1,49 €
1,49 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
1,49 €
1,49 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
Als Download kaufen
1,49 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
Jetzt verschenken
1,49 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
  • Format: ePub

According to Einstein, "There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY". So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your mistakes".
This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being…mehr

  • Geräte: eReader
  • ohne Kopierschutz
  • eBook Hilfe
  • FamilySharing(5)
Produktbeschreibung
According to Einstein, "There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY". So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your mistakes".

This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being hacked. Please keep in mind that you can't prevent fully but can minimize the chances of being a victim.

It will also discuss about the most used hacking methodologies, what leakage in system let it gets performed and how can you prevent yourself from it. Play safe, Stay safe!

I'm sure this book is going to help you in your day to day cyber life. Please do read, and leave a lovely comment.

=========================

Contents Overview:

Introduction

Classification of Hackers

Why do they hack?

Phases of Hacking

Methods of Hacking and Preventive Actions

Digital Foot-printing

Social Engineering

Password Cracking

Passive Attacks

Keyloggers

Denial of Service (Dos Attack)

SQL Injection

XSS (Cross site Scripting)

Cross Site Request Forgery, CSRF

Spoofing

Stenography

Man In The Middle, MITM

Malwares

Bonus: Google Hacking Tools that assist Hackers

Prevention from Hackers

Laws and Liabilities in India

Case Study

Aadhaar data breach - January

Facebook data breach - March

Facebook data breach - Sep

Yahoo! Data breaches - August

LinkedIn breach - May


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.