Hacker Attack / by Richard Mansfield

By: Mansfield, RichardMaterial type: TextTextPublication details: New Delhi : BPB Publications , 2000cDescription: xxvi, 293 p. : ill. ; 23 cm. + 1 Compact Disc (4 3/4 in.)ISBN: 8176563293 (pbk)Subject(s): Computer crimesDDC classification: 005.8
Contents:
Pt. 1. Hackers, Crackers, and Whackers. Ch. 1. Danger on the Internet. Ch. 2. Phone Phreaks. Ch. 3. Hackers, Crackers, and Whackers. Ch. 4. Bypassing Passwords and Doing the Rat Dance. Ch. 5. The Venus Flytrap and Other Anti-Hacks. Ch. 6. Between a Rock and a Hard Place. Ch. 7. The Dangers of High-Speed Connections. Ch. 8. How to Protect Your Exposed Broadband -- Pt. 2. Personal Privacy. Ch. 9. Internet Privacy. Ch. 10. The Elements of Cryptography. Ch. 11. The Great Leap Forward. Ch. 12. The Computer Steps In. Ch. 13. Infinite Monkeys: Brute Force Attacks and Other Curiosities. Ch. 14. DES: A Public Scheme. Ch. 15. Making Keys Public. Ch. 16. Electric Signatures. Ch. 17. Encryption Implementations in Windows 2000. Ch. 18. Hiding Data in Photon Streams. Ch. 19. The Perfect, Unbreakable Encryption System -- Pt. 3. Viruses. Ch. 20. The Great Worm Escapes. Ch. 21. Logic Bombs, Worms, and Trojan Horses -- The Varieties of Viruses. Ch. 22. How Melissa Changed the Rules. Ch. 23. Documents that Attack (and What You Can Do to Protect Yourself). Ch. 24. Prevention, Detection, and Elimination.
Summary: Providing information on how to identify, avoid and eradicate computer viruses, this text goes on to explain how to protect data with professional encryption techniques. The CD contains a demo of BlackICE Defender to protect the reader's computer agains hackers.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
CD/DVD CD/DVD Namal Library
CD/DVD Rack
005.8 MAN-H 2000 829 (Browse shelf (Opens below)) Available CD00829
Books Books Namal Library
Computer Science
005.8 MAN-H 2000 829 (Browse shelf (Opens below)) Available 829
Total holds: 0
Browsing Namal Library shelves, Shelving location: CD/DVD Rack Close shelf browser (Hides shelf browser)
005.758 BUY-W 2002 10088 Web database development .NET edition, step by step / 005.8 CHI-H 2003 1583 Hack attacks testings : 005.8 GOD-I 2013 3695 Information systems security : 005.8 MAN-H 2000 829 Hacker Attack / 005.82 SHY-C 2011 1244 Cryptography and security / 005 SAV-P 2013 4519 Problem solving with C++ / 006 BUR-V 2014 9850 Virtual reality technology /

Index included

Pt. 1. Hackers, Crackers, and Whackers. Ch. 1. Danger on the Internet. Ch. 2. Phone Phreaks. Ch. 3. Hackers, Crackers, and Whackers. Ch. 4. Bypassing Passwords and Doing the Rat Dance. Ch. 5. The Venus Flytrap and Other Anti-Hacks. Ch. 6. Between a Rock and a Hard Place. Ch. 7. The Dangers of High-Speed Connections. Ch. 8. How to Protect Your Exposed Broadband -- Pt. 2. Personal Privacy. Ch. 9. Internet Privacy. Ch. 10. The Elements of Cryptography. Ch. 11. The Great Leap Forward. Ch. 12. The Computer Steps In. Ch. 13. Infinite Monkeys: Brute Force Attacks and Other Curiosities. Ch. 14. DES: A Public Scheme. Ch. 15. Making Keys Public. Ch. 16. Electric Signatures. Ch. 17. Encryption Implementations in Windows 2000. Ch. 18. Hiding Data in Photon Streams. Ch. 19. The Perfect, Unbreakable Encryption System -- Pt. 3. Viruses. Ch. 20. The Great Worm Escapes. Ch. 21. Logic Bombs, Worms, and Trojan Horses -- The Varieties of Viruses. Ch. 22. How Melissa Changed the Rules. Ch. 23. Documents that Attack (and What You Can Do to Protect Yourself). Ch. 24. Prevention, Detection, and Elimination.

Providing information on how to identify, avoid and eradicate computer viruses, this text goes on to explain how to protect data with professional encryption techniques. The CD contains a demo of BlackICE Defender to protect the reader's computer agains hackers.

There are no comments on this title.

to post a comment.