Sök
Logga in
  • Hem

  • Kategorier

  • Ljudböcker

  • E-böcker

  • Magasin

  • För barn

  • Topplistor

  • Hjälp

  • Ladda ner appen

  • Lös in kampanjkod

  • Lös in presentkort

  • Prova gratis nu
  • Logga in
  • Språk

    🇸🇪 Sverige

    • SE
    • EN

    🇧🇪 Belgique

    • FR
    • EN

    🇩🇰 Danmark

    • DK
    • EN

    🇩🇪 Deutschland

    • DE
    • EN

    🇪🇸 España

    • ES
    • EN

    🇫🇷 France

    • FR
    • EN

    🇳🇱 Nederland

    • NL
    • EN

    🇳🇴 Norge

    • NO
    • EN

    🇦🇹 Österreich

    • AT
    • EN

    🇨🇭 Schweiz

    • DE
    • EN

    🇫🇮 Suomi

    • FI
    • EN
  1. Böcker
  2. Fakta
  3. Data och IT

Läs och lyssna gratis i 42 dagar!

Avsluta när du vill

Prova gratis nu
3.0(1)

Hacking : Guide to Computer Hacking and Penetration Testing

If you are attracted to Hacking world, this book must be your first step. This book teaches you how to think like hackers and protect your computer system from malware, viruses, etc. It will give you insight on various techniques and tools used by hackers for hacking. The book demonstrates how easy it is to penetrate other system and breach cyber security. At the same time, you will also learn how to fight these viruses with minimum damage to the system. Irrespective of your background, you will easily understand all technical jargons of hacking covered in the book.

It also covers the testing methods used by ethical hackers to expose the security loopholes in the system. Once familiar with the basic concept of hacking in this book, even dummies can hack a system. Not only beginners but peers will also like to try hands-on exercise given in the book.

Practical Hacking Guide. Covers the following

Table Of Content

Chapter 1: Introduction

What is hacking?

Common hacking terminologies

What is Cybercrime?

What is ethical hacking?

Chapter 2: Potential Security Threats

What is a threat?

What are Physical Threats?

What are Non-physical Threats?

Chapter 3: Hacking Tools & Skills

What is a programming language?

What languages should I learn?

What are hacking tools?

Commonly Used Hacking Tools

Chapter 4: Social Engineering

What is social engineering?

Common Social Engineering Techniques

Social Engineering Counter Measures

Chapter 5: Cryptography

What is cryptography?

What is cryptanalysis?

What is cryptology?

Encryption Algorithms

Hacking Activity: Hack Now!

Chapter 6: Cracking Password

What is password cracking?

What is password strength?

Password cracking techniques

Password Cracking Tools

Password Cracking Counter Measures

Chapter 7: Trojans, Viruses and Worms

What is a Trojan?

What is a worm?

What is a virus?

Trojans, viruses and worms counter measures

Chapter 8: Network Sniffers

What is IP and MAC Addresses

What is network sniffing?

Passive and Active Sniffing

What is ARP Poisoning?

What is a MAC Flooding?

Sniffing the network using Wireshark

Chapter 9: Hack Wireless Networks

What is a wireless network?

How to access a wireless network?

Wireless Network Authentication

How to Crack Wireless Networks

Cracking Wireless network WEP/WPA keys

Chapter 10: DoS(Denial of Service) Attacks

What is DoS Attack?

Type of DoS Attacks

How DoS attacks work

DoS attack tools

Chapter 11: Hack a Web Server

Web server vulnerabilities

Types of Web Servers

Types of Attacks against Web Servers

Web server attack tools

Chapter 12: Hack a Website

What is a web application? What are Web Threats?

How to protect your Website against hacks ?

Hacking Activity: Hack a Website !

Chapter 13: SQL Injection

What is a SQL Injection?

How SQL Injection Works

Other SQL Injection attack types

Automation Tools for SQL Injection


Författare:

  • Alex Nordeen

Format:

  • E-bok

Längd:

  • 73 sidor

Språk:

Engelska

Kategorier:

  • Fakta
  • Data och IT

Mer av Alex Nordeen

Hoppa över listan
  1. Learn DBMS in 24 Hours

    Alex Nordeen

    book
  2. Learn C Programming in 24 Hours

    Alex Nordeen

    book
  3. Learn JavaScript in 24 Hours

    Alex Nordeen

    book
  4. Linux: Learn in 24 Hours

    Alex Nordeen

    book
  5. C# for Beginners: Learn in 24 Hours

    Alex Nordeen

    book
  6. Learn SQLite in 24 Hours

    Alex Nordeen

    book
  7. Learn Software Testing in 24 Hours

    Alex Nordeen

    book
  8. Learn JSP in 24 Hours

    Alex Nordeen

    book
  9. C++ Learn in 24 Hours

    Alex Nordeen

    book
  10. Learn Design and Analysis of Algorithms in 24 Hours

    Alex Nordeen

    book
  11. Learn Operating System in 24 Hours

    Alex Nordeen

    book

Andra har också läst

Hoppa över listan
  1. Penetration Testing with Raspberry Pi.

    Michael McPhee, Jason Beltrame

    book
  2. Conquer the Web : The Ultimate Cybersecurity Guide

    Nick Wilding, Tim Mitchell, Maureen Kendal, Nick Ioannou

    book
  3. Arduino Projects with Tinkercad | Part 2

    M.Eng. Johannes Wild

    book
  4. Raspberry Pi Computer Architecture Essentials

    Andrew K. Dennis

    book
  5. How To Learn Microsoft SQL Server Quickly!

    Andrei Besedin

    book
  6. Computer Networking

    William Smith

    book
  7. Hair Porosity

    Vivian Brooks

    book
  8. Laser Surface Treatments for Tribological Applications

    book
  9. Electroencephalography

    Fouad Sabry

    book
  10. Healing Sleep

    Vivian Brooks

    book
  11. Cybersecurity Guidebook

    William Smith

    book
  12. Build Supercomputers with Raspberry Pi 3

    Carlos R. Morrison

    book

Hjälp och kontakt


Om oss

  • Vår historia
  • Karriär
  • Press
  • Tillgänglighet
  • Samarbeta med oss
  • För investerare
  • Instagram
  • Facebook

Utforska

  • Kategorier
  • Ljudböcker
  • E-böcker
  • Magasin
  • För barn
  • Topplistor

Populära kategorier

  • Deckare
  • Biografier och reportage
  • Romaner
  • Feelgood och romance
  • Personlig utveckling
  • Barnböcker
  • Sanna berättelser
  • Sömn och avslappning

Nextory

Copyright © 2025 Nextory AB

Integritetspolicy · Användarvillkor ·
Utmärkt4.3 av 5