Full description not available
S**S
Learned about Ethical hacking
This book interest me as hacking in whatever forms or ways are always out there in our digital world we lived in. True enough as the introduction of the book says, hackers can be perceived as genius or thief. So, which one is which for hackers out there? Its aim is to understand the hacking world as it really intrigues me. Hacking overview has been provided and important terms related to internet for us to better understand hacking concepts. Types of hackers were enumerated, what kind of attacks are they using, tools they use, malwares and identity theft as well. Amidst of all these global hacking world what I like about this book is that it enhance our knowledge about what ethical hacking is and how it is beneficial as well to use it as a tool to learn how to safeguard your system from fraudulent hackers or websites. This book is so informative that I gained We must equipped ourselves with enough knowledge as this is our power against fraudster.
I**D
Highly recommended
I bought this book in a promotion, but I have really learned a lot from this book, is very instructive and helpful even shows us issues such as the types of malware (Word that we see daily on the internet but who really do not know what it means) after having it read, actually understand how vulnerable we are while we browse over internet. The author gives us a well-elaborated explanation of the issues in this regard. An introduction to the world of security, is a good book for students. Highly recommended
R**J
Great book, for beginners.
Overall, a very informative book, but when it says "for beginners," it REALLY is for beginners, say, for people who generally know what a computer virus is, but never heard of terms like C++. It really is just a book that explains "what hacking is," not necessarily about how to do anything.
J**T
Most poorly-written book I have ever seen
Wow. This book is amazing... and not in a good way. It is written as if by a 12-year-old, and not one who is a good student, either; if this were handed in to a middle-school teacher, it would come back with a poor grade. Many of the sentences in the book simply don't make sense; sometimes you can guess the meaning, and sometimes you can't. For example: "This therefore requires expertise thus making technology buff to actually call 'hacking' an 'art'!" [p. 27]In other places, the author fell asleep at the keyboard or something, for example on p. 30: "There are three types of Active attacks namely: * Masquerade attacks * Replaydata thatessage modification". Um, what? Clearly something went wrong there. But it gets worse: if you keep reading, he goes on to describe FOUR active attacks (Masquerade, Replay, Message modification, and Denial of Service).So not only is the author's writing skill very poor, but it's clear the book was not looked at by a copy editor. I think this must be a self-published book... it reads like somebody spent a weekend googling the topic, and then (poorly) wrote a report, and stuck it on Amazon.Finally, it's not just the quality of the writing (and complete lack of editing) that make this book suck. The information it contains (as far as I was able to stomach reading it, at least) ranges from trivial to just plain wrong. For example, on p. 8, this claim is made: "If you are hacking into a system just to quench your curiosity, it is fine." This is a false and dangerous statement; whether you are hacking into a system without authorization, or breaking into a house or grocery store late at night, it is a crime (and a moral violation) whether you steal anything or not.It's remotely possible there's some nugget of usefulness in here somewhere, and if it were the only book in the world on cybersecurity, I guess I would muscle my way through it looking for those rare tidbits. But it's not, so my copy is headed to the recycling bin. Don't be fooled by the suspiciously large number of glowing 5-star reviews here... and don't waste your money or your time on this painfully written book.
J**N
Okay.
If this book changed its title, maybe I'd give it more stars. It is not even close to "ultimate" and does not address "how to hack." It does give an overview of hacking and some tools that could be used. If I was the editor, I would suggest to Mr. Mckinnon the following title: "Hacking: A Beginner's Primer."To be an ethical hacker one needs to understand far more than this book endeavors to explain. I would suggest to anyone interested in ethical hacking or cybersecurity to start by reading a basic text. If you read and understand "Business Data Networks and Security" (ISBN13: 9780132742931), you would be much further on your journey.Lastly, even with multiple grammatical errors, the book is readable. If you know absolutely nothing about hacking, it might make an interesting read.
A**S
I also learned that there are such things as hardware keyloggers can be used to get anyone's password quite easily. Lots of grea
The book has a lot of very valid information. It focuses not only the software approach of white-hat (good guy) hacking, but also social engineering. I learned that you should keep your passwords protected with some software, not only write on paper. I also learned that there are such things as hardware keyloggers can be used to get anyone's password quite easily. Lots of great tips in this book on how to protect yourself from the bad guys. It covers everything and all the chapters are divided up in an understandable fashion. When it comes to computer books, this book is off the charts.One final point is you might moan about the cost of securing your computer or network but if it gets breached the cost is likely to be much higher. That's especially true if you are a company or organization.
Trustpilot
Hace 3 semanas
Hace 5 días