PDA

View Full Version : HOT! Ebook hacker attack



soholo
07-07-2010, 20:32
Part 1 Hackers, Crackers, and Whackers . . . . . . . . . . . . . . . . . . . . . . . . . . 1
CHAPTER 1 Danger on the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
CHAPTER 2 Phone Phreaks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
CHAPTER 3 Hackers, Crackers, and Whackers . . . . . . . . . . . . . . . . . . . . . . 19
CHAPTER 4 Bypassing Passwords and Doing the Rat Dance . . . . . . . . . . . 31
CHAPTER 5 The Venus Flytrap and Other Anti-Hacks . . . . . . . . . . . . . . . 41
CHAPTER 6 Between a Rock and a Hard Place . . . . . . . . . . . . . . . . . . . . . . 49
CHAPTER 7 The Dangers of High-Speed Connections . . . . . . . . . . . . . . . . 59
CHAPTER 8 How to Protect Your Exposed Broadband . . . . . . . . . . . . . . . . 65
PART 2 Personal Privacy.. . . . . . . . . . . . . . . . . . . . . . . 77
CHAPTER 9 Internet Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
CHAPTER 10 The Elements of Cryptography . . . . . . . . . . . . . . . . . . . . . . . . 99
CHAPTER 11 The Great Leap Forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
CHAPTER 12 The Computer Steps In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
CHAPTER 13 Infinite Monkeys: Brute Force Attacks and
Other Curiosities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
CHAPTER 14 DES: A Public Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
CHAPTER 15 Making Keys Public. . . . . . . . . . . . . . . . . . . . . . . 151
CHAPTER 16 Electric Signatures . . . . . . . . . . . . . . . . . . . . . . . 163
CHAPTER 17 Encryption Implementations in Windows 2000 . . . . . . . . . . 171
CHAPTER 18 Hiding Data in Photon Streams . . . . . . . . . . . . . . . . . . . . . . . 191
CHAPTER 19 The Perfect, Unbreakable Encryption System . . . . . . . . . . . . 201
Contents at a Glance xi
Part 3 Viruses. . . . . . . . . . . . . . . . . . . . . . 221
CHAPTER 20 The Great Worm Escapes . . . . . . . . . . . . . . . . . . . . . . . . 223
CHAPTER 21 Logic Bombs,Worms, and Trojan Horses—
The Varieties of Viruses . . . . . . . . . . . 233
CHAPTER 22 How Melissa Changed the Rules . . . . . . . . . . . . . . . . . . . . . . 243
CHAPTER 23 Documents that Attack (and What You Can
Do to Protect Yourself ). . . . . . . . . . 259
CHAPTER 24 Prevention, Detection, and Elimination . . . . . . . . . . . . . . . . 271
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . 283

link download:

http://shareflare.net/download/5680.c56c25c3a37c3cd2f51e8aff0/Hacker_Attack.pdf.html
note :chọn free để download nha!