Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Loading...
Date
2023
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
CRC Press
Abstract
Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hackers can use to exploit physical access, network access, and wireless vectors. The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks.
Description
Keywords
Business & Economics, Social & Management Sciences::Social Sciences::Developmental Issues & Socioeconomic Studies