跳转到帖子
点击或将鼠标悬停在图像上放大

Hacker attack and defense from entry to mastery

(1篇评论)
10.00 USD
"Hacker Attack and Defense from entry to mastery (Encryption and Decryption)" covers from the introduction of computer hacking attack and defense, to professional Web technology security knowledge, suitable for all levels of readers with different foundations.
Hacking from Beginner to Proficient (Encryption and Decryption) is intended for users of Windows 7 and later operating systems. Although many of the tools and cases in this book can be run or used under Windows XP and other systems, it is strongly recommended that readers install Windows 7 or later in order to learn the full content of this book.
Hacker Attack and Defense from Entry to Mastery (Encryption and Decryption) is a combination of theories and examples. After the introduction of relevant knowledge points, the knowledge points are introduced in the form of cases, so as to deepen readers' understanding and cognitive ability of the knowledge points and strive to comprehensively master the knowledge points.
"Hacker Attack and Defense from Entry to Master (Encryption and Decryption)" abandoned a large number of dry text narrative writing, but adopted a graphic way to layout, with a large number of illustrations to explain, can make the learning process easier for readers.
The content of Hacker Attack and Defense from Entry to Mastery (Encryption and Decryption) starts from zero, is easy to understand, and is explained from simple to deep, so that both beginners and users with a certain base can gradually improve.
Content abstract
"Hacker Attack and defense from entry to master (encryption and Decryption section)" from the simple to the deep, illustrated and reproduced the computer and mobile phone security related knowledge. The book consists of 22 chapters, including social engineering, Computer and Network Anti-hacking Basics, Windows 10 Firewall and Windows Defender, Windows 10 Advanced Security Management, system and data backup and recovery, computer and network control commands, scanning and sniffing: Determine the target and explore network resources, Trojan horse prevention technology, virus prevention technology, Windows system vulnerability attack and defense technology, computer backdoor technology, program encryption and decryption technology, LAN security prevention Technology, computer remote control technology, Web site security prevention technology, cleaning malicious plug-ins and software, online games and Internet cafe security prevention technology, online account anti-hacking combat, online payment tools.
Author's brief introduction
Libo Zong has been working at Inspur Group since 2010 and is currently the information security Manager. Over the years, he has participated in editing and editing many books on computer and network security.
Inside pages illustrations
directory
directory
Chapter 1 Social Engineering
1.1 Hacking and Social Engineering
1.1.1 Overview of Social engineering attacks
1.1.2 Non-traditional information security that cannot be ignored
1.1.3 Attack Information Owner
1.2 Uncovering common social engineering attacks
1.3 Social engineering attacks happen all the time
1.3.1 Obtaining a User's Mobile Phone Number Illegally
1.3.2 Uncovering phishing
1.3.3 How Do I Fake my Identity to obtain system Passwords
1.4 Ubiquitous information search....
...

 分享

关于Hacker attack and defense from entry to mastery

"Hacker Attack and Defense from entry to mastery (Encryption and Decryption)" covers from the introduction of computer hacking attack and defense, to professional Web technology security knowledge, suitable for all levels of readers with different foundations.

Hacking from Beginner to Proficient (Encryption and Decryption) is intended for users of Windows 7 and later operating systems. Although many of the tools and cases in this book can be run or used under Windows XP and other systems, it is strongly recommended that readers install Windows 7 or later in order to learn the full content of this book.

Hacker Attack and Defense from Entry to Mastery (Encryption and Decryption) is a combination of theories and examples. After the introduction of relevant knowledge points, the knowledge points are introduced in the form of cases, so as to deepen readers' understanding and cognitive ability of the knowledge points and strive to comprehensively master the knowledge points.

"Hacker Attack and Defense from Entry to Master (Encryption and Decryption)" abandoned a large number of dry text narrative writing, but adopted a graphic way to layout, with a large number of illustrations to explain, can make the learning process easier for readers.

The content of Hacker Attack and Defense from Entry to Mastery (Encryption and Decryption) starts from zero, is easy to understand, and is explained from simple to deep, so that both beginners and users with a certain base can gradually improve.

Content abstract

"Hacker Attack and defense from entry to master (encryption and Decryption section)" from the simple to the deep, illustrated and reproduced the computer and mobile phone security related knowledge. The book consists of 22 chapters, including social engineering, Computer and Network Anti-hacking Basics, Windows 10 Firewall and Windows Defender, Windows 10 Advanced Security Management, system and data backup and recovery, computer and network control commands, scanning and sniffing: Determine the target and explore network resources, Trojan horse prevention technology, virus prevention technology, Windows system vulnerability attack and defense technology, computer backdoor technology, program encryption and decryption technology, LAN security prevention Technology, computer remote control technology, Web site security prevention technology, cleaning malicious plug-ins and software, online games and Internet cafe security prevention technology, online account anti-hacking combat, online payment tools.

Author's brief introduction

Libo Zong has been working at Inspur Group since 2010 and is currently the information security Manager. Over the years, he has participated in editing and editing many books on computer and network security.

Inside pages illustrations

directory

directory

Chapter 1 Social Engineering
1.1 Hacking and Social Engineering
1.1.1 Overview of Social engineering attacks
1.1.2 Non-traditional information security that cannot be ignored
1.1.3 Attack Information Owner
1.2 Uncovering common social engineering attacks
1.3 Social engineering attacks happen all the time
1.3.1 Obtaining a User's Mobile Phone Number Illegally
1.3.2 Uncovering phishing
1.3.3 How Do I Fake my Identity to obtain system Passwords
1.4 Ubiquitous information search....

...58c26c82N5d0a595c.jpg58c26c88Nbc822b4f.jpg58c26c98N7e7a6ba3.jpg


HACK1949

  

非常适合初学者的书籍,大家可以多看看。有什么不懂的在论坛提问,谢谢。

链接评论

黑客攻防讨论组

黑客攻防讨论组

    You don't have permission to chat.
    ×
    ×
    • 创建新的...