Use coupon code “SUMMER20” for a 20% discount on all items! Valid until 2024-08-31

Site Logo
Search Suggestions

      Royal Mail  express delivery to UK destinations

      Regular sales and promotions

      Stock updates every 20 minutes!

      Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

      1 in stock

      Firm sale: non returnable item
      SKU 9781439821190 Categories ,
      Select Guide Rating

      Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP...

      £54.99

      Buy new:

      Delivery: UK delivery Only. Usually dispatched in 1-2 working days.

      Shipping costs: All shipping costs calculated in the cart or during the checkout process.

      Standard service (normally 2-3 working days): 48hr Tracked service.

      Premium service (next working day): 24hr Tracked service – signature service included.

      Royal mail: 24 & 48hr Tracked: Trackable items weighing up to 20kg are tracked to door and are inclusive of text and email with ‘Leave in Safe Place’ options, but are non-signature services. Examples of service expected: Standard 48hr service – if ordered before 3pm on Thursday then expected delivery would be on Saturday. If Premium 24hr service used, then expected delivery would be Friday.

      Signature Service: This service is only available for tracked items.

      Leave in Safe Place: This option is available at no additional charge for tracked services.

      Description

      Product ID:9781439821190
      Product Form:Paperback / softback
      Country of Manufacture:US
      Title:Defense against the Black Arts
      Subtitle:How Hackers Do What They Do and How to Protect against It
      Authors:Author: Jesse Varsalone
      Page Count:412
      Subjects:Digital and information technologies: Legal aspects, Legal aspects of IT, Computer security, Network management, Computer architecture and logic design, Computer security, Network management, Computer architecture & logic design
      Description:Select Guide Rating

      Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hackers can use to exploit physical access, network access, and wireless vectors. The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks.


      As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems.

      Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you’ll learn:

      • How to get into a Windows operating system without having the username or password
      • Vulnerabilities associated with passwords and how to keep them out of the hands of hackers
      • How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies
      • Hiding one’s IP address to avoid detection
      • Manipulating data to and from a web page or application for nefarious reasons
      • How to find virtually anything on the internet
      • How hackers research the targets they plan to attack
      • How network defenders collect traffic across the wire to indentify intrusions
      • Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures

      The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate understanding, giving you an insider’s view of the secrets of hackers.


      Imprint Name:CRC Press Inc
      Publisher Name:Taylor & Francis Inc
      Country of Publication:GB
      Publishing Date:2011-09-07

      Additional information

      Weight732 g
      Dimensions252 × 178 × 21 mm