Hacker Attack / by Richard Mansfield

By: Mansfield, RichardMaterial type: TextTextPublication details: New Delhi : BPB Publications , 2000cDescription: xxvi, 293 p. : ill. ; 23 cm. + 1 Compact Disc (4 3/4 in.)ISBN: 8176563293 (pbk)Subject(s): Computer crimesDDC classification: 005.8
Contents:
Pt. 1. Hackers, Crackers, and Whackers. Ch. 1. Danger on the Internet. Ch. 2. Phone Phreaks. Ch. 3. Hackers, Crackers, and Whackers. Ch. 4. Bypassing Passwords and Doing the Rat Dance. Ch. 5. The Venus Flytrap and Other Anti-Hacks. Ch. 6. Between a Rock and a Hard Place. Ch. 7. The Dangers of High-Speed Connections. Ch. 8. How to Protect Your Exposed Broadband -- Pt. 2. Personal Privacy. Ch. 9. Internet Privacy. Ch. 10. The Elements of Cryptography. Ch. 11. The Great Leap Forward. Ch. 12. The Computer Steps In. Ch. 13. Infinite Monkeys: Brute Force Attacks and Other Curiosities. Ch. 14. DES: A Public Scheme. Ch. 15. Making Keys Public. Ch. 16. Electric Signatures. Ch. 17. Encryption Implementations in Windows 2000. Ch. 18. Hiding Data in Photon Streams. Ch. 19. The Perfect, Unbreakable Encryption System -- Pt. 3. Viruses. Ch. 20. The Great Worm Escapes. Ch. 21. Logic Bombs, Worms, and Trojan Horses -- The Varieties of Viruses. Ch. 22. How Melissa Changed the Rules. Ch. 23. Documents that Attack (and What You Can Do to Protect Yourself). Ch. 24. Prevention, Detection, and Elimination.
Summary: Providing information on how to identify, avoid and eradicate computer viruses, this text goes on to explain how to protect data with professional encryption techniques. The CD contains a demo of BlackICE Defender to protect the reader's computer agains hackers.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
CD/DVD CD/DVD Namal Library
CD/DVD Rack
005.8 MAN-H 2000 829 (Browse shelf (Opens below)) Available CD00829
Books Books Namal Library
Computer Science
005.8 MAN-H 2000 829 (Browse shelf (Opens below)) Available 829
Total holds: 0
Browsing Namal Library shelves, Shelving location: Computer Science Close shelf browser (Hides shelf browser)
005.8 KAU-N 2002 1516 Network security : 005.8 KRU-I 2005 10038 Intrusion detection and correlation : 005.8 MAI-F 2004 893 Fundamentals of network security / 005.8 MAN-H 2000 829 Hacker Attack / 005.8 MCC-H 2012 7166 Hacking exposed 7: 005.8 MCC-W 2006 1997 Web hacking : 005.8 MEA-C 2017 9726 Cyber security engineering :

Index included

Pt. 1. Hackers, Crackers, and Whackers. Ch. 1. Danger on the Internet. Ch. 2. Phone Phreaks. Ch. 3. Hackers, Crackers, and Whackers. Ch. 4. Bypassing Passwords and Doing the Rat Dance. Ch. 5. The Venus Flytrap and Other Anti-Hacks. Ch. 6. Between a Rock and a Hard Place. Ch. 7. The Dangers of High-Speed Connections. Ch. 8. How to Protect Your Exposed Broadband -- Pt. 2. Personal Privacy. Ch. 9. Internet Privacy. Ch. 10. The Elements of Cryptography. Ch. 11. The Great Leap Forward. Ch. 12. The Computer Steps In. Ch. 13. Infinite Monkeys: Brute Force Attacks and Other Curiosities. Ch. 14. DES: A Public Scheme. Ch. 15. Making Keys Public. Ch. 16. Electric Signatures. Ch. 17. Encryption Implementations in Windows 2000. Ch. 18. Hiding Data in Photon Streams. Ch. 19. The Perfect, Unbreakable Encryption System -- Pt. 3. Viruses. Ch. 20. The Great Worm Escapes. Ch. 21. Logic Bombs, Worms, and Trojan Horses -- The Varieties of Viruses. Ch. 22. How Melissa Changed the Rules. Ch. 23. Documents that Attack (and What You Can Do to Protect Yourself). Ch. 24. Prevention, Detection, and Elimination.

Providing information on how to identify, avoid and eradicate computer viruses, this text goes on to explain how to protect data with professional encryption techniques. The CD contains a demo of BlackICE Defender to protect the reader's computer agains hackers.

There are no comments on this title.

to post a comment.