LV
5
 

Farid-Khan

Power User
Utoljára online
2023.06.08.
32,966
307
83
Díjak
6
35
6CNk8X.mq0o9jdpbq05.jpg
Network Basics for Hackers: How Networks Work and How They Break | 270 | Zamzar | 2023 | Independently published |​

Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all types, including TCP/IP, Bluetooth Networks, Car Networks, W-iFi Networks, Radio Frequency Networks, SCADA/ICS Networks, and more. In his inimitable style, Master OTW makes the seemingly complex, simple.

This book is designed for beginner to intermediate cybersecurity professionals. It begins with the basics of networks and networking, examines network analysis with Wireshark and tcpdump, offers one of the most complete and in-depth analyses of Wi-Fi and Bluetooth networks, then progresses through the various protocols such as DNS, ARP, SMTP, and others. The reader will be led through the building of those applications in Linux, such as an EXIM server for email or a BIND server for DNS. Then OTW leads the reader through the major vulnerabilities of that protocol/application.

In the final chapters, OTW leads the reader through some of the networks on the leading-edge of cybersecurity, such as Car, Radio, and Industrial networks. There has never been book quite like this one!
Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all types, including TCP/IP, Bluetooth Networks, Car Networks, W-iFi Networks, Radio Frequency Networks, SCADA/ICS Networks, and more. In his inimitable style, Master OTW makes the seemingly complex, simple.

This book is designed for beginner to intermediate cybersecurity professionals. It begins with the basics of networks and networking, examines network analysis with Wireshark and tcpdump, offers one of the most complete and in-depth analyses of Wi-Fi and Bluetooth networks, then progresses through the various protocols such as DNS, ARP, SMTP, and others. The reader will be led through the building of those applications in Linux, such as an EXIM server for email or a BIND server for DNS. Then OTW leads the reader through the major vulnerabilities of that protocol/application.

In the final chapters, OTW leads the reader through some of the networks on the leading-edge of cybersecurity, such as Car, Radio, and Industrial networks. There has never been book quite like this one!



Contents of Download:
Network Basics for Hackers - How Networks Work and How They Break.pdf (33.95 MB)


NitroFlare Link(s) (Premium Link)
Code:




Linkeket csak regisztrált tagok láthatják!  Bejelentkezés :::  Regisztráció




RapidGator Link(s)
Code:




Linkeket csak regisztrált tagok láthatják!  Bejelentkezés :::  Regisztráció




 

Kedvezményes Data.hu prémium előfizetés itt! Tölts villámgyorsan, korlátok nélkül!