Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Computer Science | >> | An Unofficial Guide ... |
ISBN
:
9781403929648
Publisher
:
Macmillan India
Subject
:
Computer Science, Computer Security, null
Binding
:
Paperback
Pages
:
616
Year
:
2006
₹
425.0
₹
425.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
Are you a victim of hacking attacks on your system? An Unofficial Guide to Ethical Hacking (second edition) helps you prevent your system from such attacks! The book clearly defines the difference between hackers and crackers. Hackers cracks a computer system for the sheer challenge of doing so, while crackers are computer criminals who break into systems, release viruses, and deface websites. Ethical hackers often help system administrators by notifying them of loopholes in their systems before crackers can get to them and cause damage. Deriving data from actual experiences and user case studies, this book is more than just a guide to hacking. It explores all aspects of computer security in a hands-on and easy-to-comprehend manner. A must-read for any computer use who wants to learn how a system is cracked and how you can better protect yourself. With helpful resources and clear, step-by-step instructions on various hacking techniques, this book features the most up-to-date and comprehensive information and methods, covering the following news attacks: Network Hacking Input Validation Attacks Buffer Overflow Attacks Privacy Attacks Denial of Services (DOS) Attacks Most common Exploits, Vulnerabilities and Loopholes And lots more.... Table Of Contents Preface to the Second Edition Chapter I: Who is a Hacker Anyhow? Chapter II: Hacking Windows Chapter III: Network Hacking Chapter IV: Web Hacking Chapter V: Password Hacking Chapter VI:Input Validation Attacks Chapter VII: Buffer Overflow Attacks Chapter VIII: Privacy Attacks Chapter IX: TCP/IP: A Mammoth Description Chapter X: Denial Of Service (DOS) Attacks Chapter XI: Cryptography, Firewalls and Error Messages Chapter XII: Batch File Programming Chapter XIII: Viruses Torn Apart Chapter XIV: How Does a Virus Work?
Related Items
-
of
Neural Networks and Artificial Intelligence for Biomedical Engineering
Donna L. Hudson
Starts At
15918.0
18510.0
14% OFF
Rapidex Computer Course: Computer Learning Made Easy
Jayant Neogy
Starts At
141.0
175.0
19% OFF
Artificial Life V: Proceedings of the Fifth International Workshop on the Synthesis and Simulation of Living Systems (Complex Adaptive Systems)
Christopher G. Langton
Starts At
6602.0
7677.0
14% OFF
The Electronic Design Studio: Architectural Education in the Computer Era
Malcolm McCullough
Starts At
6602.0
7677.0
14% OFF
Are you sure you want to remove the item from your Bag?
Yes
No
Added to Your Wish List
OK
Your Shopping Bag
- 1 Item
Item
Delivery
Unit Price
Quantity
Sub Total
Order Summary