Kali linux: a step by step guide to learn wireless penetration techniques and basics of penetration testing, includes command line Contributor(s): Tools, Steven (Author) |
|
ISBN: 1911684116 ISBN-13: 9781911684114 Publisher: Marco Giuriato Company Ltd OUR PRICE: $22.46 Product Type: Paperback - Other Formats Published: February 2021 * Not available - Not in print at this time * |
Additional Information |
BISAC Categories: - Computers | Speech & Audio Processing - Computers | Operating Systems - Linux - Computers | System Administration - Linux & Unix Administration |
Physical Information: 0.33" H x 6" W x 9" (0.48 lbs) 156 pages |
Descriptions, Reviews, Etc. |
Publisher Description: Do you want to learn how you can protect yourself from hackers in your office and home and how to carry out ethical hacking? If yes, then keep reading... In layman's terms, hacking is the act of breaking into someone else's computer to which you have no access and stealing private information by circumventing the security measures. It is dangerous because it sabotages the entire computer system. The origin of the word "hacking" can be traced back to the 1960's and 1970's. Some hackers, called Yippe, were anti-war protestors and members of the Youth International Party. They played pranks in the streets, and most of their prank techniques were taught within their group. It is important to note that they were involved in tapping telephone lines as well. Gradually, what was called a prank grew to another level and became known as hacking. However, this time their tools were state-of-the-art mega core processors and multi-function plasma screens. Hacking tactics are increasingly being used by terrorist organizations for numerous acts of evil, including obtaining illegal funding, spreading propaganda, launching missiles, threatening the government and gathering intelligence about secret military movements. ... AND MORE |