Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Loading...
Thumbnail Image

Date

2023

Journal Title

Journal ISSN

Volume Title

Publisher

CRC Press

Abstract

Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hackers can use to exploit physical access, network access, and wireless vectors. The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks.

Description

Keywords

Business & Economics, Social & Management Sciences::Social Sciences::Developmental Issues & Socioeconomic Studies

Citation