Mobile Hacker

Udemy – Become a Mobile App Growth Hacker. Total Theory and Training  eBooks & eLearning

Posted by naag at Sept. 11, 2015
Udemy – Become a Mobile App Growth Hacker. Total Theory and Training

Udemy – Become a Mobile App Growth Hacker. Total Theory and Training
MP4 | Video: 1280x720 | 60 kbps | 48 KHz | Duration: 4 Hours | 1.29 GB
Genre: eLearning | Language: English

Complete guide on theory and elite techniques to increase app downloads and increase user retention to maximize profit.

The Mobile Application Hacker's Handbook  eBooks & eLearning

Posted by nebulae at April 5, 2015
The Mobile Application Hacker's Handbook

Dominic Chell and Tyrone Erasmus, "The Mobile Application Hacker's Handbook"
English | ISBN: 1118958500 | 2015 | 816 pages | EPUB | 6 MB

CEH v9: Certified Ethical Hacker Version 9 Practice Tests  eBooks & eLearning

Posted by libr at Jan. 20, 2017
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

CEH v9: Certified Ethical Hacker Version 9 Practice Tests by Raymond Blockmon
English | 2016 | ISBN: 1119252156 | 192 pages | EPUB | 3,3 MB

ITPro.TV - Certified Ethical Hacker CEH v9  eBooks & eLearning

Posted by FenixN at Jan. 18, 2017
ITPro.TV - Certified Ethical Hacker CEH v9

ITPro.TV - Certified Ethical Hacker CEH v9
HDRips | MP4/AVC, ~3409 kb/s | 1920x1076 | Duration: 33:37:36 | English: AAC, 256 kb/s (2 ch) | 42.9 GB
Genre: Development / Programming / Security

EC-Council's Ethical Hacking and Countermeasures (CEH) covers concepts and tools related to exploiting systems, networks, devices and operating platforms. This includes hacking concepts such as vulnerability assessment, network intrusion, reverse engineering, defacing websites, damaging network appliances, launching distributed denial-of-service attacks, massive worm propagation, breaking passwords, brute-forcing authentication systems, cracking encryption, exploiting systems, advance viruses, Trojans, and other malware. This certificate is targeted at site administrators, security professionals, auditors and anyone who is concerned about the integrity of the network infrastructure.

Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript  eBooks & eLearning

Posted by AlenMiler at Jan. 6, 2017
Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript

Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript: Beginners Guide to Learn Data Analytics, Predictive Analytics and Data … Hacking (Hacking Freedom and Data Driven) by Isaac D. Cody
English | 27 Dec. 2016 | ISBN: 1541333306 | 262 Pages | AZW3/MOBI/EPUB/PDF (conv) | 4.73 MB

This is a 3 book bundle related to data analytics and hacking computers and hacking mobile devices, apps, and game consoles!

EC Council Certified Ethical Hacker v9.0 [repost]  eBooks & eLearning

Posted by ParRus at Jan. 3, 2017
EC Council Certified Ethical Hacker v9.0 [repost]

EC Council Certified Ethical Hacker v9.0 (2016)
WEBRip | English | MP4 | 1280 x 720 | AVC ~500 kbps | 15 fps
AAC | 64 Kbps | 22.05 KHz | 1 channel | 19:34:42 | 4.66 GB
Genre: Video Tutorial / Networking & Security

This Certified Ethical Hacker (CEH) v9.0 video training course teaches you the ethical hacking tools and techniques needed to improve your network's security posture. CBT Nuggets trainer Keith Barker walks you through building your own practice lab, including using evaluation software, and encourages you to not only watch and enjoy the videos, but practice everything hands-on in your own lab environment.

Certified Ethical Hacker - Reconnaissance and Network Navigation  eBooks & eLearning

Posted by FenixN at Dec. 25, 2016
Certified Ethical Hacker - Reconnaissance and Network Navigation

Certified Ethical Hacker - Reconnaissance and Network Navigation
HDRips | MP4/AVC, ~66 kb/s | 1280x720 | Duration: 02:19:08 | English: AAC, 128 kb/s (2 ch) | 561 MB
Genre: Development / Programming

This is the first of a four-part series designed to help you prepare for the International Council of E-Commerce Consultant's Certified Ethical Hacker (CEH) exam. This course focuses on several key areas of knowledge tested in that exam: You will learn how to perform reconnaissance on companies, networks, systems, and people; how to conduct footprinting; how to exercise resource enumeration; how to sniff networks and scan them in order to better understand the attack landscape; and how to ethically gain access to systems, networks and data.

Certified Ethical Hacker CEH Complete Video Course (Module 1-2)  eBooks & eLearning

Posted by FenixN at Dec. 9, 2016
Certified Ethical Hacker CEH Complete Video Course (Module 1-2)

Certified Ethical Hacker CEH Complete Video Course (Module 1-2)
HDRips | MP4/AVC, ~1250 kb/s | 1280x720 | Duration: 05:41:03 | English: AAC, 128 kb/s (2 ch) | 3.07 GB
Genre: Development / Programming / Security

Learn everything you need to know to pass the Certified Ethical Hacker exam in under 11 hours. Understand the basics of network and Internet accessible application technologies, common discovery, and analysis techniques as well as more advanced security concepts such as malware and cryptography.

Lynda - Ethical Hacking: Mobile Devices and Platforms  eBooks & eLearning

Posted by U.N.Owen at Dec. 8, 2016
Lynda - Ethical Hacking: Mobile Devices and Platforms

Lynda - Ethical Hacking: Mobile Devices and Platforms
Size: 308 MB | Duration: 1h 47m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English

Mobile devices are used for our most sensitive transactions, including email, banking, and social media.

Hacking University: Computer Hacking and Mobile Hacking 2 Manuscript Bundle  eBooks & eLearning

Posted by AlenMiler at Oct. 29, 2016
Hacking University: Computer Hacking and Mobile Hacking 2 Manuscript Bundle

Hacking University: Computer Hacking and Mobile Hacking 2 Manuscript Bundle: Essential Beginners Guide on How to Become an Amateur Hacker and Hacking … Android) (Hacking Freedom and Data Driven) by Isaac D. Cody
English | 23 Oct. 2016 | ISBN: 1539713830 | 95 Pages | PDF | 585.49 KB

This is a 2 book bundle related to hacking computers and hacking mobile devices, apps, and game consoles.