Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 54,19
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
EUR 58,79
Cantidad disponible: 2 disponibles
Añadir al carritoPAP. Condición: New. New Book. Shipped from UK. Established seller since 2000.
EUR 62,66
Cantidad disponible: 2 disponibles
Añadir al carritoPAP. Condición: New. New Book. Shipped from UK. Established seller since 2000.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 61,03
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Idioma: Inglés
Publicado por Taylor and Francis Ltd, GB, 2025
ISBN 10: 1032893923 ISBN 13: 9781032893921
Librería: Rarewaves.com USA, London, LONDO, Reino Unido
EUR 70,07
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: New. Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today's evolving threat landscape. Each chapter dives into a critical area of cybersecurity, emphasizing applied learning through real-world scenarios, case studies, and step-by-step exercises.This book begins with an in-depth focus on network security, guiding readers through capturing and analyzing traffic using command-line tools and understanding how attackers exploit unencrypted protocols. It then progresses to more complex attack vectors such as man-in-the-middle attacks, DNS spoofing, and email threats, reinforcing defensive strategies using tools like Wireshark and Tcpdump. The exploration of open-source intelligence (OSINT) offers a comprehensive look at harvesting digital footprints from publicly accessible data, applying techniques and tools such as Shodan, Google Dorking, and reverse image searches for real investigations. As the world becomes increasingly interconnected, this book dedicates several chapters to the Internet of Things (IoT), uncovering its vulnerabilities and showcasing threat surface attack assessments through real device testing and threat mapping frameworks. Readers learn to analyze device security and apply countermeasures such as secure boot, blockchain integration, and anomaly detection.The volume also delves into the dark web, shedding light on anonymous networks like TOR and I2P and equipping readers with methods to investigate hidden services safely. It explains how to extract intelligence using automation, analyze illicit activity, and integrate findings into broader cybersecurity frameworks. Culminating with advanced cyber threat intelligence (CTI), this book examines intelligence cycles, tools, and platforms, enabling readers to move from theory to practice. From indicator of compromise analysis and threat actor profiling to automation and incident response, readers gain the skills to leverage CTI for strategic defense.Designed for cybersecurity students, professionals, and enthusiasts, this book offers a balanced blend of technical depth, ethical awareness, and actionable guidance. By the end, readers will not only understand key cybersecurity domains but also be prepared to apply their knowledge in practical, high-stakes environments, making them valuable assets in the fight against cyber threats.
Librería: Majestic Books, Hounslow, Reino Unido
EUR 65,29
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 54,88
Cantidad disponible: 10 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por Taylor and Francis Ltd, GB, 2025
ISBN 10: 1032893923 ISBN 13: 9781032893921
Librería: Rarewaves USA, OSWEGO, IL, Estados Unidos de America
EUR 74,54
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: New. Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today's evolving threat landscape. Each chapter dives into a critical area of cybersecurity, emphasizing applied learning through real-world scenarios, case studies, and step-by-step exercises.This book begins with an in-depth focus on network security, guiding readers through capturing and analyzing traffic using command-line tools and understanding how attackers exploit unencrypted protocols. It then progresses to more complex attack vectors such as man-in-the-middle attacks, DNS spoofing, and email threats, reinforcing defensive strategies using tools like Wireshark and Tcpdump. The exploration of open-source intelligence (OSINT) offers a comprehensive look at harvesting digital footprints from publicly accessible data, applying techniques and tools such as Shodan, Google Dorking, and reverse image searches for real investigations. As the world becomes increasingly interconnected, this book dedicates several chapters to the Internet of Things (IoT), uncovering its vulnerabilities and showcasing threat surface attack assessments through real device testing and threat mapping frameworks. Readers learn to analyze device security and apply countermeasures such as secure boot, blockchain integration, and anomaly detection.The volume also delves into the dark web, shedding light on anonymous networks like TOR and I2P and equipping readers with methods to investigate hidden services safely. It explains how to extract intelligence using automation, analyze illicit activity, and integrate findings into broader cybersecurity frameworks. Culminating with advanced cyber threat intelligence (CTI), this book examines intelligence cycles, tools, and platforms, enabling readers to move from theory to practice. From indicator of compromise analysis and threat actor profiling to automation and incident response, readers gain the skills to leverage CTI for strategic defense.Designed for cybersecurity students, professionals, and enthusiasts, this book offers a balanced blend of technical depth, ethical awareness, and actionable guidance. By the end, readers will not only understand key cybersecurity domains but also be prepared to apply their knowledge in practical, high-stakes environments, making them valuable assets in the fight against cyber threats.
