Книги для Хакеров / Books for Hackers, Взлом, защита, инструменты, тактика и тд
Дата обновления: 15.11.2016 - 23:53, перейти к новому сообщению

[SoftoRooMTeaM] Group Icon

Группа: СуперМодераторы
Сообщений: 11.935
Регистрация: 18.09.2004
Пользователь №: 1.679

Респектов: 781

ph34r.gif The Hacker Ethic

Цитата | Quote
"Pekka Himanen's theory of the hacker culture as the spirit of informationalism is a fundamental breakthrough in the discovery of the world unfolding in the uncertain dawn of the third millennium."
-Manuel Castells, from the Epilogue

"The Hacker Ethic is one of the most significant political ideas and value systems in history. Hackers are the warriors, explorers, guerrillas, and joyous adventurers of the Digital Age, and the true architects of the new economy. Demonized and often misunderstood, they are changing the world and the way it works. Pekka Himanen explains how and why in a book that is essential reading for anybody who wants to live, work or do business in the twenty-first century."
-Jon Katz, columnist for slashdot.org and author of Geeks: How Two Lost Boys Rode the Internet Out of Idaho

"At last we have a book about the ethics of true hackers . . .not the criminals and vandals that the press calls hackers today, but the idealistic pioneers whose ethics of openness, enablement and cooperation laid the cornerstone for our new economy."
-Danny Hillis, Co-Founder, The Long Now Foundation and Co-Chairman & CTO, Applied Minds, Inc.


ph34r.gif Hacking for Dummies.

Цитата | Quote
"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities.Shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testingHelps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract themGuides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized.

User is offline
Go topGo end

Ответов(60 - 60)
Отправлено: 15.11.2016 - 23:53


Группа: Пользователи
Сообщений: 423
Регистрация: 18.08.2015
Пользователь №: 2.086.026

Респектов: 29


Твой софтовый форум
Журнал "ХАКЕР" № 1-9,2016 оригинал

Твой софтовый форум

Твой софтовый форум
Журнал "ХАКЕР" № 10,2016 оригинал

Твой софтовый форум
User is offline
Go topGo end

Topic Options
Сейчас: 23.10.2017 - 21:37
Мобильная версия | Lite версия