Search
Log in
  • Home

  • Categories

  • Audiobooks

  • E-books

  • For kids

  • Top lists

  • Help

  • Download app

  • Use campaign code

  • Redeem gift card

  • Try free now
  • Log in
  • Language

    🇫🇮 Suomi

    • FI
    • EN

    🇧🇪 Belgique

    • FR
    • EN

    🇩🇰 Danmark

    • DK
    • EN

    🇩🇪 Deutschland

    • DE
    • EN

    🇪🇸 España

    • ES
    • EN

    🇫🇷 France

    • FR
    • EN

    🇳🇱 Nederland

    • NL
    • EN

    🇳🇴 Norge

    • NO
    • EN

    🇦🇹 Österreich

    • AT
    • EN

    🇨🇭 Schweiz

    • DE
    • EN

    🇸🇪 Sverige

    • SE
    • EN
  1. Books
  2. Nonfiction
  3. Computer sciences

Read and listen for free for 42 days!

Cancel anytime

Try free now
3.0(1)

Hacking : Guide to Computer Hacking and Penetration Testing

If you are attracted to Hacking world, this book must be your first step. This book teaches you how to think like hackers and protect your computer system from malware, viruses, etc. It will give you insight on various techniques and tools used by hackers for hacking. The book demonstrates how easy it is to penetrate other system and breach cyber security. At the same time, you will also learn how to fight these viruses with minimum damage to the system. Irrespective of your background, you will easily understand all technical jargons of hacking covered in the book.

It also covers the testing methods used by ethical hackers to expose the security loopholes in the system. Once familiar with the basic concept of hacking in this book, even dummies can hack a system. Not only beginners but peers will also like to try hands-on exercise given in the book.

Practical Hacking Guide. Covers the following

Table Of Content

Chapter 1: Introduction

What is hacking?

Common hacking terminologies

What is Cybercrime?

What is ethical hacking?

Chapter 2: Potential Security Threats

What is a threat?

What are Physical Threats?

What are Non-physical Threats?

Chapter 3: Hacking Tools & Skills

What is a programming language?

What languages should I learn?

What are hacking tools?

Commonly Used Hacking Tools

Chapter 4: Social Engineering

What is social engineering?

Common Social Engineering Techniques

Social Engineering Counter Measures

Chapter 5: Cryptography

What is cryptography?

What is cryptanalysis?

What is cryptology?

Encryption Algorithms

Hacking Activity: Hack Now!

Chapter 6: Cracking Password

What is password cracking?

What is password strength?

Password cracking techniques

Password Cracking Tools

Password Cracking Counter Measures

Chapter 7: Trojans, Viruses and Worms

What is a Trojan?

What is a worm?

What is a virus?

Trojans, viruses and worms counter measures

Chapter 8: Network Sniffers

What is IP and MAC Addresses

What is network sniffing?

Passive and Active Sniffing

What is ARP Poisoning?

What is a MAC Flooding?

Sniffing the network using Wireshark

Chapter 9: Hack Wireless Networks

What is a wireless network?

How to access a wireless network?

Wireless Network Authentication

How to Crack Wireless Networks

Cracking Wireless network WEP/WPA keys

Chapter 10: DoS(Denial of Service) Attacks

What is DoS Attack?

Type of DoS Attacks

How DoS attacks work

DoS attack tools

Chapter 11: Hack a Web Server

Web server vulnerabilities

Types of Web Servers

Types of Attacks against Web Servers

Web server attack tools

Chapter 12: Hack a Website

What is a web application? What are Web Threats?

How to protect your Website against hacks ?

Hacking Activity: Hack a Website !

Chapter 13: SQL Injection

What is a SQL Injection?

How SQL Injection Works

Other SQL Injection attack types

Automation Tools for SQL Injection


Author:

  • Alex Nordeen

Format:

  • E-book

Duration:

  • 73 pages

Language:

English

Categories:

  • Nonfiction
  • Computer sciences

More by Alex Nordeen

Skip the list
  1. Learn Design and Analysis of Algorithms in 24 Hours

    Alex Nordeen

    book
  2. Learn VBScript in 24 Hours

    Alex Nordeen

    book
  3. Linux: Learn in 24 Hours

    Alex Nordeen

    book
  4. Python: Learn Python in 24 Hours

    Alex Nordeen

    book
  5. C++ Learn in 24 Hours

    Alex Nordeen

    book
  6. Learn DBMS in 24 Hours

    Alex Nordeen

    book
  7. Learn Operating System in 24 Hours

    Alex Nordeen

    book
  8. Learn C Programming in 24 Hours

    Alex Nordeen

    book
  9. Learn SQL in 24 Hours

    Alex Nordeen

    book
  10. Learn Hbase in 24 Hours

    Alex Nordeen

    book
  11. Learn Selenium in 24 Hours

    Alex Nordeen

    book
  12. Learn SQLite in 24 Hours

    Alex Nordeen

    book

Others have also read

Skip the list
  1. Opi Latviaa - Nopea / Helppo / Tehokas

    book
  2. Homo Mysterious

    David P. Barash

    audiobook
  3. The Blog of War : Front-Line Dispatches from Soldiers in Iraq and Afghanistan

    Matthew Currier Burden

    book
  4. How to Make Money Online

    Scott Kennedy

    book
  5. Reader, Come Home : The Reading Brain in a Digital World

    Maryanne Wolf

    audiobook
  6. Too Big to Ignore : The Business Case for Big Data

    Phil Simon

    audiobook
  7. High Conflict: Why We Get Trapped and How We Get Out

    Amanda Ripley

    book
  8. How to Hack Like a GOD

    Sparc FLOW

    book
  9. The Only Wiccan Spell Book You'll Ever Need: For Love, Happiness, and Prosperity

    Marian Singer, Trish MacGregor

    book
  10. Forallx - An Introduction to Formal Logic

    P.D. Magnus

    book
  11. When the Earth Had Two Moons : Cannibal Planets, Icy Giants, Dirty Comets, Dreadful Orbits, and the Origins of the Night Sky

    Erik Asphaug

    audiobook
  12. The End of Iraq

    Peter W. Galbraith

    audiobookbook

Help and contact


About us

  • Our story
  • Career
  • Press
  • Accessibility
  • Partner with us
  • Investor relations
  • Instagram
  • Facebook

Explore

  • Categories
  • Audiobooks
  • E-books
  • Magazines
  • For kids
  • Top lists

Popular categories

  • Crime
  • Biographies and reportage
  • Fiction
  • Feel-good and romance
  • Personal development
  • Children's books
  • True stories
  • Sleep and relaxation

Nextory

Copyright © 2025 Nextory AB

Privacy Policy · Terms ·
Excellent4.3 out of 5