According to Einstein, "There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY". So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your mistakes".
This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being hacked. Please keep in mind that you can't prevent fully but can minimize the chances of being a victim.
It will also discuss about the most used hacking methodologies, what leakage in system let it gets performed and how can you prevent yourself from it. Play safe, Stay safe!
I'm sure this book is going to help you in your day to day cyber life. Please do read, and leave a lovely comment.
=========================
Contents Overview:
Introduction
Classification of Hackers
Why do they hack?
Phases of Hacking
Methods of Hacking and Preventive Actions
Digital Foot-printing
Social Engineering
Password Cracking
Passive Attacks
Keyloggers
Denial of Service (Dos Attack)
SQL Injection
XSS (Cross site Scripting)
Cross Site Request Forgery, CSRF
Spoofing
Stenography
Man In The Middle, MITM
Malwares
Bonus: Google Hacking Tools that assist Hackers
Prevention from Hackers
Laws and Liabilities in India
Case Study
Aadhaar data breach - January
Facebook data breach - March
Facebook data breach - Sep
Yahoo! Data breaches - August
LinkedIn breach - May
This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being hacked. Please keep in mind that you can't prevent fully but can minimize the chances of being a victim.
It will also discuss about the most used hacking methodologies, what leakage in system let it gets performed and how can you prevent yourself from it. Play safe, Stay safe!
I'm sure this book is going to help you in your day to day cyber life. Please do read, and leave a lovely comment.
=========================
Contents Overview:
Introduction
Classification of Hackers
Why do they hack?
Phases of Hacking
Methods of Hacking and Preventive Actions
Digital Foot-printing
Social Engineering
Password Cracking
Passive Attacks
Keyloggers
Denial of Service (Dos Attack)
SQL Injection
XSS (Cross site Scripting)
Cross Site Request Forgery, CSRF
Spoofing
Stenography
Man In The Middle, MITM
Malwares
Bonus: Google Hacking Tools that assist Hackers
Prevention from Hackers
Laws and Liabilities in India
Case Study
Aadhaar data breach - January
Facebook data breach - March
Facebook data breach - Sep
Yahoo! Data breaches - August
LinkedIn breach - May
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.