did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781931841726

Unofficial Guide to Ethical Hacking

by
  • ISBN13:

    9781931841726

  • ISBN10:

    1931841721

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2002-02-02
  • Publisher: Cengage Learning Ptr
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99

Summary

The Unofficial Guide to Ethical Hacking is much more than a guide to hacking. For anyone interested in finding out how your fail-safe system was cracked and how you can better protect yourself, this book is a must-read. It contains helpful resources that you can reference to better protect your system from becoming the victim of attacks. It also includes discussion on the nature of file encryption, firewalls, and viruses and shows how users can make their systems more secure.

Author Biography

At 16 years old, Ankit Fadia is already an established hacking authority. He is the founder of the popular Web site Hacking Truths, http://hackingtruths.box.sk, and has been featured in numerous media outlets including the New York Times, ZDNet, and Security Focus. Ankit has written many tutorials on hacking and is a regular contributor to the Indian magazine PCQuest and to India's national newspaper the Hindustan Times

Table of Contents

Introduction xxi
So who is a Hacker Anyway?
1(6)
Finding Information on the Net
7(6)
Hacking Windows
13(20)
Advanced Windows Hacking
33(36)
Getting your Hands Wet: Net Tools I
69(24)
Exploring Remote Systems Net Tools II
93(40)
A Guide for Web hackers Net Tools III
133(58)
Getting Past the Password
191(124)
Batch File Programming
315(26)
TCP/IP: A Mammoth Description
341(68)
Hacking Concepts: A Deeper Approach
409(22)
How Does a Virus Work? Part I
431(54)
How Does a Virus Work? Part II
485(38)
The Perl Manual
523(32)
The C Programming Language
555(16)
Nasty Scripts and Hostile Applets
571(126)
A Some More Net Tools 697(8)
Index 705

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program