Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It


Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hackers can use to exploit physical access, network access, and wireless vectors. The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks.

Product Details

ISBN-13: 9781466509207
Publisher: CRC Press
Publication date: 09/07/2011
Sold by: Barnes & Noble
Format: eBook
Pages: 412
Sales rank: 273,370
File size: 50 MB
Note: This product may take a few minutes to download.

About the Author

Jesse Varsalone has been teaching for 18 years. He taught high school for eight years, five in the Baltimore City Public Schools. After teaching high school, Jesse started teaching computer classes at the Computer Career Institutes at Johns Hopkins University and Stevenson University. He currently teaches online as an adjunct professor at Champlain College in Burlington, Vermont. Jesse holds a number of certifications in the IT field.

Matthew McFadden researches, develops, and instructs network intrusion investigations. Matthew has spent several years in the field of information technology specializing in information assurance and security, network intrusion, malware analysis, and forensics. Matthew has performed research projects, consulted, and presented, and has worked in network administration. He also holds industry IT certifications.

Table of Contents

Hacking Windows OS. Obtaining Windows Passwords. Imaging and Extraction. Bypassing Web Filters. Mucking with the Web. Finding It All on the Netv5. Research Time. Capturing Network Traffic. Research Time: Finding the Vulnerabilities. Metasploit. Other Attack Tools. Social Engineering with Web 2.0. Hack the Macs. Wireless Hacking. Index.
From the B&N Reads Blog

Customer Reviews