This auction has been won.
Leading
fazulk986 1 × R1.00
9 Dec 12:46

Similar products

R30 shipping
40% OFF
Cisco Umbrella Secure Internet Gateway Advantage Bundle - 1 Year Subscription
R2,699 R4,509
Hacking ebook Bundle
Hacking ebook Bundle
Hacking ebook Bundle
Hacking ebook Bundle

Hacking ebook Bundle

1 was available / new
R1.00 auction closed
Shipping
Standard courier shipping from R60
R60 Standard shipping applies to orders under R100, in most areas in South Africa. R30 Standard shipping applies to orders over R100. Some areas may attract a R30 surcharge. This will be calculated at checkout if applicable.
Check my rate
Ready to ship in
The seller has indicated that they will usually have this item ready to ship within 12 business days. Shipping time depends on your delivery address. The most accurate delivery time will be calculated at checkout, but in general, the following shipping times apply:
 
Standard Delivery
Main centres:  1-3 business days
Regional areas: 3-4 business days
Remote areas: 3-5 business days
Buyer Protection How you're covered

Product information

Condition:
New
Location:
South Africa
Bob Shop ID:
575147470

You will get the below 3 ebooks with this bundle.

No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.

Hailed by the creator of IDA Pro as "profound, comprehensive, and accurate," the second edition of The IDA Pro Book covers everything from the very first steps to advanced automation techniques. You'll find complete coverage of IDA's new Qt-based user interface, as well as increased coverage of the IDA debugger, the Bochs debugger, and IDA scripting (especially using IDAPython). But because humans are still smarter than computers, you'll even learn how to use IDA's latest interactive and scriptable interfaces to your advantage.


Network security is not simply about building impenetrable wallsdetermined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networksno prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.


Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies havent kept pace with todays more hostile security environment, leaving millions vulnerable to attack.


The Car Hackers Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems.


Then, once you have an understanding of a vehicles communication network, youll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hackers Handbook will show you how to:

Build an accurate threat model for your vehicle

Reverse engineer the CAN bus to fake engine signals

Exploit vulnerabilities in diagnostic and data-logging systems

Hack the ECU and other firmware and embedded systems

Feed exploits through infotainment and vehicle-to-vehicle communication systems

Override factory settings with performance-tuning techniques

Build physical and virtual test benches to try out exploits safely