The Unofficial Guide to Ethical Hacking / Edition 2

The Unofficial Guide to Ethical Hacking / Edition 2

by Ankit Fadia
Pub. Date:
Cengage Learning
Select a Purchase Option (REV)
  • purchase options
    $22.22 $49.99 Save 56% Current price is $22.22, Original price is $49.99. You Save 56%.
    Note: Access code and/or supplemental material are not guaranteed to be included with textbook rental or used textbook.
  • purchase options


The Unofficial Guide to Ethical Hacking / Edition 2

Learn how to use good hacking to prevent your system from becoming the victim of attacks! "The Unofficial Guide to Ethical Hacking, Second Edition" defines the difference between hackers - those who crack a computer system for the sheer challenge of doing so - and crackers - an elusive class of computer criminals who break into systems, release viruses, and deface Web sites. Ethical hackers often help out system administrators by notifying them of loopholes in their systems before crackers can get to them and cause damage. More than just a guide to hacking, this book explores all aspects of computer security in a hands-on and easy-to-comprehend manner - a must-read for any computer user who wants to learn how a system is cracked and how you can better protect yourself. With helpful resources and clear, step-by-step instructions on various hacking techniques, this book features the most up-to-date and comprehensive information and methods, covering file encryption, firewalls, and viruses, as well as new topics such as instant messenger hacking, intellectual property thefts, identity attacks, and much more.

Product Details

ISBN-13: 9781598630626
Publisher: Cengage Learning
Publication date: 09/13/2005
Edition description: REV
Pages: 841
Product dimensions: 7.50(w) x 9.10(h) x 2.13(d)

Table of Contents

Introduction Chapter 1 - So Who is a Hacker Anyway? Chapter 2 - Finding Information on the Net Chapter 3 - Hacking Windows Chapter 4 - Advanced Windows Hacking Chapter 5 - Getting Your Hands Wet: Net Tools I Chapter 6 - Exploring Remote Systems Net Tools II Chapter 7 - A Guide for Web hackers Net Tools III Chapter 8 - Getting Past the Password Chapter 9 - Batch File Programming Chapter 10 - TCP/IP: A Mammoth Description Chapter 11 - Hacking Concepts: A Deeper Approach Chapter 12 - How Does a Virus Work? Part I Chapter 13 - How Does a Virus Work? Part II Chapter 14 - The Perl Manual Chapter 15 - The C Programming Language Chapter 16 - Nasty Scripts and hostile Applets Appendix A: Some More Net Tools Index

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews