Computer hacking is arguably the greatest threat posing intelligence agencies. Computer hacking involves the unauthorized breaching or exploitation of computer defenses such as entry, insertion, control, corruption, theft or any illegal activity conducted on a computer system, server, network or software. Computer hacking is the largest contemporary threat facing the stability of computer systems, the infrastructure that these systems control or the national security of the countries involved. This books discusses White Hat, Black Hat, Grey Hat, Blue Hat and Hacktivism categories. Techniques such as vulnerability scanning, brute force attack, password cracking, packet analyzing, spoofing attack or phishing, using a Rootkit, social engineering, Trojan horses, computer viruses and worms, backdoors, spyware, keystroke logging and cyberterrorism. This book is designed to be a state of the art, superb academic reference work and provide an overview of the topic and give the reader a structured knowledge to familiarize yourself with the topic at the most affordable price possible. The accuracy and knowledge is of an international viewpoint as the edited articles represent the inputs of many knowledgeable individuals and some of the most current knowledge on the topic, based on the date of publication.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.