Librería: Chiron Media, Wallingford, Reino Unido
EUR 58,83
Cantidad disponible: 2 disponibles
Añadir al carritopaperback. Condición: New.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 75,20
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New. 1st edition NO-PA16APR2015-KAP.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 61,88
Cantidad disponible: 10 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 62,12
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback / softback. Condición: New. New copy - Usually dispatched within 4 working days.
Librería: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
Original o primera edición
EUR 70,34
Cantidad disponible: 2 disponibles
Añadir al carritoCondición: New. 2025. 1st Edition. paperback. . . . . .
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 76,01
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Librería: Kennys Bookstore, Olney, MD, Estados Unidos de America
EUR 88,90
Cantidad disponible: 2 disponibles
Añadir al carritoCondición: New. 2025. 1st Edition. paperback. . . . . . Books ship from the US and Ireland.
EUR 54,89
Cantidad disponible: 2 disponibles
Añadir al carritoCondición: NEW.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 90,88
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 336 pages. 9.18x6.12x10.00 inches. In Stock.
Idioma: Inglés
Publicado por Taylor and Francis Ltd, GB, 2025
ISBN 10: 1032893923 ISBN 13: 9781032893921
Librería: Rarewaves USA United, OSWEGO, IL, Estados Unidos de America
EUR 76,95
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: New. Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today's evolving threat landscape. Each chapter dives into a critical area of cybersecurity, emphasizing applied learning through real-world scenarios, case studies, and step-by-step exercises.This book begins with an in-depth focus on network security, guiding readers through capturing and analyzing traffic using command-line tools and understanding how attackers exploit unencrypted protocols. It then progresses to more complex attack vectors such as man-in-the-middle attacks, DNS spoofing, and email threats, reinforcing defensive strategies using tools like Wireshark and Tcpdump. The exploration of open-source intelligence (OSINT) offers a comprehensive look at harvesting digital footprints from publicly accessible data, applying techniques and tools such as Shodan, Google Dorking, and reverse image searches for real investigations. As the world becomes increasingly interconnected, this book dedicates several chapters to the Internet of Things (IoT), uncovering its vulnerabilities and showcasing threat surface attack assessments through real device testing and threat mapping frameworks. Readers learn to analyze device security and apply countermeasures such as secure boot, blockchain integration, and anomaly detection.The volume also delves into the dark web, shedding light on anonymous networks like TOR and I2P and equipping readers with methods to investigate hidden services safely. It explains how to extract intelligence using automation, analyze illicit activity, and integrate findings into broader cybersecurity frameworks. Culminating with advanced cyber threat intelligence (CTI), this book examines intelligence cycles, tools, and platforms, enabling readers to move from theory to practice. From indicator of compromise analysis and threat actor profiling to automation and incident response, readers gain the skills to leverage CTI for strategic defense.Designed for cybersecurity students, professionals, and enthusiasts, this book offers a balanced blend of technical depth, ethical awareness, and actionable guidance. By the end, readers will not only understand key cybersecurity domains but also be prepared to apply their knowledge in practical, high-stakes environments, making them valuable assets in the fight against cyber threats.
