
The Unofficial Guide to Ethical Hacking
Ankit Fadia - Collection Course Technology
Résumé
Learn how to use good hacking to prevent your system from becoming the victim of attacks! "The Unofficial Guide to Ethical Hacking, Second Edition" defines the difference between hackers - those who crack a computer system for the sheer challenge of doing so - and crackers - an elusive class of computer criminals who break into systems, release viruses, and deface Web sites. Ethical hackers often help out system administrators by notifying them of loopholes in their systems before crackers can get to them and cause damage.
More than just a guide to hacking, this book explores all aspects of computer security in a hands-on and easy-to-comprehend manner - a must-read for any computer user who wants to learn how a system is cracked and how you can better protect yourself. With helpful resources and clear, step-by-step instructions on various hacking techniques, this book features the most up-to-date and comprehensive information and methods, covering file encryption, firewalls, and viruses, as well as new topics such as instant messenger hacking, intellectual property thefts, identity attacks, and much more.
L'auteur - Ankit Fadia
Ankit Fadia, 19 years old, is an independent computer security based out of the Silicon Valley in California, USA. He has authored several internationally best-selling books on numerous topics related to Computer Security that have been widely appreciated by both professionals and industry leaders the world over. Fadia is also a widely recognized computer security guru and Cyber terrorism expert. Widely traveled, Fadia provides customized cyber security training and consulting solutions to clients all across North America, Asia, Australia, and the Middle East. For his outstanding contributions in the field of computer security globally, Fadia has been honored with numerous awards namely: IT Leader Award 2005, Person of The Year 2002, Limca Book of Records, Gold Medal, Hall of Fame Award, Outstanding Young Achiever's Award, Silicon India Person of the Week, Embassy State Award, Best Speaker Award (4 occasions) and many more. Widely celebrated in international media publications, Fadia is also regularly invited by BBC Radio World News, London, UK to share the latest updates on virus outbreaks, loopholes and cyber crime trends. Fadia also handles the Asia operations of a classified intelligence agency that he works for. In November 2001, Fadia was consulted by a classified intelligence agency for breaking an encrypted message sent by one of Osama Bin Laden's men. Since then Fadia has been involved in numerous classified projects pertaining to International Security and Computer Networks. Recently Fadia started his own computer security consulting and Mobile Phone Solutions Company based out of Kuala Lumpur, Malaysia with operations all across the Asia Pacific region.
Sommaire
- Introduction
- Hackers versus Crackers
- Hacking Windows
- Network Hacking
- Email Hacking
- Instant Messenger Hacking
- Web Hacking
- Input Validation Attacks
- Buffer Overflows
- Intellectual Property Theft
- Social Engineering Attacks
- Password Cracking Attacks
- TCP/IP: A Mammoth Description
- Identity Attacks
- Denial of Services (DOS) Attacks
- Cryptography, Firewalls, and Error Messages
- Batch File Programming
- Viruses Torn Apart
- How Does a Virus Work?
- The Perl Manual
- Exploits, Scripts, and Vulnerabilities
- Appendix
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Thomson |
Auteur(s) | Ankit Fadia |
Collection | Course Technology |
Parution | 15/09/2005 |
Édition | 2eme édition |
Nb. de pages | 840 |
Format | 18,5 x 23 |
Couverture | Broché |
Poids | 1640g |
Intérieur | Noir et Blanc |
EAN13 | 9781598630626 |
ISBN13 | 978-1-59863-062-6 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet