According to Einstein, There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your:

According to Einstein, “There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY”. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your mistakes”.


This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being hacked. Please keep in mind that you can’t prevent fully but can minimize the chances of being a victim.


It will also discuss about the most used hacking methodologies, what leakage in system let it gets performed and how can you prevent yourself from it. Play safe, Stay safe!


I'm sure this book is going to help you in your day to day cyber life. Please do read, and leave a lovely comment.


=========================


Contents Overview:


Introduction


Classification of Hackers


Why do they hack?


Phases of Hacking


Methods of Hacking and Preventive Actions


Digital Foot-printing


Social Engineering


Password Cracking


Passive Attacks


Keyloggers


Denial of Service (Dos Attack)


SQL Injection


XSS (Cross site Scripting)


Cross Site Request Forgery, CSRF


Spoofing


Stenography


Man In The Middle, MITM


Malwares


Bonus: Google Hacking Tools that assist Hackers


Prevention from Hackers


Laws and Liabilities in India


Case Study


Aadhaar data breach – January


Facebook data breach – March


Facebook data breach – Sep


Yahoo! Data breaches – August


LinkedIn breach – May

1130008360
According to Einstein, There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your:

According to Einstein, “There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY”. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your mistakes”.


This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being hacked. Please keep in mind that you can’t prevent fully but can minimize the chances of being a victim.


It will also discuss about the most used hacking methodologies, what leakage in system let it gets performed and how can you prevent yourself from it. Play safe, Stay safe!


I'm sure this book is going to help you in your day to day cyber life. Please do read, and leave a lovely comment.


=========================


Contents Overview:


Introduction


Classification of Hackers


Why do they hack?


Phases of Hacking


Methods of Hacking and Preventive Actions


Digital Foot-printing


Social Engineering


Password Cracking


Passive Attacks


Keyloggers


Denial of Service (Dos Attack)


SQL Injection


XSS (Cross site Scripting)


Cross Site Request Forgery, CSRF


Spoofing


Stenography


Man In The Middle, MITM


Malwares


Bonus: Google Hacking Tools that assist Hackers


Prevention from Hackers


Laws and Liabilities in India


Case Study


Aadhaar data breach – January


Facebook data breach – March


Facebook data breach – Sep


Yahoo! Data breaches – August


LinkedIn breach – May

1.99 In Stock
According to Einstein, There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that

According to Einstein, There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your:

by Kamal Nayan
According to Einstein, There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that

According to Einstein, There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your:

by Kamal Nayan

eBook

$1.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

According to Einstein, “There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY”. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your mistakes”.


This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being hacked. Please keep in mind that you can’t prevent fully but can minimize the chances of being a victim.


It will also discuss about the most used hacking methodologies, what leakage in system let it gets performed and how can you prevent yourself from it. Play safe, Stay safe!


I'm sure this book is going to help you in your day to day cyber life. Please do read, and leave a lovely comment.


=========================


Contents Overview:


Introduction


Classification of Hackers


Why do they hack?


Phases of Hacking


Methods of Hacking and Preventive Actions


Digital Foot-printing


Social Engineering


Password Cracking


Passive Attacks


Keyloggers


Denial of Service (Dos Attack)


SQL Injection


XSS (Cross site Scripting)


Cross Site Request Forgery, CSRF


Spoofing


Stenography


Man In The Middle, MITM


Malwares


Bonus: Google Hacking Tools that assist Hackers


Prevention from Hackers


Laws and Liabilities in India


Case Study


Aadhaar data breach – January


Facebook data breach – March


Facebook data breach – Sep


Yahoo! Data breaches – August


LinkedIn breach – May


Product Details

BN ID: 2940156200108
Publisher: Kamal Nayan
Publication date: 10/01/2018
Sold by: PUBLISHDRIVE KFT
Format: eBook
Pages: 70
File size: 1 MB
From the B&N Reads Blog

Customer Reviews