Published by People Posts and Telecommunications Publishing Hou, 2000
ISBN 10: 7115195269 ISBN 13: 9787115195265
Seller: liu xing, Nanjing, JS, China
£ 43.93
Convert currencyQuantity: 3 available
Add to basketpaperback. Condition: New. Language:Chinese.Pages Number: 220 Publisher: Posts Telecom Press Pub. Date :2009-04. Hackers attack and defense and improve the entry is a guide for beginners to learn how to hacker attacks entry books . The book describes in detail in the prevention of hacker attacks beginners must master the basic knowledge of hacking for beginners in the defense given to the problems often encountered when a professional answer. and tells the reader through real case against a variety of technology specif.
Published by Chemical Industry Press, 2023
ISBN 10: 7122418138 ISBN 13: 9787122418135
Language: English
Seller: liu xing, Nanjing, JS, China
£ 101.17
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Language:Chinese.Paperback. Pub Date: 2023-03 Pages: 308 Publisher: Chemical Industry Press This book starts from the perspective of preventing hackers. and elaborates on the various threats that hackers can cause in the network and their offensive and defensive means. including the causes of threats. how to exploit vulnerabilities to invade. how to control computers and obtain information. and how to enhance system security. how to avoid threats or minimize losses. This book is divided into .
Published by Electronics Industry Publishing House, 2007
ISBN 10: 7121125528 ISBN 13: 9787121125522
Language: Chinese
Seller: liu xing, Nanjing, JS, China
£ 49.02
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Paperback. Pub Date: 2011 Pages: 247 Language: Chinese in Publisher: Electronic Industry Press hacker attack and defense entry starting from the the hacker needs of novice and learning habits hacker basic knowledge. information gathering. vulnerability scanning. hackers commonly used commands and tools. Windows system vulnerabilities to prevent password attack and defense. remote control offense and defense. the Trojans offense and defense. network attack and defense. QQ and E-mail offensive .
Published by Tsinghua University Press Pub. Date :2009-7-1, 2000
ISBN 10: 7302194610 ISBN 13: 9787302194613
Language: Chinese
Seller: liu xing, Nanjing, JS, China
£ 49.02
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Paperback. Pub Date: 2009 07 Pages: 262 Language: Chinese in Publisher: Tsinghua University Press the computer hacker offensive and defensive entry (2) focuses on the basics of the most popular hacker attack and defense. and operation as well as a variety of applications instance. the main contents include contact hacker attacks. commonly used hacking tools. installation and remove Trojans. QQ offense and defense. invasion and protect the operating system. attack and protection IE browser. sp.
Published by Machinery Industry Press, 2000
ISBN 10: 7111398084 ISBN 13: 9787111398080
Language: Chinese
Seller: liu xing, Nanjing, JS, China
£ 53.92
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date: December 2012 Language: Chinese in Publisher: China Machine Press Whether you are an ordinary computer enthusiasts. employees. or the civil service. the Internet and our lives. work and study closely contacted with and played an increasing role. However. the presence of hackers allows each computer in the Internet at any time in the edge of danger. Novice to learn hacker attack and defense Getting Started hacker attack and defense guide for beginners to learn introductory books. the book describes in detail the intrusion means and tools hackers often use to show the whole process of hacking in front of the reader. At the same time explain the readers must master the basics of defense these attacks. the use of the methods and steps to help the reader in the process of starting detours. The book is divided into 13 chapters. each depicting a hacker attack and defense basics. hacking prelude - sniffing and scanning. virus. Trojan implanted with Clear. remote control technology. network attacks and spoofing. hackers occult tracking technology offensive and defensive combat vulnerability of offensive and defensive combat. pages of offensive and defensive combat. mail. QQ offensive and defensive combat. LAN offensive and defensive combat. system cleanup and security performance upgrade. system security and defense technology content. Tips book supporting explanation. in the form of questions and answers are listed at the end of each chapter the problems encountered in actual combat with the hacker attack and defense related to this section. Novice to learn. hacker attack and defense entry especially for entry-level users to learn hacker attack and defense. both personal computer enthusiasts and technical personnel of enterprises. or government agency personnel. The