• Ethical Hacking

  • The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cyber Security of Computer Networks, Including Tips on Social Engineering
  • De: Lester Evans
  • Narrado por: Brian R. Scott
  • Duración: 3 h y 35 m
  • 3.9 out of 5 stars (38 calificaciones)

Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.
Ethical Hacking  Por  arte de portada

Ethical Hacking

De: Lester Evans
Narrado por: Brian R. Scott
Prueba por $0.00

US$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por US$14.95

Compra ahora por US$14.95

la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.

Resumen del Editor

Ever feel like you don’t even own the hardware and software you paid dearly for?

Ever get the impression that you have to ask for permission before installing or changing a program on your device?

Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads?

You’re not alone.

Half-baked products and services that chip away at your sense of ownership, independence, and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers. None of it is intentional or meant to cause harm, which makes it all the more damning.

There’s a silver lining in all of this, and that is ethical hacking. This book will shine a light on how engineers think and show you how to discern their original intentions, helping you adopt their attitude and perfect their products despite managerial crud doing their worst to stop you.

In a world where everything is slowly becoming more managed and overbearing, this audiobook is an attempt to take back some of that original awesomeness envisioned by engineers and at least make your world a slightly better place.

Here’s just a tiny fraction of the topics covered in this audiobook:

  • Fighting against companies
  • Ethical hacking defined
  • War on the internet
  • Engineer’s mind
  • The almighty EULA
  • The danger of defaults
  • John Deere
  • Copyright
  • YouTube ContentID
  • Tracking users
  • DRM
  • GEMA, the copyright police
  • Torrents
  • Sports channels
  • Megaupload and Anonymous
  • Julian Assange
  • Patents
  • Penetration testing
  • Jailbreaking Android/iPhone
  • Shut up Cortana
  • How an hacker could go about hacking your WiFi and much, much more!

If you want to learn more about ethical hacking, then scroll up and click “add to cart”!

©2019 Lester Evans (P)2019 Lester Evans

Lo que los oyentes dicen sobre Ethical Hacking

Calificaciones medias de los clientes
Total
  • 4 out of 5 stars
  • 5 estrellas
    25
  • 4 estrellas
    2
  • 3 estrellas
    2
  • 2 estrellas
    2
  • 1 estrella
    7
Ejecución
  • 4 out of 5 stars
  • 5 estrellas
    25
  • 4 estrellas
    2
  • 3 estrellas
    2
  • 2 estrellas
    2
  • 1 estrella
    6
Historia
  • 4 out of 5 stars
  • 5 estrellas
    25
  • 4 estrellas
    1
  • 3 estrellas
    2
  • 2 estrellas
    3
  • 1 estrella
    6

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.

Ordenar por:
Filtrar por:
  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Great for getting started on the yellow brick road

Excellent read and just enough materials to get pointed in the right direction, top book.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    3 out of 5 stars
  • Ejecución
    3 out of 5 stars
  • Historia
    2 out of 5 stars

basic

Very basic and redundant. It was tough to finish only being 3 hours long. Will keep lookijg for the right one for me.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

esto le resultó útil a 1 persona

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

True to its title

This book does as promised - it gives the basics of penetration testing. When you're done reading this book you'll have an understanding of the most popular tools, be able to perform a pen test, interpret the results of your pen test, and shore up any cracks in your network/site.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

useful and Worthy

Very easy to read, very fun and interesting! I'm more into databases but the way everything integrates now in the current IT world, I realized that I need to get a better understanding of how to protect my database servers network or at least, being able to discuss about security with my network team without feeling lost. This books is about how to protect yourself from the very "nasty" and "wild" Internet world we all are living in. It will change your false sense of security at work or home, trust me! Even though this is not an in-depth volume about the testing tools or techniques, this book delivers what is promised on the cover and much more!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

A listing of tools

A good reference to look through - but it's not going to teach you anything like an actual recipe where you actually cook something and get an item you can eat. Should have been called Ethical Hacking.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Beginners book

I have intermediate/beginner knowledge and always wanted to expand out. This is pretty good in that area and terms used are easy for beginner to get. Ended up being my top pick out of the books I purchased on this topic. Highly recommend to add to a collection. It's not a huge book but a decent size and the print isn't too small.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Too Basic, still great work.

Yeah, I understand the title states it's the Beginner’s Guide but I believe it could cover more deeper the knowledge involved in the techniques. Knowing the underlying technologies is fundamental for understanding how to use the same techniques in different scenarios and hence having more sophisticated tests.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

This book is really informative

This book is really informative and thorough for anyone that is looking to try and get into a cyber security field.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    3 out of 5 stars
  • Ejecución
    2 out of 5 stars
  • Historia
    3 out of 5 stars

not what I expected but was decent

this book is for someone that may want to get into this kind of stuff and it almost hints at teaching you such things. although they teach you some things it's basically there to tell you why you would want to do this , how you can use it, and why you would. so if you are looking for a reason. this might be a good book. and also not know much of anything at all.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

esto le resultó útil a 2 personas

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

A great on ramp for hackers.

Great book for the newbies, but also a nice resource for everybody that wants to know a structured, repeatable process to get going on network pen testing. Pat is the man!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

esto le resultó útil a 1 persona