Welcome to Cheap2Price

    Category: Update Product

    Update Product

    Showing 1–16 of 33 results

    • Sale!
      Rated 0 out of 5

      2021 Apple iMac (24-inch, Apple M1 chip with 8‑core CPU and 7‑core GPU, 8GB RAM, 256GB) – Blue

      $1,499.00
      • 256GB storage¹
      • 8GB unified memory
      • 24-inch 4.5K Retina display²
      • Two Thunderbolt / USB 4 ports
      • Two USB 3 ports
      • Gigabit Ethernet
      • Magic Keyboard with Touch ID
      Add to cart
    • Sale!
      Rated 0 out of 5

      Advanced Penetration Testing Hacking 2017

      $10.00

      Product Short info:

      Product Format PDF Format
      Audience Level Intermediate to Advanced
      Content Length 269 Pages
      Author Wil Allsop
      Pub Date March 2017
      Imprint Wiley
      Product Description Includes advanced coverage of the latest penetration testing techniques with content on creating attack vectors, moving unseen through a target enterprise, employing social engineering strategies, establishing a robust command-and-control structure, using advanced data exfiltration techniques, escalating privilege, operating systems using harvested credentials, and creating custom code with VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more

       

      Add to cart
    • Sale!
      Rated 0 out of 5

      Begin Ethical Hacking with Python

      $8.00

      Product Format: PDF Format

      Shipping Charge: Free

      Paperback: 255 Page

      Product Short Description:

      Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.

      Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.

      What You Will Learn

      • Discover the legal constraints of ethical hacking
      • Work with virtual machines and virtualization
      • Develop skills in Python 3
      • See the importance of networking in ethical hacking
      • Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more

      Who This Book Is For:
      Beginners wanting to learn ethical hacking alongside a modular object oriented programming language.

      Add to cart
    • Sale!
      Rated 0 out of 5

      Canon EOS 6D Mark II Digital SLR Camera Body, Wi-Fi Enabled

      $1,350.00
      Model Name Canon EOS 6D Mark II
      Brand Canon
      Skill Level Professional
      Color Black
      Shooting Modes Landscape

      About this item:

      • 26.2 Megapixel full frame CMOS sensor
      • Optical viewfinder with a 45 point all cross type AF system. Compatible Lenses: Canon EF lenses (excluding EF S and EF M lenses)
      • Dual Pixel CMOS AF with phase detection and Full HD 60p
      • DIGIC 7 Image Processor, GPS, Wi-Fi, NFC and Bluetooth low energy
      • Vary angle touch screen, 3.0 inch LCD
      • Standard Power Supply: Battery Pack LP E6N, LP E6
      Add to cart
    • Sale!
      Rated 0 out of 5

      Certified Ethical Hacker 2016

      $15.00

      Product details

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Apress; 1st ed. edition (December 1, 2016)
      • Language ‏ : ‎ English
      • Paperback ‏ : ‎ 207 pages
      • ISBN-10 ‏ : ‎ 1484223241
      • ISBN-13 ‏ : ‎ 978-1484223246
      • Item Weight ‏ : ‎ 9.46 pounds
      • Dimensions ‏ : ‎ 7.01 x 0.51 x 10 inches
      • Covers essential concepts which are necessary from a hacking and security perspective
      • Covers all the concepts required to take the CEH course and exam in very simple, to-the-point, and digestible format
      • Simple do-it-yourself exercises in every chapter to get hands-on knowledge
      • A complete information primer on various career paths available after CEH certification along with how to stay updated and ahead of the competition
      • A set of interview questions related to information security and ethical hacking to aid the reader in job interviews

       

      Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.

      The book explains the concepts with the help of practical real-world scenarios and examples. You’ll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.

      What You Will Learn
      • Gain the basics of hacking (apps, wireless devices, and mobile platforms)
      • Discover useful aspects of databases and operating systems from a hacking perspective
      • Develop sharper programming and networking skills for the exam
      • Explore the penetration testing life cycle
      • Bypass security appliances like IDS, IPS, and honeypots
      • Grasp the key concepts of cryptography
      • Discover the career paths available after certification
      • Revise key interview questions for a certified ethical hacker
      Who This Book Is For
      Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.
      Add to cart
    • Sale!
      Rated 0 out of 5

      Chuangdi 2 Pieces Women Beach Wrap Sarong Cover Up Chiffon Swimsuit Wrap Skirts

      $9.99

      Product details

      • Department ‏ : ‎ Women’s
      • Color: Black, White and Others
      • Quicks drying and keep skin cool Lightweight for travel
      Add to cart
    • Sale!
      Rated 0 out of 5

      CompTIA Cybersecurity 2017

      $12.00

      Product details:

      Senior Acquisitions Editor: Kenyon Brown
      Development Editor: David Clark
      Technical Editor: Robin Abernathy
      Production Editor: Rebecca Anderson
      Copy Editor: Elizabeth Welch
      Editorial Manager: Mary Beth Wakefield
      Production Manager: Kathleen Wisor
      Executive Editor: Jim Minatel
      Book Designers: Judy Fung and Bill Gibson
      Proofreader: Kim Wimpsett
      Indexer: Ted Laux
      Project Coordinator, Cover: Brent Savage
      Cover Designer: Wiley
      Cover Image: ©Getty Images Inc./Jeremy Woodhouse
      Copyright © 2017 by John Wiley & Sons, Inc., Indianapolis, Indiana
      Published simultaneously in Canada
      ISBN: 978-1-119-34897-9
      ISBN: 978-1-119-34991-4 (ebk.)
      ISBN: 978-1-119-34988-4 (ebk.)
      Manufactured in the United States of America

      Learning Objectives

      In this course, you will assess and respond to security threats and operate a systems and network security analysis platform you will…

      • Assess information security risk in computing and network environments.
      • Analyze reconnaissance threats to computing and network environments.
      • Analyze attacks on computing and network environments.
      • Analyze post-attack techniques on computing and network environments.
      • Implement a vulnerability management program.
      • Collect cybersecurity intelligence.
      • Analyze data collected from security and event logs.
      • Perform active analysis on assets and networks.
      • Respond to cybersecurity incidents.
      • Investigate cybersecurity incidents.
      • Address security issues with the organization’s technology architecture.
      Add to cart
    • Sale!
      Rated 0 out of 5

      Computer Security Fundamentals

      $15.00

      Product details:

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Pearson IT Certification; 3rd edition (June 28, 2016)
      • Language ‏ : ‎ English
      • Paperback ‏ : ‎ 447 pages

      ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY:

      Clearly explains core concepts, terminology, challenges, technologies, and skills

      Covers today&;s latest attacks and countermeasures

      The perfect beginner&;s guide for anyone interested in a computer security career

      Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

      Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

      This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you&;ve learned.

      Whether you&;re a student, a professional, or a manager, this guide will help you protect your assets&;and expand your career options.

      Learn how to

      ·         Identify and prioritize potential threats to your network

      ·         Use basic networking knowledge to improve security

      ·         Get inside the minds of hackers, so you can deter their attacks

      ·         Implement a proven layered approach to network security

      ·         Resist modern social engineering attacks

      ·         Defend against today&;s most common Denial of Service (DoS) attacks

      ·         Halt viruses, spyware, worms, Trojans, and other malware

      ·         Prevent problems arising from malfeasance or ignorance

      ·         Choose the best encryption methods for your organization

      ·         Compare security technologies, including the latest security appliances

      ·         Implement security policies that will work in your environment

      ·         Scan your network for vulnerabilities

      ·         Evaluate potential security consultants

      ·         Master basic computer forensics and know what to do if you&;re attacked

      ·         Learn how cyberterrorism and information warfare are evolving

       

      Add to cart
    • Sale!
      Rated 0 out of 5

      Cyber-Physical Attack Recovery

      $13.00

      Product details:

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Apress; 1st ed. edition (June 8, 2016)
      • Publication date ‏ : ‎ June 8, 2016
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 7,855 KB
      • Text-to-Speech ‏ : ‎ Enabled
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Not Enabled
      • Print length ‏ : ‎ 117 pages
      • Lending ‏ : ‎ Not Enabled

      This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time—even from the other side of the planet.

      Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won’t suspect it was a hacker—until you see a pattern. The building control system (BCS) will act “squirrelly” and you will know—it really is a cyber-physical attack.

      Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives.

      The book contains:

      • A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs.
      • Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps
      • Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more.

      What you’ll learn:

      • Possible ways hackers can cause building equipment to fail.
      • How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack.
      • How to restore equipment operation without doing any more damage.

      Who This Book Is For:

      Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.

      Add to cart
    • Sale!
      Rated 0 out of 5

      Essential Skills for Hackers

      $15.00

      Product details

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Syngress; 1st edition (December 30, 2015)
      • Language ‏ : ‎ English
      • Paperback ‏ : ‎ 42 pages
      • Item Weight ‏ : ‎ 3.17 ounces
      • Dimensions ‏ : ‎ 5.98 x 0.12 x 9.02 inches

      Essential Skills for Hackers is about the skills you need to be in the elite hacker family.

      The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

      Add to cart
    • Sale!
      Rated 0 out of 5

      From Hacking to Report Writing

      $11.00

      Product details:

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Apress; 1st ed. edition (November 4, 2016)
      • Publication date ‏ : ‎ November 4, 2016
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 3167 KB
      • Text-to-Speech ‏ : ‎ Enabled
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Not Enabled
      • Print length ‏ : ‎ 204 pages
      • Lending ‏ : ‎ Not Enabled

      Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally report security weaknesses using techniques such as SQL-injection, denial-of-service attacks, and password hacking.

      Although From Hacking to Report Writing will give you the technical know-how needed to carry out advanced security tests, it also offers insight into crafting professional looking reports describing your work and how your customers can benefit from it. The book will give you the tools you need to clearly communicate the benefits of high-quality security and penetration testing to IT-management, executives and other stakeholders.

      Embedded in the book are a number of on-the-job stories that will give you a good understanding of how you can apply what you have learned to real-world situations.

       

      We live in a time where computer security is more important than ever. Staying one step ahead of hackers has never been a bigger challenge. From Hacking to Report Writing clarifies how you can sleep better at night knowing that your network has been thoroughly tested.