book can also be used as a computer maintenance management or technical reference books for college students and teachers. Contents: Preface Chapter 1 hacker attack and defense basics 1.1 understanding the hacker the 1.2 network attacks foundation - understanding of network protocols 1.2.1-Fi standard interface - TCPIP protocol 1.2.2 ARP spoofing attacks must know - 1.2.3 ARP protocol flood attack must know - ICMP protocol 1.3 hacker must pass through two doors - IP address and port 1.3.1 IP address and port Overview 1.3.2 set close port 1.4-awareness system processes IP address view port 1.3.3 1.3.4 1.4.1 Overview 1.4.2 Close new system processes 1.5 hackers used the DOS system processes use the ping command to view network connections command 1.5.1 1.5.2 1.5.4 using the net command netstat command to detect using the ipconfig command to view the current port 1.5.3 TCPIP configuration The management network environments novice Frequently Asked Questions 1. What conditions need to meet to become a hacker? 2. What is the SMTP protocol? 3. The possibility of using the Task Manager window shutdown? 4. How to use the telnet command for remote login? Chapter 2 hacked prelude 2.1 build virtual environment - sniffing and scanning the new virtual machine install VMware virtual machine operating system 2.2 hackers used sniffer tools 2.2.1 2.1.2 Sniffer Pro 2.1.1 on VMware the intercepted packet 2.2.2 Monitoring Network Video Detective 2.3 hackers scan port essential tool 2.3.1 port scanning principle 2.3.2 X-Scan scanner 2.3.3 SuperScan scanner novice FAQs. How to install VMware in the VMware Tools? 2. How to get the LAN IP address of the destination host? 3. Ability to view their location based on IP address? 4. The common way to prevent sniffing what? Chapter 3 Trojan virus implanted Clear 3.1 concept 3.1.1 Trojan Trojan works 3.1.2 common Trojan Category 3.2 recognize virus 3.2.1 the viral Overview 3.2.2 virus works making method 3.4 3.3 bundled Trojans understanding of glacier computer Trojan horse virus trojan works 3.5 against common measures 3.5.1 3.5.
Published by Scientific publishing, 2013
ISBN 10: 7030363434 ISBN 13: 9787030363435
Language: Chinese
Seller: liu xing, Nanjing, JS, China
£ 58.12
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date :2013-04-01 Pages: 614 Publisher: Science Press New Century Bookstore : Computer security and hacker attack and defense from entry to the master ( premium upgrade version ) for the needs of beginners . comprehensive. and explain in detail computer security and hacker attack and defense of the specific methods of operation. troubleshooting problems and practical skills . New Century Bookstore : Computer security and hacker attack and defense from entry to the master ( premi.Four Satisfaction guaranteed,or money back.
Published by Tsinghua University Press, 2000
ISBN 10: 7302216673 ISBN 13: 9787302216674
Language: Chinese
Seller: liu xing, Nanjing, JS, China
£ 58.24
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Paperback. Pub Date: November 2010 Pages: 350 in Publisher: Tsinghua University Press book is a book about the hacker attack and defense. the main contents include preparatory work before the hackers basics. use of hacking tools. hacker attacks. vulnerabilities offensive and defensive and password offensive and defensive. instant messaging tools qq and msn offensive and defensive. e-mail. offensive and defensive. arp spoofing attack and defense. the Trojans offense and defense. RMON offense a.
Published by People Post Press Pub. Date :2010-04, 2000
ISBN 10: 7115222304 ISBN 13: 9787115222305
Language: Chinese
Seller: liu xing, Nanjing, JS, China
£ 59.64
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Paperback. Pub Date: 2010 Pages: 344 in Publisher: People's Posts and Telecommunications Press book is a guide for beginners to learn the hacker attack and defense introductory books. The book details the beginners must master the basics with hacker attacks. the use of methods and steps. expert guidance and the problems often encountered by beginners guard against hackers and computer security settings avoid beginners detours in the process of starting. The book is divided into 12 chapters. e.
ISBN 10: 7121114720 ISBN 13: 9787121114724
Seller: liu xing, Nanjing, JS, China
£ 47.76
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Paperback. Pub Date: 2010 Pages: 243 Language: Chinese in Publisher: Publishing House of Electronics Industry. a new computer classroom: a hacker attack and defense Getting Started from the the family primary computer user should be aware of and to master the basic knowledge and basic operation starting Details of the basis of all aspects of the computer operating knowledge. Book is a total of 13 chapters. including home computer use. Windows7 basic operations. manage the files in your comput.
