Home

PriceZombie

Login
  • The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
  • Amazon

    From $68.94 (New)

  • Learn More
  • Change Region
  • Full Website

Copyright © 2016 PriceZombie, LLC.

Buy from Amazon $121.65$0.87 $100.00 $75.00 $50.00 $25.00 Sep Oct Nov Dec Jan Feb Mar Apr 2016 $103.09, Aug 26 8:39 pm$23.99, Aug 26 - Sep 11$3.70, Aug 26 8:39 pm$101.35, Aug 30 2:20 pm$23.99, Aug 26 - Sep 11$3.20, Aug 30 2:20 pm$103.09, Sep 3 9:32 am$23.99, Aug 26 - Sep 11$2.35, Sep 3 9:32 am$93.11, Sep 7 7:21 am$23.99, Aug 26 - Sep 11$1.55, Sep 7 7:21 am$82.09, Sep 11 - Nov 3$23.99, Aug 26 - Sep 11$0.98, Sep 11 4:30 am$82.09, Sep 11 - Nov 3$39.68, Sep 15 1:12 am$0.91, Sep 15 1:12 am$82.09, Sep 11 - Nov 3$23.99, Sep 18 - Nov 16$0.87, Sep 18 10:09 pm$82.09, Sep 11 - Nov 3$23.99, Sep 18 - Nov 16$2.21, Sep 22 8:15 pm$82.09, Sep 11 - Nov 3$23.99, Sep 18 - Nov 16$2.30, Sep 24 - Sep 30$82.09, Sep 11 - Nov 3$23.99, Sep 18 - Nov 16$16.05, Oct 4 - Oct 11$82.09, Sep 11 - Nov 3$23.99, Sep 18 - Nov 16$15.89, Oct 15 1:29 am$82.09, Sep 11 - Nov 3$23.99, Sep 18 - Nov 16$15.77, Oct 18 - Oct 30$82.09, Sep 11 - Nov 3$23.99, Sep 18 - Nov 16$15.76, Nov 3 2:12 pm$82.40, Nov 7 4:55 pm$23.99, Sep 18 - Nov 16$15.77, Nov 7 - Jan 1$74.19, Nov 11 7:28 pm$23.99, Sep 18 - Nov 16$15.77, Nov 7 - Jan 1$101.10, Nov 16 12:01 am$23.99, Sep 18 - Nov 16$15.77, Nov 7 - Jan 1$109.59, Nov 20 8:55 am$29.95, Nov 20 - Nov 27$15.77, Nov 7 - Jan 1$88.41, Nov 24 6:49 pm$29.95, Nov 20 - Nov 27$15.77, Nov 7 - Jan 1$82.78, Nov 27 - Dec 21$29.95, Nov 20 - Nov 27$15.77, Nov 7 - Jan 1$82.78, Nov 27 - Dec 21$28.99, Dec 1 - Dec 27$15.77, Nov 7 - Jan 1$91.99, Dec 27 8:22 am$28.99, Dec 1 - Dec 27$15.77, Nov 7 - Jan 1$120.34, Jan 1 - Jan 5$27.90, Jan 1 - Jan 23$15.77, Nov 7 - Jan 1$120.34, Jan 1 - Jan 5$27.90, Jan 1 - Jan 23$14.11, Jan 5 7:45 pm$121.65, Jan 10 4:46 pm$27.90, Jan 1 - Jan 23$14.09, Jan 10 4:46 pm$119.13, Jan 15 4:02 pm$27.90, Jan 1 - Jan 23$13.97, Jan 15 4:02 pm$117.93, Jan 20 - Jan 23$27.90, Jan 1 - Jan 23$13.87, Jan 20 4:01 pm$117.93, Jan 20 - Jan 23$27.90, Jan 1 - Jan 23$13.83, Jan 23 5:25 am$116.75, Jan 28 - Feb 7$28.99, Jan 28 7:33 am$13.73, Jan 28 7:33 am$116.75, Jan 28 - Feb 7$29.95, Feb 2 - Feb 28$13.60, Feb 2 6:57 am$116.75, Jan 28 - Feb 7$29.95, Feb 2 - Feb 28$15.76, Feb 7 8:58 am$115.58, Feb 12 1:21 pm$29.95, Feb 2 - Feb 28$15.77, Feb 12 1:21 pm$114.42, Feb 17 11:25 pm$29.95, Feb 2 - Feb 28$15.76, Feb 17 11:25 pm$84.12, Feb 23 1:18 pm$29.95, Feb 2 - Feb 28$15.67, Feb 23 1:18 pm$82.78, Feb 28 9:18 pm$29.95, Feb 2 - Feb 28$15.74, Feb 28 9:18 pm$88.72, Mar 12 8:57 pm$40.00, Mar 12 - Mar 30$15.77, Mar 12 8:57 pm$87.49, Mar 24 7:42 pm$40.00, Mar 12 - Mar 30$15.30, Mar 24 7:42 pm$68.94, Mar 30 3:32 pm$40.00, Mar 12 - Mar 30$14.90, Mar 30 3:32 pm 94,6661,608,593 1,953,125 1,464,844 976,563 488,281 Sep Oct Nov Dec Jan Feb Mar Apr 2016

Price Details

New

Latest $68.94 Mar 30, '16
Highest $121.65 Jan 10, '16
Lowest $68.94 Mar 30, '16
Average $88.32 (30d avg)
$104.93 (90d avg)
$94.87 (180d avg)
$93.97 (Lifetime average)
Added Aug 26, 2015

3rd Party New

Latest $40.00 Mar 30, '16
Highest $40.00 Mar 12, '16
Lowest $23.99 Sep 18, '15
Average $40.00 (30d avg)
$31.26 (90d avg)
$28.83 (180d avg)
$28.29 (Lifetime average)
Added Aug 26, 2015

3rd Party Used

Latest $14.90 Mar 30, '16
Highest $16.05 Oct 4, '15
Lowest $0.87 Sep 18, '15
Average $15.62 (30d avg)
$15.05 (90d avg)
$15.42 (180d avg)
$13.01 (Lifetime average)
Added Aug 26, 2015

Sales Rank

30 day average: 373,184
90 day average: 874,227

Product Description

The Hackers Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a path to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Back to store list

Login