Hacking with Kali Linux. A Guide to Ethical Hacking: A Beginner's Guide with Practical Examples to Learn the Basics of Cybersecurity and Ethical Hacki
商品資訊
ISBN13:9781801137737
出版社:Lightning Source Inc
作者:Grzegorz Nowak
出版日:2020/10/25
裝訂:平裝
規格:22.9cm*15.2cm*0.7cm (高/寬/厚)
商品簡介
▶ Are you interested in learning more about hacking and how you can use these techniques to keep yourself and your network as safe as possible?
▶ Would you like to work with Kali Linux to protect your network and to make sure that hackers are not able to get onto your computer and cause trouble or steal your personal information?
▶ Have you ever been interested in learning more about the process of hacking, how to avoid being taken advantage of, and how you can use some of techniques for your own needs?
This guidebook is going to provide us with all of the information that we need to know about Hacking with Linux. Many people worry that hacking is a bad process and that it is not the right option for them. The good news here is that hacking can work well for not only taking information and harming others but also for helping you keep your own network and personal information as safe as possible.
Inside this guidebook, we are going to take some time to explore the world of hacking, and why the Kali Linux system is one of the best to help you get this done. We explore the different types of hacking, and why it is beneficial to learn some of the techniques that are needed to perform your own hacks and to see the results that we want with our own networks.
In this guidebook, we will take a look at a lot of the different topics and techniques that we need to know when it comes to working with hacking on the Linux system. Some of the topics that we are going to take a look at here include:
- The different types of hackers that we may encounter and how they are similar and different.
- How to install the Kali Linux onto your operating system to get started.
- The basics of cybersecurity, web security, and cyberattacks and how these can affect your computer system and how a hacker will try to use you.
- The different types of malware that hackers can use against you.
- How a man in the middle, DoS, Trojans, viruses, and phishing can all be tools of the hacker.
- And so much more.
Hacking is often an option that most people will not consider because they worry that it is going to be evil, or that it is only used to harm others. But as we will discuss in this guidebook, there is so much more to the process than this.
主題書展
更多書展今日66折
您曾經瀏覽過的商品
購物須知
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。