×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Unofficial Guide to Ethical Hacking / Edition 2
     

Unofficial Guide to Ethical Hacking / Edition 2

by Ankit Fadia
 

See All Formats & Editions

ISBN-10: 1598630628

ISBN-13: 2901598630625

Pub. Date: 09/13/2005

Publisher: Cengage Learning

Hackers. That elusive class of computer criminals who break into systems, release viruses, and deface Web sites, right? Wrong! While such computer criminals have helped shape the typical definition of a hacker, not all hackers are out to wreak havoc. There are ethical hackers who crack a system for the sheer challenge of doing so-not to cause damage or destruction. In

Overview

Hackers. That elusive class of computer criminals who break into systems, release viruses, and deface Web sites, right? Wrong! While such computer criminals have helped shape the typical definition of a hacker, not all hackers are out to wreak havoc. There are ethical hackers who crack a system for the sheer challenge of doing so-not to cause damage or destruction. In fact, they often lend a hand to system administrators by notifying them of the loopholes in their systems. This book is much more than a guide to hacking. For anyone interested in finding out how your fail-safe system was cracked and how you can better protect yourself, this book is a must-read. It contains helpful resources that you can reference to better protect your system from becoming the victim of attacks. It also includes discussions on the nature of file encryption, firewalls, and viruses and shows how users can make their systems more secure.

Product Details

ISBN-13:
2901598630625
Publisher:
Cengage Learning
Publication date:
09/13/2005
Edition description:
REV
Pages:
841

Table of Contents

Introduction Chapter 1 - So Who is a Hacker Anyway? Chapter 2 - Finding Information on the Net Chapter 3 - Hacking Windows Chapter 4 - Advanced Windows Hacking Chapter 5 - Getting Your Hands Wet: Net Tools I Chapter 6 - Exploring Remote Systems Net Tools II Chapter 7 - A Guide for Web hackers Net Tools III Chapter 8 - Getting Past the Password Chapter 9 - Batch File Programming Chapter 10 - TCP/IP: A Mammoth Description Chapter 11 - Hacking Concepts: A Deeper Approach Chapter 12 - How Does a Virus Work? Part I Chapter 13 - How Does a Virus Work? Part II Chapter 14 - The Perl Manual Chapter 15 - The C Programming Language Chapter 16 - Nasty Scripts and hostile Applets Appendix A: Some More Net Tools Index

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews