Hacker Attack / by Richard Mansfield

By: Mansfield, RichardMaterial type: TextTextPublication details: New Delhi : BPB Publications , 2000cDescription: xxvi, 293 p. : ill. ; 23 cm. + 1 Compact Disc (4 3/4 in.)ISBN: 8176563293 (pbk)Subject(s): Computer crimesDDC classification: 005.8
Contents:
Pt. 1. Hackers, Crackers, and Whackers. Ch. 1. Danger on the Internet. Ch. 2. Phone Phreaks. Ch. 3. Hackers, Crackers, and Whackers. Ch. 4. Bypassing Passwords and Doing the Rat Dance. Ch. 5. The Venus Flytrap and Other Anti-Hacks. Ch. 6. Between a Rock and a Hard Place. Ch. 7. The Dangers of High-Speed Connections. Ch. 8. How to Protect Your Exposed Broadband -- Pt. 2. Personal Privacy. Ch. 9. Internet Privacy. Ch. 10. The Elements of Cryptography. Ch. 11. The Great Leap Forward. Ch. 12. The Computer Steps In. Ch. 13. Infinite Monkeys: Brute Force Attacks and Other Curiosities. Ch. 14. DES: A Public Scheme. Ch. 15. Making Keys Public. Ch. 16. Electric Signatures. Ch. 17. Encryption Implementations in Windows 2000. Ch. 18. Hiding Data in Photon Streams. Ch. 19. The Perfect, Unbreakable Encryption System -- Pt. 3. Viruses. Ch. 20. The Great Worm Escapes. Ch. 21. Logic Bombs, Worms, and Trojan Horses -- The Varieties of Viruses. Ch. 22. How Melissa Changed the Rules. Ch. 23. Documents that Attack (and What You Can Do to Protect Yourself). Ch. 24. Prevention, Detection, and Elimination.
Summary: Providing information on how to identify, avoid and eradicate computer viruses, this text goes on to explain how to protect data with professional encryption techniques. The CD contains a demo of BlackICE Defender to protect the reader's computer agains hackers.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
CD/DVD CD/DVD Namal Library
CD/DVD Rack
005.8 MAN-H 2000 829 (Browse shelf (Opens below)) Available CD00829
Books Books Namal Library
Computer Science
005.8 MAN-H 2000 829 (Browse shelf (Opens below)) Available 829
Total holds: 0

Index included

Pt. 1. Hackers, Crackers, and Whackers. Ch. 1. Danger on the Internet. Ch. 2. Phone Phreaks. Ch. 3. Hackers, Crackers, and Whackers. Ch. 4. Bypassing Passwords and Doing the Rat Dance. Ch. 5. The Venus Flytrap and Other Anti-Hacks. Ch. 6. Between a Rock and a Hard Place. Ch. 7. The Dangers of High-Speed Connections. Ch. 8. How to Protect Your Exposed Broadband -- Pt. 2. Personal Privacy. Ch. 9. Internet Privacy. Ch. 10. The Elements of Cryptography. Ch. 11. The Great Leap Forward. Ch. 12. The Computer Steps In. Ch. 13. Infinite Monkeys: Brute Force Attacks and Other Curiosities. Ch. 14. DES: A Public Scheme. Ch. 15. Making Keys Public. Ch. 16. Electric Signatures. Ch. 17. Encryption Implementations in Windows 2000. Ch. 18. Hiding Data in Photon Streams. Ch. 19. The Perfect, Unbreakable Encryption System -- Pt. 3. Viruses. Ch. 20. The Great Worm Escapes. Ch. 21. Logic Bombs, Worms, and Trojan Horses -- The Varieties of Viruses. Ch. 22. How Melissa Changed the Rules. Ch. 23. Documents that Attack (and What You Can Do to Protect Yourself). Ch. 24. Prevention, Detection, and Elimination.

Providing information on how to identify, avoid and eradicate computer viruses, this text goes on to explain how to protect data with professional encryption techniques. The CD contains a demo of BlackICE Defender to protect the reader's computer agains hackers.

There are no comments on this title.

to post a comment.