      What you’ll learn:

      • Clearly understand why security and penetration testing is important
      • Find vulnerabilities in any system using the same techniques as hackers do
      • Write professional looking reports
      • Know which security and penetration testing method to apply for any given situation
      • Successfully hold together a security and penetration test project

      Who This Book Is For:

      Aspiring security and penetration testers, security consultants, security and penetration testers, IT managers, and security researchers.

      Add to cart
    • Sale!
      Rated 0 out of 5

      Hacking the Hacker 2017

      $16.00

      Hacking the Hacker: Learn from the Experts Who Take Down Hackers

      • Publisher ‏ : ‎ Wiley; 1st edition (April 21, 2017)
      • Product Format: PDF Format
      • Language ‏ : ‎ English
      • Paperback ‏ : ‎ 284 pages
      • Copyright © 2017 by John Wiley & Sons, Inc., Indianapolis, Indiana
      • Published simultaneously in Canada
      • ISBN: 978-1-119-39621-5
      • ISBN: 978-1-119-39623-9 (ebk)
      • ISBN: 978-1-119-39622-2 (ebk)
      • Manufactured in the United States of America
      Add to cart
    • Honeypots and Routers_ Collecting Internet Attacks hacking ebook
      Rated 0 out of 5

      Honeypots and Routers Collecting Internet Attacks

      Product Descriptions:

      • Product Name: Honeypots and Routers Collecting Internet Attacks
      • Publisher ‏ : ‎ Auerbach Publications; 1st edition (December 2, 2015)
      • Publication date ‏ : ‎ December 2, 2015
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 9348 KB
      • Simultaneous device usage ‏ : ‎ Up to 4 simultaneous devices, per publisher limits
      • Text-to-Speech ‏ : ‎ Not enabled
      • Enhanced typesetting ‏ : ‎ Not Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Not Enabled
      • Print length ‏ : ‎ 198 pages
      • Lending ‏ : ‎ Not Enabled
      Read more
    • Sale!
      Rated 0 out of 5

      Modern Web Penetration Testing 2016

      $17.00

      Product details:

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Packet Publishing; 1st edition (October 28, 2016)
      • Publication date ‏ : ‎ October 28, 2016
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 15,589 KB
      • Text-to-Speech ‏ : ‎ Enabled
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Not Enabled
      • Print length ‏ : ‎ 298 pages
      • Lending ‏ : ‎ Not Enabled
      Add to cart
    • Sale!
      Rated 0 out of 5

      Penetration Testing Basics

      $12.00
      • Product Format: PDF Format
      • Publisher ‏ : ‎ Apress; 1st ed. edition (July 22, 2016)
      • Publication date ‏ : ‎ July 22, 2016
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 13,102 KB
      • Text-to-Speech ‏ : ‎ Enabled
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Not Enabled
      • Print length ‏ : ‎ 127 pages
      • Lending ‏ : ‎ Not Enabled

      Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you’ll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible.
      What You Will Learn:

      • Identify security vulnerabilities
      • Use some of the top security tools to identify holes
      • Read reports from testing tools
      • Spot and negate common attacks
      • Identify common Web-based attacks and exposures as well as recommendations for closing those holes

      Who This Book Is For:
      Anyone who has some familiarity with computers and an interest in information security and penetration testing.

      Add to cart
    • Sale!
      Rated 0 out of 5

      Penetration Testing Essentials 2017

      $15.00

      Product details:

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Sybex; 1st edition (November 15, 2016)
      • Publication date ‏ : ‎ November 15, 2016
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 3,006 KB
      • Page: 287
      • Text-to-Speech ‏ : ‎ Enabled
      • Screen Reader ‏ : ‎ Supported
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Not Enabled

      Your pen testing career begins here, with a solid foundation in essential skills and concepts

      Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before you get that experience, you need a basic understanding of the technical and behavioral ways attackers compromise security, and the tools and techniques you’ll use to discover the weak spots before others do. You’ll learn information gathering techniques, scanning and enumeration, how to target wireless networks, and much more as you build your pen tester skill set. You’ll learn how to break in, look around, get out, and cover your tracks, all without ever being noticed. Pen testers are tremendously important to data security, so they need to be sharp and well-versed in technique, but they also need to work smarter than the average hacker. This book set you on the right path, with expert instruction from a veteran IT security expert with multiple security certifications.

      IT Security certifications have stringent requirements and demand a complex body of knowledge. This book lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set.

      • Learn the fundamentals of security and cryptography
      • Master breaking, entering, and maintaining access to a system
      • Escape and evade detection while covering your tracks
      • Build your pen testing lab and the essential toolbox

      Start developing the tools and mindset you need to become experienced in pen testing today.

      Add to cart
    ×
    Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
    • Image
    • SKU
    • Rating
    • Price
    • Stock
    • Availability
    • Add to cart
    • Description
    • Content
    • Weight
    • Dimensions
    • Additional information
    • Attributes
    • Custom attributes
    • Custom fields
    Click outside to hide the compare bar
    Compare
    Wishlist 0
    Open wishlist page Continue shopping