Cybersecurity (häftad)
Format
Inbunden (Hardback)
Språk
Engelska
Antal sidor
230
Utgivningsdatum
2019-12-22
Förlag
Bravex Publications
Illustrationer
2 Illustrations
Dimensioner
229 x 152 x 14 mm
Vikt
477 g
Antal komponenter
1
Komponenter
414:B&W 6 x 9 in or 229 x 152 mm Case Laminate on White w/Matte Lam
ISBN
9781647481742

Cybersecurity

What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Guide to Ethical Hacking for Beginners

Inbunden,  Engelska, 2019-12-22
408
  • Skickas från oss inom 3-6 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
If you want to avoid getting hacked, having your information spread and discover the world of ethical hacking then keep reading...

Two manuscripts in one book:
  • Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
  • Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks, Including Tips on Social Engineering
Do you create tons of accounts you will never again visit?

Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts?

Does your password contain a sequence of numbers, such as “123456”?

Do you automatically click all links and download all email attachments coming from your friends?

This book will show you just how incredibly lucky you are that nobody's hacked you before.

With this handy little book as your starting point, you can finally go from a starry-eyed internet user to a paranoid cybersecurity geek.

With plenty of examples, this book will show you that the internet is not merely a way to watch cute cat videos; it's a battlefield, a military invention that was accidentally found to be capable of overpowering any threat economically, digitally and politically.

From the crudest forums to the most sophisticated online services, there is a war going on and, whether you want it or not, you're involved by the very fact you're here, so better arm yourself with knowledge.

In part 1 of this book, you will learn about:
  • How the internet is held together with a pinky swear
  • How hackers use raunchy photos to eke out private information
  • Examples of preposterous social engineering attacks
  • Equally preposterous defense from those attacks
  • How people in charge don't even realize what hacking means
  • How there's only one surefire way to protect against hacking
  • Research on past, present, and future hacking methods
  • Difference between good and bad hackers
  • How to lower your exposure to hacking
  • Why companies pester you to attach a phone number to an account
  • Why social media is the most insecure way to spend your afternoon
  • And much, much more
Some of the topics covered in part 2 of this book include:
  • Fighting against companies
  • Ethical Hacking Defined
  • War on the internet
  • Engineer’s mind
  • The Almighty EULA
  • The danger of defaults
  • John Deere
  • Copyright
  • YouTube ContentID
  • Tracking users
  • DRM
  • GEMA, the copyright police
  • Torrents
  • Sports channels
  • Megaupload and Anonymous
  • ...
Visa hela texten

Passar bra ihop

  1. Cybersecurity
  2. +
  3. Enterprise Information Security Risk Assessment: Practical Guide, Techniques and Tools

De som köpt den här boken har ofta också köpt Enterprise Information Security Risk Assessment... av Celestin Ntemngwa (häftad).

Köp båda 2 för 930 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av Lester Evans

  • Ethical Hacking

    Lester Evans

    If you've always wanted to discover the startling world of ethical hacking, then keep reading… Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permissio...

Innehållsförteckning

part 1: cybersecurity

introduction

chapter 1 – basics of cybersecurity

chapter 2 – remote attacker

chapter 3 – social engineering

chapter 4 – origins of hacking

chapter 5 – principles of social engineering

chapter 6 – ethical hacking

chapter 7 – tracking through cookies

chapter 8 – javascript and flash

chapter 9 – browser wars

chapter 10 – state-sponsored malware

chapter 11 – corporate risk assessment

chapter 12 – cryptocurrencies and mesh routing

chapter 13 – card transaction security

chapter 14 – cryptojacking

chapter 15 – the internet of things

chapter 16 – russian bots

chapter 17 – edward snowden

chapter 18 – smartphones

chapter 19 – 2-factor authentication (2fa)

chapter 20 – quantum computing

conclusion

part 2: ethical hacking

introduction

chapter 1 – fighting against companies

chapter 2 – ethical hacking defined

chapter 3 – war on the internet

chapter 4 – engineer’s mind

chapter 5 – the almighty eula

chapter 6 – the danger of defaults

chapter 7 – john deere

chapter 8 – copyright

chapter 9 – youtube contentid

chapter 10 – tracking users

chapter 11 – drm

chapter 12 – gema, the copyright police

chapter 13 – torrents

chapter 13 – sports channels

chapter 14 – megaupload and anonymous

chapter 15 – julian assange

chapter 16 – patents

chapter 17 – penetration testing

chapter 18 – jailbreaking android/iphone

chapter 19 – shut up cortana

chapter 20 – hacking wifi

conclusion

glossary