Hacking

Hacking
Author: Abraham K White
Publisher: Createspace Independent Publishing Platform
Total Pages: 230
Release: 2017-11-10
Genre: Computer security
ISBN: 9781979881104

This book presents detailed information on hacking and how to protect computer systems from hackers. Hacking tools are discussed along with the pros and cons of various types of security.

The Underground Guide to Computer Security

The Underground Guide to Computer Security
Author: Michael Alexander
Publisher:
Total Pages: 264
Release: 1996
Genre: Bilgisayar güvenliği
ISBN:

How much backup is enough? If your computer is on a network, who can read your files? How long would it take to get your computer up and running again after a flood or lightning strikes? Security expert Michael Alexander (who has himself lost enough data to fill a small black hole) takes you step by step through the basics of practical computer security for everyone, whether you're on a LAN in an office, dialing up from your portable, or running your own small business on one machine. In The Underground Guide to Computer Security you'll learn how to evaluate the many hardware and software options available to protect your computer and your data. You'll get expert advice on how to choose the best antivirus software, backup system, power protection gear, diagnostic utilities, and encryption programs. Create hacker-proof passwords. Keep your information safe - and private! - in a networked world. Get practical strategies to protect yourself from coworkers using the company LAN to snoop through your files as well as from professional information thieves on dial-up services and the Internet. Develop simple back-up and disaster recovery plans that offer the right amount of information security for your needs. And much more! Every page has something you can use immediately. This book is packed wall to wall with hands-on advice, warnings, tips, virus alerts, workarounds, and the kind of nitty-gritty explanations that could only come from someone who eats, sleeps, and breathes computer security.

Out of the Inner Circle

Out of the Inner Circle
Author: Bill Landreth
Publisher:
Total Pages: 248
Release: 1985
Genre: Computers
ISBN:

Story of an adolescent computer hacker, apprehended by the FBI, indicted by a Federal Grand Jury, now telling details of the more illustrous capers.

Cybersecurity

Cybersecurity
Author: Lester Evans
Publisher:
Total Pages: 118
Release: 2020-01-10
Genre: Computers
ISBN: 9781647482749

Do you create tons of accounts you will never again visit? Do you get annoyed thinking up new passwords, so you just use the same one across all your accounts? Does your password contain a sequence of numbers, such as "123456"? This book will show you just how incredibly lucky you are that nobody's hacked you before.

The Essential Guide to Home Computer Security

The Essential Guide to Home Computer Security
Author: Robert R. Rowlingson
Publisher: BCS, The Chartered Institute
Total Pages: 134
Release: 2011
Genre: Computers
ISBN: 1906124698

For the non-technical home and small-office Internet user, this guide teaches "digital commonsense." Readers will learn easy-to-implement, cost-effective ways of protecting their children, finances, privacy, and data.

Defeating the Hacker

Defeating the Hacker
Author: Robert Schifreen
Publisher: John Wiley & Sons
Total Pages: 408
Release: 2006-04-24
Genre: Computers
ISBN:

Featuring crucial information on how to secure a network, this text covers IT security, hackers, crackers, phisers, spammers, scammers, virus-writers, Trojan horses, malware, spyware - and how to keep these technical afflictions out of computer systems.

Halting the Hacker

Halting the Hacker
Author: Donald L. Pipkin
Publisher: Prentice Hall Professional
Total Pages: 388
Release: 2003
Genre: Computers
ISBN: 9780130464163

Get into the hacker's mind--and outsmart him! Fully updated for the latest threats, tools, and countermeasures Systematically covers proactive, reactive, and preemptive security measures Detailed, step-by-step techniques for protecting HP-UX, Linux, and UNIX systems "Takes on even more meaning now than the original edition!" --Denny Georg, CTO, Information Technology, Hewlett-Packard Secure your systems against today's attacks--and tomorrow's. Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Top Hewlett-Packard security architect Donald L. Pipkin has updated this global bestseller for today's most critical threats, tools, and responses. Pipkin organizes this book around the processes hackers use to gain access, privileges, and control--showing you exactly how they work and the best ways to respond. Best of all, Pipkin doesn't just tell you what to do, but why. Using dozens of new examples, he gives you the skills and mindset to protect yourself against any current exploit--and attacks that haven't even been imagined yet. How hackers select targets, identify systems, gather information, gain access, acquire privileges, and avoid detection How multiple subsystems can be used in harmony to attack your computers and networks Specific steps you can take immediately to improve the security of any HP-UX, Linux, or UNIX system How to build a secure UNIX system from scratch--with specifics for HP-UX and Red Hat Linux Systematic proactive, reactive, and preemptive security measures Security testing, ongoing monitoring, incident response, and recovery--in depth Legal recourse: What laws are being broken, what you need to prosecute, and how to overcome the obstacles to successful prosecution About the CD-ROM The accompanying CD-ROM contains an extensive library of HP-UX and Linux software tools for detecting and eliminating security problems and a comprehensive information archive on security-related topics.

Computer Security

Computer Security
Author: John S. Potts
Publisher: Nova Publishers
Total Pages: 158
Release: 2002
Genre: Computers
ISBN: 9781590335215

We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research and academic institutions devote a considerable amount of time and effort to the study of information systems and computer security. Anyone with access to a computer needs to be aware of the developing trends and growth of computer security. To that end, this book presents a comprehensive and carefully selected bibliography of the literature most relevant to understanding computer security. Following the bibliography section, continued access is provided via author, title, and subject indexes. With such a format, this book serves as an important guide and reference tool in the defence of our computerised culture.

The Underground Guide to UNIX

The Underground Guide to UNIX
Author: John Montgomery
Publisher: Addison-Wesley Professional
Total Pages: 0
Release: 1995
Genre: Operating systems (Computers)
ISBN: 9780201406535

This lively, irreverent book gives straighforward advice on the best way to perform any task in the UNIX environment. Regardless of the UNIX version used by the reader, John Montgomery unlocks the mysteries of the file system and covers all the essentials for exploiting the power of the UNIX operating system. For practical advice on everything from customizing any UNIX environment, to preventing and surviving common UNIX disasters, this book is fun for serious users.