Skip to content Skip to footer
Hacking
1 4.0 out of 5 stars
922 Views
(1 customer review)

Additional information

ISBN 13

ISBN 10

E-ISBN 13

Edition

Page

Type of book

Weight 300.00 g
Year

Language

Publisher

Categories Computer Science Engineering , Computer Science Engineering , Khanna Publishing House , UNIVERSITY RECOMMENDED
Condition Type New
Country Origin India

In stock

10

Description

In today’s time where geographical boundaries are easily covered by Internet and computers with click of a button,there are lies risks within the ecosystem.Hacking somebody’s details could lead to damages and losses.

In this book we have tried to provide a glimpse into the Technology world of the common terms and procedures used by the hackers to intrude into the system.It is a humble effort to make students understand with help of Diagram and Images the procedures through which the vulnerabilities are exploited.

It is written in simple and lucid language to be understood by one and all.

Table of Contents

PART-A. BASICS OF HACKING

Chapter 1: Introduction to Hacking

Chapter 2: Introduction to Ports & Protocols

Chapter 3: Virtualization & Introduction to Kali Linux

Chapter 4: Foot-printing

Chapter 5: Scanning

PART-B. PERFORMING THE HACK

Chapter 6: Hacking Into System

Chapter 7: Trojans & Backdoors

Chapter 8: Viruses & Worms

Chapter 9: Sniffing, Packet Analysis & Session

Chapter 10: Social Engineering

Chapter 11: Cryptography

Chapter 12: Steganogrpahy

Chapter 13: Vulnerability Assessment

Chapter 14: Deep Web & Dark Net

PART-C. ADVANCE HACKING

Chapter 15: Denial of Service

Chapter 16: Web Application & Web Server Penetration Testing

Chapter 17: Wireless Network Exploitation

Chapter 18: Additional References

Author

Harsh Bothra

Harsh Bothra is a Computer Science Engineer, Information Security Researcher & Ethical Hacker. He Authored a book Titled Hacking : Be A hacker With Ethics Recommended by MHRD, AICTE & NITTTR, Harsh is a Founder & CEO of Cyber Square info Solutions, Present Chapter Leader of OWASP Bikaner and former OWASP- Jaipur Chapter Lead for more than two years. He has been actively training students across various reputed institutions. Alongside, Harsh also works in developing software & web applications. Harsh has  a significant interest in exploring various technical domains and spreading his knowledge through online & offline mediums.</p

Average rating
4.00
1 review
5 stars
0%
4 stars
100%
3 stars
0%
2 stars
0%
1 star
0%

1 review for Hacking

  1. Deepak kumar

    Nice book and perfect besic knowledge

Add a review

Your email address will not be published. Required fields are marked *

  • 25% Mastering Hacking (The Art of Information Gathering & Scanning)

    Mastering Hacking (The Art of Information Gathering & Scanning)

    1 2 3 4 5 (0)

    908 Views
    146.25
    Buy now
  • Hacking

    Hacking

    (1)
    922 Views
    ₹199
    Buy now

You may also like…

  • 25% Mastering Hacking (The Art of Information Gathering & Scanning)

    Mastering Hacking (The Art of Information Gathering & Scanning)

    1 2 3 4 5 (0)

    908 Views
    146.25
    Buy now
  • 25% Cyber Attacks and Counter-Measures Made Simple

    Cyber Attacks and Counter-Measures Made Simple

    1 2 3 4 5 (0)

    1178 Views
    224.25
    Buy now

Recently viewed products

  • Hacking

    Hacking

    (1)
    922 Views
    ₹199
    Buy now
  • 10% Mathematics-I – Calculus and Linear Algebra (For Non Computer Science) (Marathi)

    Mathematics-I – Calculus and Linear Algebra (For Non Computer Science) (Marathi)

    1 2 3 4 5 (0)

    41073 Views
    594.00
    Buy now
  • 25% 3D Bioprinting Revolution

    3D Bioprinting Revolution

    1 2 3 4 5 (0)

    963 Views
    1,398.75
    Buy now
  • 25% Utilisation of Electric Power and Electric Traction

    Utilisation of Electric Power and Electric Traction

    1 2 3 4 5 (0)

    627 Views
    446.25
    Buy now
  • 25% Elements of Petrochemical Engineering

    Elements of Petrochemical Engineering

    (1)
    848 Views
    318.75
    Buy now
  • 25% Disaster Management

    Disaster Management

    1 2 3 4 5 (0)

    1626 Views
    221.25
    Buy now
  • 25% Digital Image Processing

    Digital Image Processing

    1 2 3 4 5 (0)

    984 Views
    371.25
    Buy now
  • 25% Data Structures & Algorithms using C

    Data Structures & Algorithms using C

    1 2 3 4 5 (0)

    2152 Views
    299.25
    Buy now
  • 25% Cryptography and Network Security

    Cryptography and Network Security

    1 2 3 4 5 (0)

    507 Views
    318.75
    Buy now
  • 25% Computer Concepts and Programming in C

    Computer Concepts and Programming in C

    1 2 3 4 5 (0)

    1336 Views
    299.25
    Buy now
X