25 Books to Read Before You Die
 
 

Recently Viewed clear list


The Powell's Playlist | August 6, 2014

Graham Joyce: IMG The Powell’s Playlist: Graham Joyce



The Ghost in the Electric Blue Suit is set on the English coast in the hot summer of 1976, so the music in this playlist is pretty much all from the... Continue »
  1. $17.47 Sale Hardcover add to wish list

spacer

This item may be
out of stock.

Click on the button below to search for this title in other formats.


Check for Availability
Add to Wishlist

The Unofficial Guide to Ethical Hacking (Miscellaneous)

The Unofficial Guide to Ethical Hacking (Miscellaneous) Cover

ISBN13: 9781931841726
ISBN10: 1931841721
All Product Details

 

Synopses & Reviews

Publisher Comments:

Learn how to use good hacking to prevent your system from becoming the victim of attacks! "The Unofficial Guide to Ethical Hacking, Second Edition" defines the difference between hackers - those who crack a computer system for the sheer challenge of doing so - and crackers - an elusive class of computer criminals who break into systems, release viruses, and deface Web sites. Ethical hackers often help out system administrators by notifying them of loopholes in their systems before crackers can get to them and cause damage. More than just a guide to hacking, this book explores all aspects of computer security in a hands-on and easy-to-comprehend manner - a must-read for any computer user who wants to learn how a system is cracked and how you can better protect yourself. With helpful resources and clear, step-by-step instructions on various hacking techniques, this book features the most up-to-date and comprehensive information and methods, covering file encryption, firewalls, and viruses, as well as new topics such as instant messenger hacking, intellectual property thefts, identity attacks, and much more.

Book News Annotation:

Offering a counterpoint to the common view of hackers as criminals, 16-year-old Fadia encourages a new wave of helpful hackers who break into systems purely for the scientific challenge, leaving files and systems unscathed and offering security pointers to system administrators. The results of Fadia's experiments are published here, with step-by-step hacks for Windows, Linux, and DOS, and information on firewalls, viruses and mail bombs for hackers, programmers, system administrators or anyone interested in making their computer system more (or less) secure. Though young, Fadia is a hacking authority and is founder of Hacking Truths web site.
Annotation c. Book News, Inc., Portland, OR (booknews.com)

Synopsis:

The 17-year-old creator of the popular "Hacking Truths" Web site explores all aspects of of computer security in an easy-to-understand, newbie-friendly manner.

Synopsis:

The Unofficial Guide to Ethical Hacking is much more than a guide to hacking. For anyone interested in finding out how your fail-safe system was cracked and how you can better protect yourself, this book is a must-read. It contains helpful resources that you can reference to better protect your system from becoming the victim of attacks. It also includes discussion on the nature of file encryption, firewalls, and viruses and shows how users can make their systems more secure.

About the Author

Ankit Fadia is an independent computer security consultant based in Silicon Valley. He has authored several internationally best-selling books on numerous topics related to computer security, and he is a widely recognized computer security guru and cyberterrorism expert. Fadia provides customized cybersecurity training and consulting solutions to major clients all across North America, Asia, Australia, and the Middle East. He is also regularly invited by BBC Radio World News to share the latest updates on virus outbreaks, loopholes, and cybercrime trends. Recently, Fadia started his own computer security consulting and mobile phone solutions company based in Malaysia, with operations all across the Asian Pacific region.

Table of Contents

Introduction Chapter 1 - So Who is a Hacker Anyway? Chapter 2 - Finding Information on the Net Chapter 3 - Hacking Windows Chapter 4 - Advanced Windows Hacking Chapter 5 - Getting Your Hands Wet: Net Tools I Chapter 6 - Exploring Remote Systems Net Tools II Chapter 7 - A Guide for Web hackers Net Tools III Chapter 8 - Getting Past the Password Chapter 9 - Batch File Programming Chapter 10 - TCP/IP: A Mammoth Description Chapter 11 - Hacking Concepts: A Deeper Approach Chapter 12 - How Does a Virus Work? Part I Chapter 13 - How Does a Virus Work? Part II Chapter 14 - The Perl Manual Chapter 15 - The C Programming Language Chapter 16 - Nasty Scripts and hostile Applets Appendix A: Some More Net Tools Index

What Our Readers Are Saying

Add a comment for a chance to win!
Average customer rating based on 1 comment:

shrikant, October 16, 2007 (view all comments by shrikant)
Excellent book,full of knowledge........a must read to every software professional
Was this comment helpful? | Yes | No
(1 of 2 readers found this comment helpful)

Product Details

ISBN:
9781931841726
Author:
Fadia, Ankit
Publisher:
Course Technology PTR
Location:
S.l.
Subject:
Networking - General
Subject:
Computer security
Subject:
Internet - Security
Subject:
Security
Subject:
Computer hackers
Subject:
Security - General
Subject:
Programming - General
Copyright:
Series:
Miscellaneous
Series Volume:
TR-02-1
Publication Date:
February 2002
Binding:
Paperback
Grade Level:
Professional and scholarly
Language:
English
Illustrations:
Yes
Pages:
864
Dimensions:
9.16x7.36x1.78 in. 3.23 lbs.

Related Subjects

Computers and Internet » Internet » Hackers
Computers and Internet » Networking » Computer Security

The Unofficial Guide to Ethical Hacking (Miscellaneous)
0 stars - 0 reviews
$ In Stock
Product details 864 pages Premier Press - English 9781931841726 Reviews:
"Synopsis" by , The 17-year-old creator of the popular "Hacking Truths" Web site explores all aspects of of computer security in an easy-to-understand, newbie-friendly manner.
"Synopsis" by , The Unofficial Guide to Ethical Hacking is much more than a guide to hacking. For anyone interested in finding out how your fail-safe system was cracked and how you can better protect yourself, this book is a must-read. It contains helpful resources that you can reference to better protect your system from becoming the victim of attacks. It also includes discussion on the nature of file encryption, firewalls, and viruses and shows how users can make their systems more secure.
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.