MALAYSIA
Law
欢迎光临 | 登入
搜索
进阶搜索
The Real Hackers' Handbook (4TH): Dr. K: BOOKS KINOKUNIYA
书籍资料
The Real Hackers' Handbook (4TH)
The Real Hackers' Handbook (4TH)
作者: Dr. K
出版社 : Carlton Books Ltd
出版日期 : 2011/08
Binding : Paperback
ISBN : 9781847328250

BookWeb售价 : MYR 83.99
纪伊国屋KPC会员价 : MYR 75.59

库存资料 : 目前缺书。
我们将与出版社确认库存情况后,以电子邮件通知您商品预计交货日期。只在商品交付时才自您的帐户收取费用。
语言 : English

书籍简介
Source: ENG
Academic Descriptors: A93663050
Place of Publication: Great Britain
Academic Level: Extracurricular
Review:
Baker & Taylor Newly Released Computer Titles - January 2002 - Ongoing
Baker & Taylor Best-seller And Forthcoming Computer Titles - January 2000 - Ongoing

This expanded, revised and updated edition of "The Hacker's Handbook" re-examines the whole phenomenon of hacking, from its beginnings in the computer networks of the early 80s, through some of the legendary hackers and their exploits, to the basic tools that hackers use in the 2010s - and how to guard against them, or apply them yourself to start learning the art of information retrieval. All areas of hacking are clearly discussed, along with their implications, what is at stake, ways to protect against potential damage, and how to try them out for yourself. There is also a full range of hints and tips for getting the most out of the basic Internet tools we all use, such as email, the World Wide Web, and more.

Contents
HACKERShat hackers.; TOOLS: dual use tools, new versions of nmap and netcat, NESSUS. Malware, phishing, Trojans etc.; FACT VS FICTION: Wargames, The Shockwave Rider, Neuromancer, The Matrix Reloaded, The Bourne Ultimatum, The Girl With the Dragon Tattoo.; TELECOMS & WIFI: Mobile phone viruses, Google Android and Apple iPhone operating systems; INTERNET THREATS: New PDF document compromises, 'heap spraying' cybercrime.; PRIVACY THREATS: To include FaceBook, MySpace, Twitter etc. Botnets designed to steal CC No. s. Mariposa botnet.; CYBER WAR: Many scary examples of how the internet has become the favoured battleground of the 21st century.; CYBER CRIME: Where it comes from, why it is such a growth industry, RBS Worldpay scam, TJX Hacker story, GETA phishing attack, etc.; NEW THREATS: What to look for, where and why.