Published by Tsinghua University Press, 2014
ISBN 10: 7302334293 ISBN 13: 9787302334293
Language: Chinese
Seller: liu xing, Nanjing, JS, China
£ 61.47
Convert currencyQuantity: 3 available
Add to basketpaperback. Condition: New. Paperback. Pub Date :2014-01-01 Pages: 384 Language: Chinese Publisher: Tsinghua University Press. computer science from entry to master: New hacker attack and defense from entry to the master (with DVD-ROM disc 1) to common hacking software and hacking programming-based. progressive approach to explain the use of technology for computer hackers sniffing the appropriate information. scan. attack and records and other related knowledge. The book is divided into four. starting from the way the .
ISBN 10: 7111188705 ISBN 13: 9787111188704
Seller: liu xing, Nanjing, JS, China
£ 50.55
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Paperback. Pub Date: 2006 05 of Pages: 336 in Publisher: Machinery Industry Press kill broken wolf: hacker attack and defense Cheats Getting Started graphic explanation of the most user-friendly. even novice computer users can easily read through; progressive approach hacking software to explain in detail the way the Secret hacker attacks; inventory of new hacking techniques. allowing users to pre-emptive; offensive and defensive interaction parameters defense. to ensure that the user's netwo.
ISBN 10: 7113145094 ISBN 13: 9787113145095
Seller: liu xing, Nanjing, JS, China
£ 55.44
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. The paperback. Pub Date: 2012 07 Pages: 229 Language: Chinese in Publisher: China Railway Press super eager to learn! Hacker attack and defense entry (100%) of the full schematic diagrams show from two different angles of the attack and defense. introduced hacking tools introduced based on the corresponding preventive measures. The book includes: Getting Started hacker attack and defense. information gathering. sniffing and scan Windows system security vulnerabilities. offensive and defensive.
Published by Tsinghua University Press, 2015
ISBN 10: 7302398674 ISBN 13: 9787302398677
Language: Chinese
Seller: liu xing, Nanjing, JS, China
£ 74.88
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Language:Chinese.Paperback. Pub Date: 2015-6-1 Pages: 426 Publisher: Tsinghua University Press. edited Shaoxia Fun hacker attack and defense from entry to the master (the latest example of real Version) easy to difficult. step by step introduction to hacking attack and defense basics of hacking attacks and application techniques. including the implementation of the basic knowledge and prevention of hacker entry. scanning and sniffing. prevent and remove computer viruses. prevent and remove co.
Published by Machinery Industry Press, 2015
ISBN 10: 7111497872 ISBN 13: 9787111497875
Language: Chinese
Seller: liu xing, Nanjing, JS, China
£ 75.44
Convert currencyQuantity: 3 available
Add to basketpaperback. Condition: New. Language:Chinese.Paperback. Pub Date: 2015-5-1 Pages: 399 Publisher: Machinery Industry Press book consists of 19 chapters with case. progressive. systematic and comprehensive introduction to the hacker attack and defense technology. covering: scratch understanding hackers. scanning and sniffing information system vulnerabilities offensive and defensive. offensive and defensive viruses. Trojans offensive. phone hacking attack and defense. offense and defense online games and Internet cafes. p.
ISBN 10: 7301278349 ISBN 13: 9787301278345
Seller: liu xing, Nanjing, JS, China
£ 60.91
Convert currencyQuantity: 3 available
Add to basketpaperback. Condition: New. Language:Chinese.Paperback. Pub Date: 2017-01-01 Pages: 368 Publisher: Peking University press. the hacker attack and defense from entry to master (social engineering). the main contents include basic knowledge of the hacker attack and defense. Windows command line in the foundation. the commonly used Windows network hacker command. common way of hacking attacks. scanning and sniffing attack. virus.
ISBN 10: 7115479569 ISBN 13: 9787115479563
Seller: liu xing, Nanjing, JS, China
£ 66.80
Convert currencyQuantity: 5 available
Add to basketpaperback. Condition: New. Paperback. Pub Date: 2018-05-01 Pages: 327 Language: Chinese Publisher: people's posts and telecommunications publishing house This book mainly introduces the basic knowledge and analysis related to the hacker attack and defense.Distinguished interpretation of the book include the preparation before the hacker attack and defense. defensive. system vulnerability scanning and sniffing attack and defense. password. defensive and offensive and defensive. virus Trojan attack and defense. etc.Tong.
ISBN 10: 7830025436 ISBN 13: 9787830025434
Seller: liu xing, Nanjing, JS, China
£ 66.87
Convert currencyQuantity: 5 available
Add to basketpaperback. Condition: New. Language:Chinese.Paperback. Pub Date: 2017-11-01 Pages: 320 Publisher: Beijing hope electronic publishing house the hacker attack and defense from entry to master according to the law from easy to difficult. step by step and the main knowledge comprehensively introduces the hacker attack and defense. covers the understanding the hacker. the hacker attack and defense preparation. defensive. operating system vulnerability scanning and sniffing attack and defense. password. defensive and offensi.
