0

My Bag

0.00

Download App

An Unofficial Guide To Ethical Hacking

An Unofficial Guide To Ethical Hacking

by Ankit Fadia

  • ISBN

    :  

    9781403929648

  • Publisher

    :  

    Macmillan India

  • Subject

    :  

    Computer Science, Computer Security, null

  • Binding

    :  

    Paperback

  • Pages

    :  

    616

  • Year

    :  

    2006

425.0

425.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

Estimated Shipping Time : 5-7 Business Days

View Details

Share it on

  • Description

    Are you a victim of hacking attacks on your system? An Unofficial Guide to Ethical Hacking (second edition) helps you prevent your system from such attacks! The book clearly defines the difference between hackers and crackers. Hackers cracks a computer system for the sheer challenge of doing so, while crackers are computer criminals who break into systems, release viruses, and deface websites. Ethical hackers often help system administrators by notifying them of loopholes in their systems before crackers can get to them and cause damage. Deriving data from actual experiences and user case studies, this book is more than just a guide to hacking. It explores all aspects of computer security in a hands-on and easy-to-comprehend manner. A must-read for any computer use who wants to learn how a system is cracked and how you can better protect yourself. With helpful resources and clear, step-by-step instructions on various hacking techniques, this book features the most up-to-date and comprehensive information and methods, covering the following news attacks: Network Hacking Input Validation Attacks Buffer Overflow Attacks Privacy Attacks Denial of Services (DOS) Attacks Most common Exploits, Vulnerabilities and Loopholes And lots more.... Table Of Contents Preface to the Second Edition Chapter I: Who is a Hacker Anyhow? Chapter II: Hacking Windows Chapter III: Network Hacking Chapter IV: Web Hacking Chapter V: Password Hacking Chapter VI:Input Validation Attacks Chapter VII: Buffer Overflow Attacks Chapter VIII: Privacy Attacks Chapter IX: TCP/IP: A Mammoth Description Chapter X: Denial Of Service (DOS) Attacks Chapter XI: Cryptography, Firewalls and Error Messages Chapter XII: Batch File Programming Chapter XIII: Viruses Torn Apart Chapter XIV: How Does a Virus Work?

Related Items

-

of

  • OFFER

    ASP.NET: Developer's Guide

    Greg Buczek

    Starts At

    877.0

    1070.0

    18% OFF

  • Modeling and Asynchronous Distributed Simulation: Analyzing Complex Systems

    Sumit Ghosh

    Starts At

    795.0

  • OFFER

    Neural Networks and Artificial Intelligence for Biomedical Engineering

    Donna L. Hudson

    Starts At

    15918.0

    18510.0

    14% OFF

  • OFFER

    Lectures on Computation

    Richard P Feynman

    Starts At

    1022.0

    1382.0

    26% OFF

  • Biomedical Instrumentation and Measurements

    Weibell J Fred

    Starts At

    350.0

  • OFFER

    Rapidex Computer Course: Computer Learning Made Easy

    Jayant Neogy

    Starts At

    141.0

    175.0

    19% OFF

  • OFFER

    Fundamentals of Computers

    V Rajaraman

    Starts At

    191.0

    225.0

    15% OFF

  • OFFER

    Artificial Life V: Proceedings of the Fifth International Workshop on the Synthesis and Simulation of Living Systems (Complex Adaptive Systems)

    Christopher G. Langton

    Starts At

    6602.0

    7677.0

    14% OFF

  • OFFER

    The Electronic Design Studio: Architectural Education in the Computer Era

    Malcolm McCullough

    Starts At

    6602.0

    7677.0

    14% OFF

  • OFFER

    An Introduction to Distributed Algorithms

    Valmir C. Barbosa

    Starts At

    521.0

    695.0

    25% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- 1 Item

null

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : 0.0 Total Savings        : Grand Total :

Order Summary