×
Dodano do koszyka:
Pozycja znajduje się w koszyku, zwiększono ilość tej pozycji:
Zakupiłeś już tę pozycję:
Książkę możesz pobrać z biblioteki w panelu użytkownika
Pozycja znajduje się w koszyku
Przejdź do koszyka

Zawartość koszyka

ODBIERZ TWÓJ BONUS :: »

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking James Leyte-Vidal

(ebook) (audiobook) (audiobook) Książka w języku 1
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking James Leyte-Vidal - okladka książki

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking James Leyte-Vidal - okladka książki

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking James Leyte-Vidal - audiobook MP3

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking James Leyte-Vidal - audiobook CD

Autor:
James Leyte-Vidal
Serie wydawnicze:
Learning
Ocena:
Bądź pierwszym, który oceni tę książkę
Stron:
168
Dostępne formaty:
     PDF
     ePub
Whether you’re looking to crack passwords as part of a thorough security audit or aiming to recover vital information, this book will equip you with the skills to accomplish your goals. Written by a cybersecurity expert with over fifteen years of experience in penetration testing, Ethical Password Cracking offers a thorough understanding of password protection and the correct approach to retrieving password-protected data.
As you progress through the chapters, you first familiarize yourself with how credentials are stored, delving briefly into the math behind password cracking. Then, the book will take you through various tools and techniques to help you recover desired passwords before focusing on common cracking use cases, hash recovery, and cracking. Real-life examples will prompt you to explore brute-force versus dictionary-based approaches and teach you how to apply them to various types of credential storage.
By the end of this book, you'll understand how passwords are protected and how to crack the most common credential types with ease.

Wybrane bestsellery

O autorze książki

James Leyte-Vidal is a highly experienced cybersecurity professional with a rich background spanning over two decades. With a Bachelor's degree in Psychology from the University of Central Florida and additional studies in Information Technology from the University of Phoenix, James brings a unique blend of technical expertise and understanding of human behavior to his work in cybersecurity. His passion for cybersecurity education led him to become a SANS Certified Instructor, a role he has excelled in for over a decade. He has been instrumental in training and mentoring cybersecurity professionals through his role as a SANS Instructor, imparting invaluable knowledge and skills in areas such as penetration testing and ethical hacking.

Zobacz pozostałe książki z serii Learning

Packt Publishing - inne książki

Zamknij

Przenieś na półkę

Proszę czekać...
ajax-loader

Zamknij

Wybierz metodę płatności

Ebook
98,10 zł
Dodaj do koszyka
Zamknij Pobierz aplikację mobilną Ebookpoint
Zabrania się wykorzystania treści strony do celów eksploracji tekstu i danych (TDM), w tym eksploracji w celu szkolenia technologii AI i innych systemów uczenia maszynowego. It is forbidden to use the content of the site for text and data mining (TDM), including mining for training AI technologies and other machine learning systems.