Description
Product ID: | 9781439821190 |
Product Form: | Paperback / softback |
Country of Manufacture: | US |
Title: | Defense against the Black Arts |
Subtitle: | How Hackers Do What They Do and How to Protect against It |
Authors: | Author: Jesse Varsalone |
Page Count: | 412 |
Subjects: | Digital and information technologies: Legal aspects, Legal aspects of IT, Computer security, Network management, Computer architecture and logic design, Computer security, Network management, Computer architecture & logic design |
Description: | Select Guide Rating Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hackers can use to exploit physical access, network access, and wireless vectors. The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you’ll learn:
The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate understanding, giving you an insider’s view of the secrets of hackers. |
Imprint Name: | CRC Press Inc |
Publisher Name: | Taylor & Francis Inc |
Country of Publication: | GB |
Publishing Date: | 2011-09-07 |