Ilmu hacking merupakan ilmu yang mengajarkan berbagai cara yang biasanya digunakan hacker untuk memasuki sistem orang lain, mendapatkan password, melakukan penyadapan, dan lainnya. Tujuan buku ini ditulis bukan mengajari menjadi hacker ilegal dan tidak bertanggung jawab, akan tetapi agar Anda bisa bertahan dari serangan hacker dan agar tidak menjadi korban hacking. Dengan mempelajari buku ini, …
Buku cepat belajar hacking mengikuti peran teknologi dimana semaking berkembang sangat pesat sehingga beberapa programmer hebat yang banyak membuat aplikasi baru, membangun jaringan, menciptakan software terbaru setiap hari. Namun tahukan Anda, setiap aplikasi atau jaringan mempunyai celah untuk ditembus? Tidak ada sistem yang aman. Itu adalah semboyan yang ditanamkan para hacker yang berkecimp…
Are you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain expertise to implement efficient security measures and create robust defense solutions using modern technologies. The first part of the book covers security fundamentals with details around building and…
Table of Contents Author's Note ix The Players xi Chapter 1 An Evening in San Francisco 1 Chapter 2 Texas T-Files 9 Chapter 3 The Cons 21 Chapter 4 Underground Boston 37 Chapter 5 Back Orifice 53 Chapter 6 One Million Dollars and a Monster Truck 71 Chapter 7 Oxblood 85 Chapter 8 Much @stake 107 Chapter 9 Tor and Citizen Lab 127 Chapter 10 Jake 139 Chapter 11 Mixter, Muench, and…
TABLE OF CONTENTS Introduction xxv Who This Book is For xxvii What is Covered in This Book? xxvii MFA is Good xxx How to Contact Wiley or the Author xxxi Part I Introduction 1 1 Logon Problems 3 2 Authentication Basics 33 3 Types of Authentication 59 4 Usability vs Security 101 Part II Hacking MFA 121 5 Hacking MFA in General 123 6 Access Control Token Tricks 141 7 Endpoint …
This book provides a detailed and comprehensive overview of all phases of a hackathon and thus helps to reduce complexity, to use opportunities, to avert pitfalls and to avoid problems. In addition, it also explains from a participant's perspective how to succeed in a hackathon. Lastly, the book is rounded off by extensive checklists, which support you in your own hackathons. Table of conten…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting, Bluetooth and Wifi hacking. Furthermore the reader will be introduced to defense meth…
Mastering ARM hardware architecture opens a world of programming for nearly all phones and tablets including the iPhone/iPad and most Android phones. It’s also the heart of many single board computers like the Raspberry Pi. Gain the skills required to dive into the fundamentals of the ARM hardware architecture with this book and start your own projects while you develop a working knowledge of…