Learn Hacking in 24 Hours

· Guru99
4.5
4 шүүмж
Электрон ном
400
Хуудас
Үнэлгээ болон шүүмжийг баталгаажуулаагүй  Нэмэлт мэдээлэл авах

Энэ электрон номын тухай

If you are attracted to Hacking world, this book must be your first step. This book teaches you how to think like hackers and protect your computer system from malware, viruses, etc. It will give you insight on various techniques and tools used by hackers for hacking. The book demonstrates how easy it is to penetrate other system and breach cyber security. At the same time, you will also learn how to fight these viruses with minimum damage to the system. Irrespective of your background, you will easily understand all technical jargons of hacking covered in the book.

It also covers the testing methods used by ethical hackers to expose the security loopholes in the system. Once familiar with the basic concept of hacking in this book, even dummies can hack a system. Not only beginners but peers will also like to try hands-on exercise given in the book.


Table Of Content

Chapter 1: Introduction

1.     What is hacking?

2.     Common hacking terminologies

3.     What is Cybercrime?

4.     What is ethical hacking?

Chapter 2: Potential Security Threats

1.     What is a threat?

2.     What are Physical Threats?

3.     What are Non-physical Threats?

Chapter 3: Hacking Tools & Skills

1.     What is a programming language?

2.     What languages should I learn?

3.     What are hacking tools?

4.     Commonly Used Hacking Tools

Chapter 4: Social Engineering

1.     What is social engineering?

2.     Common Social Engineering Techniques

3.     Social Engineering Counter Measures

Chapter 5: Cryptography

1.     What is cryptography?

2.     What is cryptanalysis?

3.     What is cryptology?

4.     Encryption Algorithms

5.     Hacking Activity: Hack Now!

Chapter 6: Cracking Password

1.     What is password cracking?

2.     What is password strength?

3.     Password cracking techniques

4.     Password Cracking Tools

5.     Password Cracking Counter Measures

Chapter 7: Trojans, Viruses and Worms

1.     What is a Trojan?

2.     What is a worm?

3.     What is a virus?

4.     Trojans, viruses and worms counter measures

Chapter 8: Network Sniffers

1.     What is IP and MAC Addresses

2.     What is network sniffing?

3.     Passive and Active Sniffing

4.     What is ARP Poisoning?

5.     What is a MAC Flooding?

6.     Sniffing the network using Wireshark

Chapter 9: Hack Wireless Networks

1.     What is a wireless network?

2.     How to access a wireless network?

3.     Wireless Network Authentication

4.     How to Crack Wireless Networks

5.     Cracking Wireless network WEP/WPA keys

Chapter 10: DoS(Denial of Service) Attacks

1.     What is DoS Attack?

2.     Type of DoS Attacks

3.     How DoS attacks work

4.     DoS attack tools

Chapter 11: Hack a Web Server

1.     Web server vulnerabilities

2.     Types of Web Servers

3.     Types of Attacks against Web Servers

4.     Web server attack tools

Chapter 12: Hack a Website

1.     What is a web application? What are Web Threats?

2.     How to protect your Website against hacks ?

3.     Hacking Activity: Hack a Website !

Chapter 13: SQL Injection

1.     What is a SQL Injection?

2.     How SQL Injection Works

3.     Other SQL Injection attack types

4.     Automation Tools for SQL Injection


Үнэлгээ, сэтгэгдэл

4.5
4 шүүмж

Энэ электрон номыг үнэлэх

Санал бодлоо хэлнэ үү.

Унших мэдээлэл

Ухаалаг утас болон таблет
Андройд болон iPad/iPhoneGoogle Ном Унших аппыг суулгана уу. Үүнийг таны бүртгэлд автоматаар синк хийх бөгөөд та хүссэн газраасаа онлайн эсвэл офлайнаар унших боломжтой.
Зөөврийн болон ердийн компьютер
Та компьютерийн веб хөтчөөр Google Play-с авсан аудио номыг сонсох боломжтой.
eReaders болон бусад төхөөрөмжүүд
Kobo Цахим ном уншигч гэх мэт e-ink төхөөрөмжүүд дээр уншихын тулд та файлыг татаад төхөөрөмж рүүгээ дамжуулах шаардлагатай болно. Файлуудаа дэмжигддэг Цахим ном уншигч руу шилжүүлэхийн тулд Тусламжийн төвийн дэлгэрэнгүй зааварчилгааг дагана уу.