MALAYSIA
Law
Welcome Guest | Login
SEARCH
Advanced
The Real Hackers' Handbook (4TH): Dr. K: BOOKS KINOKUNIYA
Book Details
The Real Hackers' Handbook (4TH)
The Real Hackers' Handbook (4TH)
By Dr. K
Publisher : Carlton Books Ltd
Published Date : 2011/08
Binding : Paperback
ISBN : 9781847328250

BookWeb Price : MYR 83.99
Kinokuniya Privilege Card member price : MYR 75.59

Availability Status : Out of stock.
The item is subject to availability at publisher.We will e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged upon delivery.
Language : English

Book Description
Source: ENG
Academic Descriptors: A93663050
Place of Publication: Great Britain
Academic Level: Extracurricular
Review:
Baker & Taylor Newly Released Computer Titles - January 2002 - Ongoing
Baker & Taylor Best-seller And Forthcoming Computer Titles - January 2000 - Ongoing
Table of Contents
 
  SECTION 1 In the Beginning
    1 Introduction to Hacking                      12 (19)
    2 Hackers                                      31 (35)
  SECTION 2 Tools, Techniques; & Threats
    3 Tools                                        66 (29)
    4 Techniques                                   95 (27)
    5 Telecoms & Wi-Fi                             122(25)
    6 Security Threats                             147(17)
    7 Internet Threats                             164(36)
    8 Privacy Threats                              200(22)
  SECTION 3 Motivations, Mischief & Mayhem
    9 Cyber-War or Cyber-Terrorism?                222(29)
    10 Cyber-Crime                                 251(18)
    11 Cyber-Censorship                            269(9)
  SECTION 4 In the Future
    12 Minimizing Threat                           278(16)
    13 The Death of the Internet?                  294
 

This expanded, revised and updated edition of "The Hacker's Handbook" re-examines the whole phenomenon of hacking, from its beginnings in the computer networks of the early 80s, through some of the legendary hackers and their exploits, to the basic tools that hackers use in the 2010s - and how to guard against them, or apply them yourself to start learning the art of information retrieval. All areas of hacking are clearly discussed, along with their implications, what is at stake, ways to protect against potential damage, and how to try them out for yourself. There is also a full range of hints and tips for getting the most out of the basic Internet tools we all use, such as email, the World Wide Web, and more.

Contents
HACKERShat hackers.; TOOLS: dual use tools, new versions of nmap and netcat, NESSUS. Malware, phishing, Trojans etc.; FACT VS FICTION: Wargames, The Shockwave Rider, Neuromancer, The Matrix Reloaded, The Bourne Ultimatum, The Girl With the Dragon Tattoo.; TELECOMS & WIFI: Mobile phone viruses, Google Android and Apple iPhone operating systems; INTERNET THREATS: New PDF document compromises, 'heap spraying' cybercrime.; PRIVACY THREATS: To include FaceBook, MySpace, Twitter etc. Botnets designed to steal CC No. s. Mariposa botnet.; CYBER WAR: Many scary examples of how the internet has become the favoured battleground of the 21st century.; CYBER CRIME: Where it comes from, why it is such a growth industry, RBS Worldpay scam, TJX Hacker story, GETA phishing attack, etc.; NEW THREATS: What to look for, where and why.