Hacker Attack / by Richard Mansfield
Material type: TextPublication details: New Delhi : BPB Publications , 2000cDescription: xxvi, 293 p. : ill. ; 23 cm. + 1 Compact Disc (4 3/4 in.)ISBN: 8176563293 (pbk)Subject(s): Computer crimesDDC classification: 005.8Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
CD/DVD | Namal Library CD/DVD Rack | 005.8 MAN-H 2000 829 (Browse shelf (Opens below)) | Available | CD00829 | ||
Books | Namal Library Computer Science | 005.8 MAN-H 2000 829 (Browse shelf (Opens below)) | Available | 829 |
Browsing Namal Library shelves, Shelving location: Computer Science Close shelf browser (Hides shelf browser)
005.8 KAU-N 2002 1516 Network security : | 005.8 KRU-I 2005 10038 Intrusion detection and correlation : | 005.8 MAI-F 2004 893 Fundamentals of network security / | 005.8 MAN-H 2000 829 Hacker Attack / | 005.8 MCC-H 2012 7166 Hacking exposed 7: | 005.8 MCC-W 2006 1997 Web hacking : | 005.8 MEA-C 2017 9726 Cyber security engineering : |
Index included
Pt. 1. Hackers, Crackers, and Whackers. Ch. 1. Danger on the Internet. Ch. 2. Phone Phreaks. Ch. 3. Hackers, Crackers, and Whackers. Ch. 4. Bypassing Passwords and Doing the Rat Dance. Ch. 5. The Venus Flytrap and Other Anti-Hacks. Ch. 6. Between a Rock and a Hard Place. Ch. 7. The Dangers of High-Speed Connections. Ch. 8. How to Protect Your Exposed Broadband -- Pt. 2. Personal Privacy. Ch. 9. Internet Privacy. Ch. 10. The Elements of Cryptography. Ch. 11. The Great Leap Forward. Ch. 12. The Computer Steps In. Ch. 13. Infinite Monkeys: Brute Force Attacks and Other Curiosities. Ch. 14. DES: A Public Scheme. Ch. 15. Making Keys Public. Ch. 16. Electric Signatures. Ch. 17. Encryption Implementations in Windows 2000. Ch. 18. Hiding Data in Photon Streams. Ch. 19. The Perfect, Unbreakable Encryption System -- Pt. 3. Viruses. Ch. 20. The Great Worm Escapes. Ch. 21. Logic Bombs, Worms, and Trojan Horses -- The Varieties of Viruses. Ch. 22. How Melissa Changed the Rules. Ch. 23. Documents that Attack (and What You Can Do to Protect Yourself). Ch. 24. Prevention, Detection, and Elimination.
Providing information on how to identify, avoid and eradicate computer viruses, this text goes on to explain how to protect data with professional encryption techniques. The CD contains a demo of BlackICE Defender to protect the reader's computer agains hackers.
There are no comments on this title.