The cover image may be different.

ABCD of Hacking: The Beginner's Guide

K, Shashank Pai (Author)
Rp 137,000
No Hidden Cost

Or   274 PEC Points

New Free Shipping.
* Terms and Conditions
Delivered in 10 - 20 business days


Publication Date: -

Ever wondered how the computer hacks or website hacks happen? What constitutes a website hack?How come a Computer, which in layman circle, usually seen as a 'Perfect' machine doing computations or calculations at the lightning speed, have security vulnerabilities? Can't all websites be safe and secure always? If you have all these innocent doubts in your mind, then this is the right book for you, seeking answers in an intuitive way using layman terms wherever possible

There are 7 different chapters in the book. The first three of them set up the ground basics of hacking, next three of them discuss deeply the real hackings i.e. the different types of handpicked well-known web attacks and the last chapter that sums up everything. Here is the list of chapters:

1)Introduction: A brief discussion on workings of computers, programs, hacking terminologies, analogies to hacks. This chapter addresses the role of security in a software.

2)A Simplest Hack: To keep the reader curious, this chapter demonstrates the simplest hack in a computer program and draws all the essential components in a hacking. Though this is not a real hacking yet, it signifies the role of user input and out of box thinking in a nutshell. This chapter summarizes what a hack constitutes.

3)Web Applications: As the book is about website hacks, it would not be fair enough if there is no content related to the basics, explaining components of a website and the working of a website. This chapter makes the user ready to witness the real website hackings happening from the next chapter.

4)The SQL Injection: Reader's first exposure to a website attack SQL injection is most famous cyber-attack in Hackers' community. This chapter explains causes, the way of exploitation and the solution to the problem. Of course, with a lot of analogies and intuitive examples

5)Cross-site Scripting: Another flavor of attacks As usual, the causes, way of exploitation and solution to the problem is described in simple terms. Again, with a lot of analogies

6)Cross-site Request Forgery: The ultimate attack to be discussed in the book. Explaining why it is different from previous two, the causes, exploitation, solution and at the end, a brief comparison with the previous attack. This chapter uses the terms 'Check request forgery' and 'Cross Bank Plundering' sarcastically while drawing an analogy

7)Conclusion: This chapter sums up the discussion by addressing questions like why only 3 attacks have been described? why can't all websites be secure always? The chapter ends by giving a note to ethical hacking and ethical hackers.

Product Details

ISBN-10: 1987421345

ISBN-13: 9781987421347

Publisher: Createspace Independent Publishing Platform       

Language: English

Age Range: NA - NA years

Grade Level: NA - NA

Paperback: 114 Pages

Product Dimension (L x W x H): 22.86 x 15.24 x 0.69 CM

Shipping Weight: 0.18 Kg

Customer Reviews

Share your thoughts with other customers:
Write a Customer Review

There are no reviews for this product.





Customers who bought this also bought


View Mobile / Standard © 2011-2020 Periplus Holdings Ltd.