TOP
經典不再等待!讀懂羅馬人的強大,開啟你的智力冒險
Kali linux: a step by step guide to learn wireless penetration techniques and basics of penetration testing, includes command line
滿額折

Kali linux: a step by step guide to learn wireless penetration techniques and basics of penetration testing, includes command line

商品資訊

定價
:NT$ 1404 元
無庫存,下單後進貨(到貨天數約30-45天)
下單可得紅利積點 :42 點
商品簡介

商品簡介

Do you want to learn how you can protect yourself from hackers in your office and home and how to carry out ethical hacking? If yes, then keep reading...


In layman's terms, hacking is the act of breaking into someone else's computer to which you have no access and stealing private information by circumventing the security measures. It is dangerous because it sabotages the entire computer system.


The origin of the word "hacking" can be traced back to the 1960's and 1970's. Some hackers, called Yippe, were anti-war protestors and members of the Youth International Party. They played pranks in the streets, and most of their prank techniques were taught within their group. It is important to note that they were involved in tapping telephone lines as well.


Gradually, what was called a prank grew to another level and became known as hacking. However, this time their tools were state-of-the-art mega core processors and multi-function plasma screens.


Hacking tactics are increasingly being used by terrorist organizations for numerous acts of evil, including obtaining illegal funding, spreading propaganda, launching missiles, threatening the government and gathering intelligence about secret military movements.


In this book, various types of hacking will be broken down and explained. Step by step instructions will be provided so that you can protect yourself from hackers in your office and home, as well as on the internet. This book gives a comprehensive guide on the following: A step by step process on installing and downloading Kali LinuxVarious tools that are available in Kali Linux, which can be used for penetrating wireless devicesBasic Linux CommandsTips and tricks on Penetration Testing and Web SecurityLinux ToolsHow exploits are classifiedThe role of firewallWhat are cryptography and digital signatureThe Threat of Malware and Cyber AttacksManagement of Linux Kernel and Loadable Kernel ModulesBash and python scripting

... AND MORE


Even if it is your first approach with hacking, by the end of this book you will be armed with all the knowledge you require to get started in ethical hacking.This book is a very and complete guide with a lot of practice and little theory.All you need to know is in this book with detailed descriptions and step by step processes.Even if you are a complete beginner, this book will act as your guide as you traverse the virtual world.


What are you waiting for?Scroll to the top of the page and select the buy now button

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

定價:100 1404
無庫存,下單後進貨
(到貨天數約30-45天)

暢銷榜

客服中心

收藏

會員專區