SoftoRooM LifeRooM Whois RSS GZip WAP Поиск Правила Помощь Disclaimer
Твой софтовый форумТвой софтовый форумТвой софтовый форумТвой софтовый форум

Здравствуйте, Гость ( Вход | Регистрация )

Книги для Хакеров / Books for Hackers

Вид темы: Стандартный · [ Линейный ] · Режимы сортировки: [ По возрастанию (0-9) ] · По убыванию (9-0)

> Книги для Хакеров / Books for Hackers, Взлом, защита, инструменты, тактика и тд

post 13.05.2005 - 22:09
Отправлено #1

[SoftoRooMTeaM] Group Icon

Группа: СуперМодераторы
Сообщений: 11.935
Регистрация: 18.09.2004
Пользователь №: 1.679

Респектов: 780

ph34r.gif The Hacker Ethic

Цитата | Quote
"Pekka Himanen's theory of the hacker culture as the spirit of informationalism is a fundamental breakthrough in the discovery of the world unfolding in the uncertain dawn of the third millennium."
-Manuel Castells, from the Epilogue

"The Hacker Ethic is one of the most significant political ideas and value systems in history. Hackers are the warriors, explorers, guerrillas, and joyous adventurers of the Digital Age, and the true architects of the new economy. Demonized and often misunderstood, they are changing the world and the way it works. Pekka Himanen explains how and why in a book that is essential reading for anybody who wants to live, work or do business in the twenty-first century."
-Jon Katz, columnist for and author of Geeks: How Two Lost Boys Rode the Internet Out of Idaho

"At last we have a book about the ethics of true hackers . . .not the criminals and vandals that the press calls hackers today, but the idealistic pioneers whose ethics of openness, enablement and cooperation laid the cornerstone for our new economy."
-Danny Hillis, Co-Founder, The Long Now Foundation and Co-Chairman & CTO, Applied Minds, Inc.


ph34r.gif Hacking for Dummies.

Цитата | Quote
"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities.Shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testingHelps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract themGuides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized.

User is offlineProfile CardPM
Go to the top of the pageGo to the end of the page
+Quote Post

Reply to this topicStart new topic
Ответов(60 - 60)
post 15.11.2016 - 23:38
Отправлено #61


Группа: Пользователи
Сообщений: 255
Регистрация: 18.08.2015
Пользователь №: 2.086.026

Респектов: 19


Твой софтовый форум
Журнал "ХАКЕР" № 1-9,2016 оригинал

Твой софтовый форум

Твой софтовый форум
Журнал "ХАКЕР" № 10,2016 оригинал

Твой софтовый форум
User is offlineProfile CardPM
Go to the top of the pageGo to the end of the page
+Quote Post

Reply to this topicTopic OptionsStart new topic

Сейчас: 25.03.2017 - 8:46
LITE - версия