This auction has been won.
Leading
fazulk992 1 × R1.00
9 Dec 12:46

Similar products

40% OFF
Cisco Umbrella Secure Internet Gateway Essentials Bundle - 1 Year Subscription
R1,800.00 R3,000.00
80% OFF
100 Marketing eBook Bundle Master Digital Marketing & Boost Your Business!
R397.00 R1,950.00
36% OFF
Cisco Umbrella DNS Security Essentials Bundle - 1 Year Subscription
R963.00 R1,500.00
71% OFF
3200 Pages Best Kids Activity Book Bundle for Canva
R197.00 R690.00
Hacking ebook Bundle Hacking ebook Bundle Hacking ebook Bundle Hacking ebook Bundle
Hacking ebook Bundle Hacking ebook Bundle Hacking ebook Bundle Hacking ebook Bundle
Sold

Hacking ebook Bundle

2 were available / new
R80.00 minimum increment
R1.00
Shipping
R65.00 Standard shipping applies to orders under R100.00, in most areas in South Africa. R35.00 Standard shipping applies to orders over R100.00. Some areas may attract a surcharge surcharge. This will be calculated at checkout if applicable.
Check my rate
The seller has indicated that they will usually have this item ready to ship within 12 business days. Shipping time depends on your delivery address. The most accurate delivery time will be calculated at checkout, but in general, the following shipping times apply:
 
Standard Delivery
Main centres:  1-3 business days
Regional areas: 3-4 business days
Remote areas: 3-5 business days
Buyer protection

Product details

Condition
New
Location
South Africa
Bob Shop ID
575147470

You will get the below 3 ebooks with this bundle.

No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.

Hailed by the creator of IDA Pro as "profound, comprehensive, and accurate," the second edition of The IDA Pro Book covers everything from the very first steps to advanced automation techniques. You'll find complete coverage of IDA's new Qt-based user interface, as well as increased coverage of the IDA debugger, the Bochs debugger, and IDA scripting (especially using IDAPython). But because humans are still smarter than computers, you'll even learn how to use IDA's latest interactive and scriptable interfaces to your advantage.


Network security is not simply about building impenetrable wallsdetermined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networksno prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.


Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies havent kept pace with todays more hostile security environment, leaving millions vulnerable to attack.


The Car Hackers Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems.


Then, once you have an understanding of a vehicles communication network, youll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hackers Handbook will show you how to:

Build an accurate threat model for your vehicle

Reverse engineer the CAN bus to fake engine signals

Exploit vulnerabilities in diagnostic and data-logging systems

Hack the ECU and other firmware and embedded systems

Feed exploits through infotainment and vehicle-to-vehicle communication systems

Override factory settings with performance-tuning techniques

Build physical and virtual test benches to try out exploits safely

Recently viewed

See more
IC MCU 8BIT 1.5KB OTP 14SOIC PIC16C505-20I/SL
R62.10
UGreen 15852 USB-C 6-In-1 Docking Station With Dual HDMI 4K@60Hz Supporting MST* In Windows OS, 2...
R1,144.91
DIY IR Infrared Sensor Module Switch Electronic Kit
R375.00
Engine Timing Adjustment Tool Kit for Opel Adam Astra Corsa 1.0 1.4
R1,199.00