• Bookbook – grāmatas tikai angļu valodā!
Ar kodu EXTRA60,38 cena tikai
67,09 €
Hacking of Computer Networks
Hacking of Computer Networks
60,38 €
67,09 €
  • Mēs nosūtīsim 10-14 darba dienu laikā.
The objective of the book is to summarize to the user with main issues in certified ethical hacker course. The complete book consists of many parts: 1. Part 1: Lab Setup 2. Part2: Foot printing and Reconnaissance 3. Part 3: Scanning Methodology 4. Part 4: Enumeration 5. Part 5: System Hacking 6. Part 6: Trojans and Backdoors and Viruses 7. Part 7: Sniffer and Phishing Hacking 8. Part 8: Hacking Web Servers 9. Part 9: Hacking Windows and Linux Systems 10. Part 10: Wireless Hacking 11. Part 11: H…
60.38 2025-06-02 08:00:00
  • Extra -10% atlaide, ievadot kodu: EXTRA7d.07:45:58

Hacking of Computer Networks + bezmaksas piegāde! | Bookbook.lv

Atsauksmes

Apraksts

The objective of the book is to summarize to the user with main issues in certified ethical hacker course. The complete book consists of many parts: 1. Part 1: Lab Setup 2. Part2: Foot printing and Reconnaissance 3. Part 3: Scanning Methodology 4. Part 4: Enumeration 5. Part 5: System Hacking 6. Part 6: Trojans and Backdoors and Viruses 7. Part 7: Sniffer and Phishing Hacking 8. Part 8: Hacking Web Servers 9. Part 9: Hacking Windows and Linux Systems 10. Part 10: Wireless Hacking 11. Part 11: Hacking Mobile Applications

10 EXTRA % atlaide

60,38 €
67,09 €
Mēs nosūtīsim 10-14 darba dienu laikā.

Kupona kods: EXTRA

Akcija beidzas 7d.07:45:58

Atlaides kods derīgs pirkumiem no 10 €. Atlaides nav kumulatīvas.

Derīgs tikai pirkumiem tiešsaistē.

Piesakieties, lai
un par šo preci jūs saņemsiet 0,67 Grāmatu eiro!?

The objective of the book is to summarize to the user with main issues in certified ethical hacker course. The complete book consists of many parts: 1. Part 1: Lab Setup 2. Part2: Foot printing and Reconnaissance 3. Part 3: Scanning Methodology 4. Part 4: Enumeration 5. Part 5: System Hacking 6. Part 6: Trojans and Backdoors and Viruses 7. Part 7: Sniffer and Phishing Hacking 8. Part 8: Hacking Web Servers 9. Part 9: Hacking Windows and Linux Systems 10. Part 10: Wireless Hacking 11. Part 11: Hacking Mobile Applications

Atsauksmes

  • Nav atsauksmju
0 klienti novērtēja šo produktu.
5
0%
4
0%
3
0%
2
0%
1
0%