reference" is a comprehensive guide that takes readers on a journey through the world of ethical hacking. Written in an engaging and informative style, the book covers a wide range of topics including network and operating system security, essential hacking tools, basic and advanced hacking techniques, red teaming and blue teaming strategies, legal and ethical considerations, and emerging trends in cybersecurity. With practical examples, step-by-step instructions, and real-world case studies, this book is a must-read for anyone interested in the world of white hacking.

  • av Black Hat Kathy
    175,-

    "Introduction to Lockpicking" by Black Hat Kathy is a comprehensive guide that explores the art of non-destructive entry, providing historical context, essential tools, techniques, and advanced applications. It delves into the legal and ethical perspectives of lockpicking, offers insights into locksmithing as a profession, explores lockpicking in popular culture, and provides resources for hobbyists. Whether you're a locksmith, hobbyist, or simply interested in the subject, this book offers valuable knowledge and practical skills to enhance your understanding of lockpicking.

  • av Black Hat Kathy
    475,-

    Unveil the realm of social manipulation in "The Social Hacking Dictionary" by Black Hat Kathy. This essential reference text is a guide for security professionals and the vigilant, revealing the tactics used to exploit human behavior. With each entry, explore three real-world examples that expose the art of social engineering. From targeted phishing to trust manipulation, this comprehensive dictionary equips you with insights into the methods that threaten personal and organizational security. Delve into the dark corners of deception and stay ahead of potential threats, arming yourself with knowledge to navigate the complexities of our interconnected world.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.