day & night

Книги для Хакеров / Books for Hackers, Взлом, защита, инструменты, тактика и тд
Дата обновления: , перейти к новому сообщению
#1
ЭЖД



*nix`оид
[SoftoRooMTeaM] Group Icon

Группа: Наши Люди
Сообщений: 11.935
Регистрация: 18.09.2004
Пользователь №: 1.679


Респектов: 789
-----XXXX-




ph34r.gif The Hacker Ethic


Цитата | Quote
"Pekka Himanen's theory of the hacker culture as the spirit of informationalism is a fundamental breakthrough in the discovery of the world unfolding in the uncertain dawn of the third millennium."
-Manuel Castells, from the Epilogue

"The Hacker Ethic is one of the most significant political ideas and value systems in history. Hackers are the warriors, explorers, guerrillas, and joyous adventurers of the Digital Age, and the true architects of the new economy. Demonized and often misunderstood, they are changing the world and the way it works. Pekka Himanen explains how and why in a book that is essential reading for anybody who wants to live, work or do business in the twenty-first century."
-Jon Katz, columnist for slashdot.org and author of Geeks: How Two Lost Boys Rode the Internet Out of Idaho

"At last we have a book about the ethics of true hackers . . .not the criminals and vandals that the press calls hackers today, but the idealistic pioneers whose ethics of openness, enablement and cooperation laid the cornerstone for our new economy."
-Danny Hillis, Co-Founder, The Long Now Foundation and Co-Chairman & CTO, Applied Minds, Inc.

Downloads

ph34r.gif Hacking for Dummies.


Цитата | Quote
"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities.Shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testingHelps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract themGuides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized.

Downloads
User is offline
Go topGo end

Ответов(60 - 60)
15.11.2016 - 23:30
#61
Slava1251



Специалист
****

Группа: Пользователи
Сообщений: 432
Регистрация: 18.08.2015
Пользователь №: 2.086.026


Респектов: 30
-----X----


Предупреждений:


Твой софтовый форум
Журнал "ХАКЕР" № 1-9,2016 оригинал

Твой софтовый форум


Твой софтовый форум
Журнал "ХАКЕР" № 10,2016 оригинал

Твой софтовый форум
User is offline
Go topGo end

Topic Options
Сейчас: 19.03.2024 - 14:42
Мобильная версия | Lite версия