Steal This Computer Book 4.0: What They Won't Tell You about the Internet, 4/e
Wallace Wang
- 出版商: No Starch Press
- 出版日期: 2006-05-06
- 售價: $1,250
- 貴賓價: 9.5 折 $1,188
- 語言: 英文
- 頁數: 384
- 裝訂: Paperback
- ISBN: 1593271050
- ISBN-13: 9781593271053
已過版
買這商品的人也買了...
-
$950Practical Linux Programming: Device Drivers, Embedded systems, and the Internet (Paperback)
-
$590$466 -
$680$537 -
$890$703 -
$560$437 -
$520$406 -
$680$578 -
$280$221 -
$580$493 -
$880$695 -
$580$458 -
$520$468 -
$450$405 -
$490$382 -
$580$493 -
$580$458 -
$650$507 -
$490$417 -
$520$442 -
$680$646 -
$450$356 -
$620$558 -
$780$616 -
$299Pro Visual Studio 2005 Team System (Paperback)
-
$720$569
相關主題
商品描述
Description
National bestseller with over 175,000 copies sold!
Now completely revised and updated
If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do.
The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for hacking?the news and presenting the public with self-serving stories of questionable accuracy. Inside, youll discover:
?How to manage and fight spam and spyware
?How Trojan horse programs and rootkits work and how to defend against them
?How hackers steal software and defeat copy-protection mechanisms
?How to tell if your machine is being attacked and what you can do to protect it
?Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside
?How corporations use hacker techniques to infect your computer and invade your privacy
?How you can lock down your computer to protect your data and your personal information using free programs included on the books CDIf youve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because youre paranoid doesnt mean they arent after you. And, as Wallace Wang reveals, they probably are.
The companion CD contains hundreds of megabytes of 100 % FREE hacking and security related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.
Table of contents
Part 1: The Early Hackers
Chapter 1: The Hacker Mentality
Chapter 2: The First Hackers: The Phone Phreakers
Chapter 3: Hacking People, Places, and Things
Part 2: The PC Pioneers
Chapter 4: Ansi Bombs and Viruses
Chapter 5: Trojan Horses and Worms
Chapter 6: Warez (Software Piracy)
Part 3: The Internet Hackers
Chapter 7: Where the Hackers Are
Chapter 8: Stalking a Computer
Chapter 9: Cracking Passwords
Chapter 10: Digging Into a Computer with Rootkits
Chapter 11: Censoring Information
Chapter 12: The Filesharing Networks
Part 4: The Real World Hackers
Chapter 13: The Internet Con Artists
Chapter 14: Finding People on the Internet
Chapter 15: Propaganda as News and Entertainment
Chapter 16: Hacktivism: Online Activism
Chapter 17: Hate Groups and Terrorists on the Internet
Part 5: The FutureHacking for Profit
Chapter 18: Identity Theft and Spam
Chapter 19: Banner Ads, Pop-up Ads, and Search Engine Spamming
Chapter 20: Adware and Spyware
Part 6: Protecting Your Computer and Yourself
Chapter 21: Computing on a Shoestring: Getting Stuff for (Almost) Free
Chapter 22: Computer Forensics: The Art of Deleting and Retrieving Data
Chapter 23: Locking Down Your Computer