Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
ISBN: 9780429103766
Platform/Publisher: Taylor & Francis / CRC Press
Digital rights: Users: Unlimited; Printing: Unlimited; Download: Unlimited



Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hackers can use to exploit physical access, network access, and wireless vectors. The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks.

Jesse Varsalone has been teaching for 18 years. He taught high school for eight years, five in the Baltimore City Public Schools. After teaching high school, Jesse started teaching computer classes at the Computer Career Institutes at Johns Hopkins University and Stevenson University. He currently teaches online as an adjunct professor at Champlain College in Burlington, Vermont. Jesse holds a number of certifications in the IT field.

Matthew McFadden researches, develops, and instructs network intrusion investigations. Matthew has spent several years in the field of information technology specializing in information assurance and security, network intrusion, malware analysis, and forensics. Matthew has performed research projects, consulted, and presented, and has worked in network administration. He also holds industry IT certifications.

hidden image for function call