Networking Hacking (inbunden)
Fler böcker inom
Inbunden (Hardback)
Antal sidor
Jordan Editors
Color illustrations
229 x 152 x 16 mm
513 g
Antal komponenter
1314:Standard Color 6 x 9 in or 229 x 152 mm Case Laminate on White w/Gloss Lam
Networking Hacking (inbunden)

Networking Hacking

2 Books in 1: Networking for Beginners, Hacking with Kali Linux - Easy Guide to Learn Cybersecurity, Wireless, LTE, Networks, and Penetration Testing

Inbunden Engelska, 2021-02-15
  • Skickas inom 10-15 vardagar.
  • Gratis frakt inom Sverige över 159 kr för privatpersoner.
  • Köp nu, betala sen med
Finns även som
Visa alla 3 format & utgåvor
55% OFF for Bookstores! Discounted Retail Price

If you want to learn more about Networking, Computer Programming, and Hacking, to protect your system, this book set can help you!


The book includes:


NETWORKING for Beginners:

 The book covers an overview of different types of cyber-attacks, the steps to follow to prevent attackers from targeting your system and infect your files.

You will learn the difference between prevention measures and mitigation measures relevant to cyber-attacks. This way, you will have a clear understanding of how to deal with cyber-attacks and get general prevention methods to protect your system against possible threats to your data.


You will find:

      Different types of cyber-attacks

      Basic of computer networks


      Basic of machine learning

      Cybersecurity fundamentals

      Common types of cyber-attacks

      Information Technology, wireless, and LTE

      And more...


Visa hela texten

Passar bra ihop

  1. Networking Hacking
  2. +
  3. Computer Programming

De som köpt den här boken har ofta också köpt Computer Programming av Dylan MacH (inbunden).

Köp båda 2 för 798 kr


Har du läst boken? Sätt ditt betyg »

Fler böcker av Dylan MacH



chapter 1:

introduction to machine learning and computer networking

chapter 2:

properties of a computer network

chapter 3:

easy guide to learn basic computer network

chapter 4:

what are the basic cybersecurity fundamentals?

chapter 5:

what are the concepts of networking?

chapter 6:

information tech guide

chapter 7:

what are the best network monitoring tools?

chapter 8:

types of firewall

chapter 9:

understanding cybersecurity

chapter 10:

types of cyber-attacks and how to prevent them


chapter 1: definition of hacking and types of hackers

chapter 2: cybersecurity

chapter 3: types of cyber attacks

chapter 4: types of malware

chapter 5: how the hacking process works

chapter 6: why hackers use linux

chapter 7: kali linux installation and updates

chapter 8: installing kali linux on virtual machine

chapter 9: how to organize kali linux

chapter 10: scanning (nmap, massscan, hping3) and managing networks (wireshark)

chapter 11: firewalls

chapter 12: obtaining user information: maltego, scraping, shodan/

chapter 13: kali linux on portable devices like raspberry pi

chapter 14: malduino

chapter 15: kismet

chapter 16: bypassing a hidden ssh

chapter 17: bypassing a mac address authentication and open authentication

chapter 18: hacking wpa and wpa2

chapter 19: secure and anonymous using tor, proxy chains, and vpn

chapter 20: ip spoofing

chapter 21: penetration testing with metasploit