ISBN 10: 7301278497 ISBN 13: 9787301278499
Seller: liu xing, Nanjing, JS, China
£ 67.89
Convert currencyQuantity: 3 available
Add to basketpaperback. Condition: New. Language:Chinese.Paperback. Pub Date: 2017-01-01 Pages: 432 Publisher: Peking University press. the hacker attack and defense from entry to master (Web scripting. brand new. updated version) the hacker attack and defense knowledge was introduced in detail. emphasis on common methods for invasion.Main contents include: introduction to hackers knowledge base. the hacker's attack. Windows programming and network.
ISBN 10: 7301279035 ISBN 13: 9787301279038
Seller: liu xing, Nanjing, JS, China
£ 74.88
Convert currencyQuantity: 3 available
Add to basketpaperback. Condition: New. Language:Chinese.Paperback. Pub Date: 2017-01-01 Pages: 532 Publisher: Peking University press. the hacker attack and defense from entry to master (Web technology of actual combat) from the Web application security hidden danger and reasons. this paper introduces in detail the basis of Web security. such as HTTP. session management. the same-origin policy. etc.Also focus on the Web the application of the.
ISBN 10: 7301280319 ISBN 13: 9787301280317
Seller: liu xing, Nanjing, JS, China
£ 74.88
Convert currencyQuantity: 3 available
Add to basketpaperback. Condition: New. Language:Chinese.Paperback. Pub Date: 2017-02-01 Pages: 524 Publisher: Peking University press. the hacker attack and defense from entry to master (for encryption and decryption) 1. illustrated to represent the various computer and mobile phone safety related knowledge.Of 22 chapters of the book. social engineering. computer and network foundation. from black Windows 10.
ISBN 10: 7301277768 ISBN 13: 9787301277768
Seller: liu xing, Nanjing, JS, China
£ 74.88
Convert currencyQuantity: 3 available
Add to basketpaperback. Condition: New. Language:Chinese.Paperback. Pub Date: 2016-12-01 Pages: 536 Publisher: Peking University press. the hacker attack and defense from entry to master (for encryption and decryption) 1. illustrated recreates the computer security knowledge.The main content of chapter 15. respectively encryption software encryption technology. basic knowledge. basic knowledge of encryption algorithm and decryption. cracking techniques.
ISBN 10: 7111654927 ISBN 13: 9787111654926
Seller: liu xing, Nanjing, JS, China
£ 80.22
Convert currencyQuantity: 3 available
Add to basketpaperback. Condition: New. Language:Chinese.Paperback. Pub Date: 2020-05-01 Pages: 332 Publisher: Machinery Industry Press This book focuses on hacker commands and practical applications. It analyzes the commands commonly used in hacker intrusions. and facilitates readers to form network intrusion prevention technologies. System understanding can better prevent hacker attacks.?The book is divided into 12 chapters. including: first acquaintance with hackers. command lines in Windows systems. Windows network command line.
Seller: liu xing, Nanjing, JS, China
£ 155.67
Convert currencyQuantity: 3 available
Add to basketpaperback. Condition: New. Language:Chinese.Paperback.Pub Date:2014-04-01 Publisher: Mechanical Industry Press Brief introduction of Computer learning from entry to proficiency: hacker attack and defense from entry to proficiency comprehensively and detailedly introduces the basic knowledge of hacker attack and defense. mainly including the pre-hacker attack and defense Preparatory work. scanning and attack and defense. Windows system vulnerability attack and defense. password attack and defense. virus attack and defen.
ISBN 10: 711165465X ISBN 13: 9787111654650
Language: Chinese
Seller: liu xing, Nanjing, JS, China
£ 87.20
Convert currencyQuantity: 3 available
Add to basketpaperback. Condition: New. Paperback. Pub Date: 2020-05-01 Pages: 352 Language: Chinese Publisher: Mechanical Industry Press Hacker Attack and Defense From Entry to Proficiency (Trick Edition) 2nd Edition with pictures. emoticons. annotations. guide wireframes. etc. Rich graphical means. supplemented by easy-to-understand language. detailed introduction to each knowledge point. and introduced the use of related representative products and tools. so that readers can actively protect against network security and hacker i.