Idioma: Inglés
Publicado por Taylor and Francis Ltd, GB, 2025
ISBN 10: 1032893923 ISBN 13: 9781032893921
Librería: Rarewaves.com UK, London, Reino Unido
EUR 65,54
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: New. Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today's evolving threat landscape. Each chapter dives into a critical area of cybersecurity, emphasizing applied learning through real-world scenarios, case studies, and step-by-step exercises.This book begins with an in-depth focus on network security, guiding readers through capturing and analyzing traffic using command-line tools and understanding how attackers exploit unencrypted protocols. It then progresses to more complex attack vectors such as man-in-the-middle attacks, DNS spoofing, and email threats, reinforcing defensive strategies using tools like Wireshark and Tcpdump. The exploration of open-source intelligence (OSINT) offers a comprehensive look at harvesting digital footprints from publicly accessible data, applying techniques and tools such as Shodan, Google Dorking, and reverse image searches for real investigations. As the world becomes increasingly interconnected, this book dedicates several chapters to the Internet of Things (IoT), uncovering its vulnerabilities and showcasing threat surface attack assessments through real device testing and threat mapping frameworks. Readers learn to analyze device security and apply countermeasures such as secure boot, blockchain integration, and anomaly detection.The volume also delves into the dark web, shedding light on anonymous networks like TOR and I2P and equipping readers with methods to investigate hidden services safely. It explains how to extract intelligence using automation, analyze illicit activity, and integrate findings into broader cybersecurity frameworks. Culminating with advanced cyber threat intelligence (CTI), this book examines intelligence cycles, tools, and platforms, enabling readers to move from theory to practice. From indicator of compromise analysis and threat actor profiling to automation and incident response, readers gain the skills to leverage CTI for strategic defense.Designed for cybersecurity students, professionals, and enthusiasts, this book offers a balanced blend of technical depth, ethical awareness, and actionable guidance. By the end, readers will not only understand key cybersecurity domains but also be prepared to apply their knowledge in practical, high-stakes environments, making them valuable assets in the fight against cyber threats.
Idioma: Inglés
Publicado por Taylor & Francis Ltd, London, 2025
ISBN 10: 1032893923 ISBN 13: 9781032893921
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
EUR 56,52
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in todays evolving threat landscape. Each chapter dives into a critical area of cybersecurity, emphasizing applied learning through real-world scenarios, case studies, and step-by-step exercises.This book begins with an in-depth focus on network security, guiding readers through capturing and analyzing traffic using command-line tools and understanding how attackers exploit unencrypted protocols. It then progresses to more complex attack vectors such as man-in-the-middle attacks, DNS spoofing, and email threats, reinforcing defensive strategies using tools like Wireshark and Tcpdump. The exploration of open-source intelligence (OSINT) offers a comprehensive look at harvesting digital footprints from publicly accessible data, applying techniques and tools such as Shodan, Google Dorking, and reverse image searches for real investigations. As the world becomes increasingly interconnected, this book dedicates several chapters to the Internet of Things (IoT), uncovering its vulnerabilities and showcasing threat surface attack assessments through real device testing and threat mapping frameworks. Readers learn to analyze device security and apply countermeasures such as secure boot, blockchain integration, and anomaly detection.The volume also delves into the dark web, shedding light on anonymous networks like TOR and I2P and equipping readers with methods to investigate hidden services safely. It explains how to extract intelligence using automation, analyze illicit activity, and integrate findings into broader cybersecurity frameworks. Culminating with advanced cyber threat intelligence (CTI), this book examines intelligence cycles, tools, and platforms, enabling readers to move from theory to practice. From indicator of compromise analysis and threat actor profiling to automation and incident response, readers gain the skills to leverage CTI for strategic defense.Designed for cybersecurity students, professionals, and enthusiasts, this book offers a balanced blend of technical depth, ethical awareness, and actionable guidance. By the end, readers will not only understand key cybersecurity domains but also be prepared to apply their knowledge in practical, high-stakes environments, making them valuable assets in the fight against cyber threats. Mastering Cybersecurity A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in todays evolving threat landscape. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 72,05
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 336 pages. 9.18x6.12x10.00 inches. In Stock. This item is printed on demand.
