British Journal eBook

eBook Journal in PDF, ePub, Mobi and Kindle Formats

ABCD OF HACKING

ABCD OF HACKING

Ever wondered how the computer hacks or website hacks happen? What constitutes a website hack?How come a Computer, which in layman circle, usually seen as a ‘Perfect’ machine doing computations or calculations at the lightning speed, have security vulnerabilities?! Can't all websites be safe and secure always? If you have all these innocent doubts in your mind, then this is the right book for you, seeking answers in an intuitive way using layman terms wherever possible! There are 7 different chapters in the book. The first three of them set up the ground basics of hacking, next three of them discuss deeply the real hackings i.e. the different types of handpicked well-known web attacks and the last chapter that sums up everything. Here is the list of chapters: 1)Introduction: A brief discussion on workings of computers, programs, hacking terminologies, analogies to hacks. This chapter addresses the role of security in a software. 2)A Simplest Hack: To keep the reader curious, this chapter demonstrates the simplest hack in a computer program and draws all the essential components in a hacking. Though this is not a real hacking yet, it signifies the role of user input and out of box thinking in a nutshell. This chapter summarizes what a hack constitutes. 3)Web Applications: As the book is about website hacks, it would not be fair enough if there is no content related to the basics, explaining components of a website and the working of a website. This chapter makes the user ready to witness the real website hackings happening from the next chapter. 4)The SQL Injection: Reader’s first exposure to a website attack! SQL injection is most famous cyber-attack in Hackers’ community. This chapter explains causes, the way of exploitation and the solution to the problem. Of course, with a lot of analogies and intuitive examples! 5)Cross-site Scripting: Another flavor of attacks! As usual, the causes, way of exploitation and solution to the problem is described in simple terms. Again, with a lot of analogies! 6)Cross-site Request Forgery: The ultimate attack to be discussed in the book. Explaining why it is different from previous two, the causes, exploitation, solution and at the end, a brief comparison with the previous attack. This chapter uses the terms ‘Check request forgery’ and ‘Cross Bank Plundering’ sarcastically while drawing an analogy! 7)Conclusion: This chapter sums up the discussion by addressing questions like why only 3 attacks have been described? why can’t all websites be secure always? The chapter ends by giving a note to ethical hacking and ethical hackers.

Download Now

Author
Publisher SHASHANK PAI K
Release Date
ISBN
Pages 106 pages
Rating 4/5 ( users)

If you have all these innocent doubts in your mind, then this is the right book for you, seeking answers in an intuitive way using layman terms wherever possible! There are 7 different chapters in the book.

More Books:

ABCD OF HACKING
Language: en
Pages: 106
Authors: SHASHANK PAI K
Categories: Computers
Type: BOOK - Published: 2019-03-01 - Publisher: SHASHANK PAI K

GET EBOOK

Ever wondered how the computer hacks or website hacks happen? What constitutes a website hack?How come a Computer, which in layman circle, usually seen as a ‘
CEH: Certified Ethical Hacker Version 8 Study Guide
Language: en
Pages: 504
Authors: Oriyano
Categories: Computers
Type: BOOK - Published: 2014-07-31 - Publisher: John Wiley & Sons

GET EBOOK

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is
Hands-On Ethical Hacking and Network Defense
Language: en
Pages: 512
Authors: Michael T. Simpson
Categories: Computers
Type: BOOK - Published: 2016-10-10 - Publisher: Cengage Learning

GET EBOOK

Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever.
ABCD of Hacking
Language: en
Pages: 112
Authors: Shashank K
Categories:
Type: BOOK - Published: 2018-03-31 - Publisher: Createspace Independent Publishing Platform

GET EBOOK

Ever wondered how the computer hacks or website hacks happen? What constitutes a website hack?How come a Computer, which in layman circle, usually seen as a 'Pe
Network Defense and Countermeasures
Language: en
Pages: 504
Authors: William (Chuck) Easttom II
Categories: Computers
Type: BOOK - Published: 2013-10-18 - Publisher: Pearson IT Certification

GET EBOOK

Everything you need to know about modern network attacks and defense, in one book Clearly explains core network security concepts, challenges, technologies, and
CEH: Official Certified Ethical Hacker Review Guide
Language: en
Pages: 238
Authors: Kimberly Graves
Categories: Study Aids
Type: BOOK - Published: 2007-05-07 - Publisher: John Wiley & Sons

GET EBOOK

Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers. This easy-to-use guid
The Oracle Hacker's Handbook
Language: en
Pages: 216
Authors: David Litchfield
Categories: Computers
Type: BOOK - Published: 2007-04-30 - Publisher: John Wiley & Sons

GET EBOOK

David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you h
CEH v10 Certified Ethical Hacker Study Guide
Language: en
Pages: 600
Authors: Ric Messier
Categories: Computers
Type: BOOK - Published: 2019-06-25 - Publisher: John Wiley & Sons

GET EBOOK

As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the nu
Profiling Hackers
Language: en
Pages: 279
Authors: Raoul Chiesa
Categories: Computers
Type: BOOK - Published: 2008-12-11 - Publisher: CRC Press

GET EBOOK

Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into th
Hacker's Delight
Language: en
Pages: 512
Authors: Henry S. Warren
Categories: Computers
Type: BOOK - Published: 2012-09-25 - Publisher: Addison-Wesley

GET EBOOK

"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many

Powered By WordPress | LMS Academic