Hacker Attack / by Richard Mansfield
Material type: TextPublication details: New Delhi : BPB Publications , 2000cDescription: xxvi, 293 p. : ill. ; 23 cm. + 1 Compact Disc (4 3/4 in.)ISBN: 8176563293 (pbk)Subject(s): Computer crimesDDC classification: 005.8Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
CD/DVD | Namal Library CD/DVD Rack | 005.8 MAN-H 2000 829 (Browse shelf (Opens below)) | Available | CD00829 | ||
Books | Namal Library Computer Science | 005.8 MAN-H 2000 829 (Browse shelf (Opens below)) | Available | 829 |
Browsing Namal Library shelves, Shelving location: CD/DVD Rack Close shelf browser (Hides shelf browser)
005.758 BUY-W 2002 10088 Web database development .NET edition, step by step / | 005.8 CHI-H 2003 1583 Hack attacks testings : | 005.8 GOD-I 2013 3695 Information systems security : | 005.8 MAN-H 2000 829 Hacker Attack / | 005.82 SHY-C 2011 1244 Cryptography and security / | 005 SAV-P 2013 4519 Problem solving with C++ / | 006 BUR-V 2014 9850 Virtual reality technology / |
Index included
Pt. 1. Hackers, Crackers, and Whackers. Ch. 1. Danger on the Internet. Ch. 2. Phone Phreaks. Ch. 3. Hackers, Crackers, and Whackers. Ch. 4. Bypassing Passwords and Doing the Rat Dance. Ch. 5. The Venus Flytrap and Other Anti-Hacks. Ch. 6. Between a Rock and a Hard Place. Ch. 7. The Dangers of High-Speed Connections. Ch. 8. How to Protect Your Exposed Broadband -- Pt. 2. Personal Privacy. Ch. 9. Internet Privacy. Ch. 10. The Elements of Cryptography. Ch. 11. The Great Leap Forward. Ch. 12. The Computer Steps In. Ch. 13. Infinite Monkeys: Brute Force Attacks and Other Curiosities. Ch. 14. DES: A Public Scheme. Ch. 15. Making Keys Public. Ch. 16. Electric Signatures. Ch. 17. Encryption Implementations in Windows 2000. Ch. 18. Hiding Data in Photon Streams. Ch. 19. The Perfect, Unbreakable Encryption System -- Pt. 3. Viruses. Ch. 20. The Great Worm Escapes. Ch. 21. Logic Bombs, Worms, and Trojan Horses -- The Varieties of Viruses. Ch. 22. How Melissa Changed the Rules. Ch. 23. Documents that Attack (and What You Can Do to Protect Yourself). Ch. 24. Prevention, Detection, and Elimination.
Providing information on how to identify, avoid and eradicate computer viruses, this text goes on to explain how to protect data with professional encryption techniques. The CD contains a demo of BlackICE Defender to protect the reader's computer agains hackers.
There are no comments on this title.