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 78,08
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback / softback. Condición: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Idioma: Inglés
Publicado por Taylor & Francis Ltd, London, 2025
ISBN 10: 1032893923 ISBN 13: 9781032893921
Librería: CitiRetail, Stevenage, Reino Unido
EUR 57,82
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in todays evolving threat landscape. Each chapter dives into a critical area of cybersecurity, emphasizing applied learning through real-world scenarios, case studies, and step-by-step exercises.This book begins with an in-depth focus on network security, guiding readers through capturing and analyzing traffic using command-line tools and understanding how attackers exploit unencrypted protocols. It then progresses to more complex attack vectors such as man-in-the-middle attacks, DNS spoofing, and email threats, reinforcing defensive strategies using tools like Wireshark and Tcpdump. The exploration of open-source intelligence (OSINT) offers a comprehensive look at harvesting digital footprints from publicly accessible data, applying techniques and tools such as Shodan, Google Dorking, and reverse image searches for real investigations. As the world becomes increasingly interconnected, this book dedicates several chapters to the Internet of Things (IoT), uncovering its vulnerabilities and showcasing threat surface attack assessments through real device testing and threat mapping frameworks. Readers learn to analyze device security and apply countermeasures such as secure boot, blockchain integration, and anomaly detection.The volume also delves into the dark web, shedding light on anonymous networks like TOR and I2P and equipping readers with methods to investigate hidden services safely. It explains how to extract intelligence using automation, analyze illicit activity, and integrate findings into broader cybersecurity frameworks. Culminating with advanced cyber threat intelligence (CTI), this book examines intelligence cycles, tools, and platforms, enabling readers to move from theory to practice. From indicator of compromise analysis and threat actor profiling to automation and incident response, readers gain the skills to leverage CTI for strategic defense.Designed for cybersecurity students, professionals, and enthusiasts, this book offers a balanced blend of technical depth, ethical awareness, and actionable guidance. By the end, readers will not only understand key cybersecurity domains but also be prepared to apply their knowledge in practical, high-stakes environments, making them valuable assets in the fight against cyber threats. Mastering Cybersecurity A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in todays evolving threat landscape. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 68,96
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Mastering Cybersecurity - A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today's evolving threat landscape.
Idioma: Inglés
Publicado por Taylor & Francis Ltd, London, 2025
ISBN 10: 1032893923 ISBN 13: 9781032893921
Librería: AussieBookSeller, Truganina, VIC, Australia
EUR 114,69
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in todays evolving threat landscape. Each chapter dives into a critical area of cybersecurity, emphasizing applied learning through real-world scenarios, case studies, and step-by-step exercises.This book begins with an in-depth focus on network security, guiding readers through capturing and analyzing traffic using command-line tools and understanding how attackers exploit unencrypted protocols. It then progresses to more complex attack vectors such as man-in-the-middle attacks, DNS spoofing, and email threats, reinforcing defensive strategies using tools like Wireshark and Tcpdump. The exploration of open-source intelligence (OSINT) offers a comprehensive look at harvesting digital footprints from publicly accessible data, applying techniques and tools such as Shodan, Google Dorking, and reverse image searches for real investigations. As the world becomes increasingly interconnected, this book dedicates several chapters to the Internet of Things (IoT), uncovering its vulnerabilities and showcasing threat surface attack assessments through real device testing and threat mapping frameworks. Readers learn to analyze device security and apply countermeasures such as secure boot, blockchain integration, and anomaly detection.The volume also delves into the dark web, shedding light on anonymous networks like TOR and I2P and equipping readers with methods to investigate hidden services safely. It explains how to extract intelligence using automation, analyze illicit activity, and integrate findings into broader cybersecurity frameworks. Culminating with advanced cyber threat intelligence (CTI), this book examines intelligence cycles, tools, and platforms, enabling readers to move from theory to practice. From indicator of compromise analysis and threat actor profiling to automation and incident response, readers gain the skills to leverage CTI for strategic defense.Designed for cybersecurity students, professionals, and enthusiasts, this book offers a balanced blend of technical depth, ethical awareness, and actionable guidance. By the end, readers will not only understand key cybersecurity domains but also be prepared to apply their knowledge in practical, high-stakes environments, making them valuable assets in the fight against cyber threats. Mastering Cybersecurity A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in todays evolving threat landscape. This item is printed on demand. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Librería: preigu, Osnabrück, Alemania
EUR 76,00
Cantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Mastering Cybersecurity | A Practical Guide to Cyber Tools and Techniques (Volume 2) | Akashdeep Bhardwaj | Taschenbuch | Einband - flex.(Paperback) | Englisch | 2025 | CRC Press | EAN 9781032893921 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand.