Traditional vs Generative AI Pentesting

Traditional vs Generative AI Pentesting

Yassine Maleh

217,45 €
IVA incluido
Consulta disponibilidad
Editorial:
Taylor & Francis Ltd
Año de edición:
2025
ISBN:
9781041070450

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI.

Artículos relacionados

  • Poetry Is Our Ministry to Touch the Heart
    Anelda Lukesia Ballard / Jean Anelda Scott
    Poetry is Our Ministry to Touch the Heart, was birthed when Anelda L. Ballard became ill. God spoke to her in a dream and said 'pick up a pen and write' by being obedient this book was written through the Holy Spirit. Anelda and her mother Jean A. Scott believes that God’s wants to heal a hurting heart. This book will inspire you and encourage you to never give up hope. Jesu...
    Disponible

    11,12 €

  • I soldati lunghi
    Pierluigi Romeo di Colloredo Mels
    Il 24 maggio 1915 il Regno d’Italia entrò nella Grande Guerra, che si sarebbe dimostrata il momento più alto e tragico della sua storia, a poco più di cinquant’anni dalla sua unificazione.In quella lotta tremenda durata quattro anni, la Brigata Granatieri di Sardegna , con i suoi due valorosi Reggimenti, i più antichi del Regio Esercito scrisse, nel grande quadro della guerra d...
    Disponible

    32,59 €

  • Five Beneath Philly
    Susan Bandy / Tom Richmond
    Allen Williams plans to make something of his life and escape South Philly and the work at Cross Brothers’ Meat Packing Plant. He prepares himself with excellent grades and an upcoming full-ride scholarship to climb out of South Philly forever. Then fate changes his whole world. An only son in a family of six, Allen suddenly finds himself responsible for his mother, grandmother...
    Disponible

    18,28 €

  • Forms
    Sharon Welch
    I am an award-winning artist and my works hang in private residences, community hospitals, businesses, and restaurants across the US and also abroad.  I live in Pierre, South Dakota. Since 2008 I have owned Sharon Welch Gallery and Studio where I paint and teach classes.  My theory is have fun, remove the fear of failure, experiment and let the child inside of you play.Very oft...
  • Ricordi di una ausiliaria
    Andrea Lombardi / Raffaella Duelli
    Le memorie di Raffaella Duelli, Volontaria nel Battaglione Barbarigo della Decima Flottiglia Mas iniziano con la partenza del Barbarigo da Roma, narrando la lunga marcia del reparto verso il nord, sotto il mitragliamento degli aerei Alleati. Quindi, è descritta vividamente l'ultima battaglia del Barbarigo sul Fronte Sud, dal Senio a Comacchio: gli appunti di Raffaella, giov...
    Disponible

    28,08 €

  • Why Didn’t You Ask?
    Panya Dixon
    From an early occurrence in her childhood to a perilous thirteen-year relationship, Panya Dixon too often suffered from various forms of physical, emotional, and sexual abuse. Conflicted between love and the pain her loved ones brought on her, she consistently had to fight for her life and her will to move on. Why Didn’t You Ask? is an expression of Panya’s truth—her trials, pa...
    Disponible

    20,35 €

Otros libros del autor

  • Traditional vs Generative AI Pentesting
    Yassine Maleh
    Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. ...
    Disponible

    87,06 €

  • Web Application PenTesting
    Yassine Maleh
    This book provides a structured learning path from basic security principles to advanced penetration testing techniques, tailored for both new and experienced cybersecurity practitioners. It is a crucial toolkit for defending against the rising tide of cyber threats. ...
  • Security and Privacy Management, Techniques, and Protocols
    Yassine Maleh
    The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examin...