Hacking with Kali Linux: A Step by Step Guide for You to Learn the Basics of Cybersecurity and Hacking
暫譯: 使用 Kali Linux 進行駭客攻擊:學習網路安全與駭客基礎的逐步指南

Nastase, Ramon

  • 出版商: Independently Published
  • 出版日期: 2018-10-15
  • 售價: $670
  • 貴賓價: 9.5$637
  • 語言: 英文
  • 頁數: 176
  • 裝訂: Quality Paper - also called trade paper
  • ISBN: 1728899907
  • ISBN-13: 9781728899909
  • 相關分類: 資訊安全kali-linuxLinux駭客 Hack
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

Ever wondered how a Hacker thinks? Or how you could become a Hacker?


This book will show you how Hacking works. You will have a chance to understand how
attackers gain access to your systems and steal information. Also, you will learn what you
need to do in order to protect yourself from all kind of hacking techniques.


Structured on 10 chapters, all about hacking, this is in short what the book covers in its
pages:

  • The type of hackers
  • How the process of Hacking works and how attackers cover their traces
  • How to install and use Kali Linux
  • The basics of CyberSecurity
  • All the information on malware and cyber attacks
  • How to scan the servers and the network
  • WordPress security & Hacking
  • How to do Google Hacking
  • What's the role of a firewall and what are your firewall options
  • What you need to know about cryptography and digital signatures
  • What is a VPN and how to use it for your own security

Get this book NOW. Hacking is real, and many people know how to do it. You can protect
yourself from cyber attacks by being informed and learning how to secure your computer and
other devices.

Tags: Computer Security, Hacking, CyberSecurity, Cyber Security, Hacker, Malware, Kali Linux, Security, Hack, Hacking with Kali Linux, Cyber Attack, VPN, Cryptography

商品描述(中文翻譯)

你是否曾經想過駭客是如何思考的?或者你如何能成為一名駭客?

這本書將向你展示駭客攻擊的運作方式。你將有機會了解攻擊者如何獲得對你系統的訪問權限並竊取信息。此外,你還將學習如何保護自己免受各種駭客技術的侵害。

本書共分為10章,全部關於駭客攻擊,以下是本書內容的簡要概述:

  • 駭客的類型

  • 駭客攻擊的過程是如何運作的,以及攻擊者如何掩蓋他們的痕跡

  • 如何安裝和使用Kali Linux

  • 網路安全的基本知識CyberSecurity

  • 有關惡意軟體和網路攻擊的所有信息

  • 如何掃描伺服器和網路


  • WordPress安全與駭客攻擊

  • 如何進行Google Hacking

  • 防火牆的角色以及你的防火牆選項

  • 你需要了解的加密技術和數位簽名

  • 什麼是VPN以及如何使用它來保護自己
  • 立即獲得這本書。駭客攻擊是真實存在的,許多人知道如何進行。你可以通過獲取信息和學習如何保護你的電腦及其他設備來防範網路攻擊。

    標籤:電腦安全、駭客攻擊、網路安全、駭客、惡意軟體、Kali Linux、安全、駭客、使用Kali Linux進行駭客攻擊、網路攻擊、VPN、加密技術