Welcome Guest | Login
The Real Hackers' Handbook (4TH): Dr. K: BOOKS KINOKUNIYA
Book Details
The Real Hackers' Handbook (4TH)
The Real Hackers' Handbook (4TH)
By Dr. K
Publisher : Carlton Books Ltd
Published Date : 2011/08
Binding : Paperback
ISBN : 9781847328250

BookWeb Price : MYR 83.99
Kinokuniya Privilege Card member price : MYR 75.59

Availability Status : Out of stock.
The item is subject to availability at publisher.We will e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged upon delivery.
Language : English

Book Description
Source: ENG
Academic Descriptors: A93663050
Place of Publication: Great Britain
Academic Level: Extracurricular
Baker & Taylor Newly Released Computer Titles - January 2002 - Ongoing
Baker & Taylor Best-seller And Forthcoming Computer Titles - January 2000 - Ongoing

This expanded, revised and updated edition of "The Hacker's Handbook" re-examines the whole phenomenon of hacking, from its beginnings in the computer networks of the early 80s, through some of the legendary hackers and their exploits, to the basic tools that hackers use in the 2010s - and how to guard against them, or apply them yourself to start learning the art of information retrieval. All areas of hacking are clearly discussed, along with their implications, what is at stake, ways to protect against potential damage, and how to try them out for yourself. There is also a full range of hints and tips for getting the most out of the basic Internet tools we all use, such as email, the World Wide Web, and more.

HACKERShat hackers.; TOOLS: dual use tools, new versions of nmap and netcat, NESSUS. Malware, phishing, Trojans etc.; FACT VS FICTION: Wargames, The Shockwave Rider, Neuromancer, The Matrix Reloaded, The Bourne Ultimatum, The Girl With the Dragon Tattoo.; TELECOMS & WIFI: Mobile phone viruses, Google Android and Apple iPhone operating systems; INTERNET THREATS: New PDF document compromises, 'heap spraying' cybercrime.; PRIVACY THREATS: To include FaceBook, MySpace, Twitter etc. Botnets designed to steal CC No. s. Mariposa botnet.; CYBER WAR: Many scary examples of how the internet has become the favoured battleground of the 21st century.; CYBER CRIME: Where it comes from, why it is such a growth industry, RBS Worldpay scam, TJX Hacker story, GETA phishing attack, etc.; NEW THREATS: What to look for, where and why.