Local cover image
Local cover image
Amazon cover image
Image from Amazon.com
Image from Google Jackets
See Baker & Taylor
Image from Baker & Taylor

An Unofficial Guide to Ethical Hacking Fadia Ankit

By: Material type: TextTextLanguage: Eng Publication details: Macmillan Publication Delhi 2014Edition: 2nd EdDescription: 589pISBN:
  • 9781403929648
DDC classification:
  • 005.8 FAD
Summary: The Unofficial Guide To Ethical Hacking helps you to protect your system from such attacks. This book makes you differentiate between hackers and crackers. Hackers are those who search for and take advantage of weak points in a computer system, while crackers ‘breaks’ someone else’s computer system. Crackers can damage your system by passing a virus into your computer system. By reading this book, you can update yourself about the different hacking techniques, and protect your system better. This book covers vital and comprehensive information and methods about network hacking, and attacks of input validation, overflow, privacy, and Denial Of Services (DOS). It also includes information about the most common exploits, vulnerabilities, loopholes, and many more vital topics. The Unofficial Guide To Ethical Hacking starts with the introduction of what a hacker is, hacking windows, information about hacking related to networks, the web, and passwords, attacks of input validation, buffer overflow, and privacy. You can also learn a mammoth description of TCP/IP, DOS attacks, cryptography, firewalls, and error messages. This book also provides the description of batch file programming, viruses torn apart, and readers also get know about the working of viruses. The Unofficial Guide To Ethical Hacking is not only a guide to hacking, but it also explains other aspects related to computer security. The second edition of this book was published by Macmillan India Ltd in 2006 and available in paperback. Key Features: Case studies are included in this book, which helps in understanding the theory in the book easily. Methods and information of this book are updated and explained in a step-by-step pattern.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Materials specified Status Date due Barcode
Books Books Rashtriya Raksha University 005.8 FAD (Browse shelf(Opens below)) Available 2233

The Unofficial Guide To Ethical Hacking helps you to protect your system from such attacks. This book makes you differentiate between hackers and crackers. Hackers are those who search for and take advantage of weak points in a computer system, while crackers ‘breaks’ someone else’s computer system. Crackers can damage your system by passing a virus into your computer system.

By reading this book, you can update yourself about the different hacking techniques, and protect your system better. This book covers vital and comprehensive information and methods about network hacking, and attacks of input validation, overflow, privacy, and Denial Of Services (DOS). It also includes information about the most common exploits, vulnerabilities, loopholes, and many more vital topics.

The Unofficial Guide To Ethical Hacking starts with the introduction of what a hacker is, hacking windows, information about hacking related to networks, the web, and passwords, attacks of input validation, buffer overflow, and privacy. You can also learn a mammoth description of TCP/IP, DOS attacks, cryptography, firewalls, and error messages. This book also provides the description of batch file programming, viruses torn apart, and readers also get know about the working of viruses.

The Unofficial Guide To Ethical Hacking is not only a guide to hacking, but it also explains other aspects related to computer security. The second edition of this book was published by Macmillan India Ltd in 2006 and available in paperback.

Key Features:

Case studies are included in this book, which helps in understanding the theory in the book easily.
Methods and information of this book are updated and explained in a step-by-step pattern.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image
© 2024 Rashtriya Raksha University, All Rights Reserved.