Steal This Computer Book 4.0. What They Won't Tell You About the Internet

Par : Wallace Wang
Offrir maintenant
Ou planifier dans votre panier
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
  • Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
  • Compatible avec une lecture sur liseuses Vivlio
  • Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
Logo Vivlio, qui est-ce ?

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement

Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
C'est si simple ! Lisez votre ebook avec l'app Vivlio sur votre tablette, mobile ou ordinateur :
Google PlayApp Store
  • Nombre de pages384
  • FormatePub
  • ISBN1-59327-343-6
  • EAN9781593273439
  • Date de parution06/05/2006
  • Protection num.pas de protection
  • Taille6 Mo
  • Infos supplémentairesepub
  • ÉditeurNo Starch Press

Résumé

If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself.
Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information.
Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover:-How to manage and fight spam and spyware-How Trojan horse programs and rootkits work and how to defend against them-How hackers steal software and defeat copy-protection mechanisms-How to tell if your machine is being attacked and what you can do to protect it-Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside-How corporations use hacker techniques to infect your computer and invade your privacy-How you can lock down your computer to protect your data and your personal information using free programsIf you've ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated.
As the saying goes, just because you're paranoid doesn't mean they aren't after you. And, as Wallace Wang reveals, they probably are.
If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself.
Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information.
Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover:-How to manage and fight spam and spyware-How Trojan horse programs and rootkits work and how to defend against them-How hackers steal software and defeat copy-protection mechanisms-How to tell if your machine is being attacked and what you can do to protect it-Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside-How corporations use hacker techniques to infect your computer and invade your privacy-How you can lock down your computer to protect your data and your personal information using free programsIf you've ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated.
As the saying goes, just because you're paranoid doesn't mean they aren't after you. And, as Wallace Wang reveals, they probably are.
Office 2021 Pour les Nuls
Wallace Wang
E-book
11,99 €
Office 2019 pour les nuls
Wallace Wang
E-book
9,99 €
Office 2016 pour les nuls
Wallace Wang
E-book
9,99 €
Office 2013 pour les Nuls
Wallace Wang
E-book
9,99 €
Office 2010 pour les Nuls
Wallace Wang
E-book
16,99 €