Paperback: 174 pages
Publisher: CreateSpace Independent Publishing Platform; 2 edition (May 25, 2015)
Product Dimensions: 6 x 0.4 x 9 inches
Shipping Weight: 5.6 ounces (View shipping rates and policies)
Average Customer Review: 4.6 out of 5 stars See all reviews (67 customer reviews)
Best Sellers Rank: #268,353 in Books (See Top 100 in Books) #63 in Books > Computers & Technology > Security & Encryption > Viruses #203 in Books > Computers & Technology > Internet & Social Media > Hacking
not worth 99 cents, so glad I got it for free with Kindle unlimited. The author provides a few one paragraph examples of recent intrusions and provides a few reasons people hack. But the reasons, stealing, boredom, disruption, financial gain and ethical hacking are only a few sentences each with no depth. Finally his attempt to explain how to learn hacking is terrible. Basically he says to learn linux, some programming languages, and html. He doesn't even mention basic networking concepts such as scanning, port numbers, services, credentials, passwords, hashes, etc, which are way more important than programming languages or html. Don't waste your time or money!
I got this book so as to give myself an intuition of how dangerous or how easy can anyone access information. With all activities that give us almost unlimited freedom in the internet, there are risks since the Internet is so easily accessible to anyone with the skills to do so and it can be a dangerous place.This book is very useful for those who like to learn about hacking and how it is done. It tells some other interesting stories about the most famous hacks that happened in the past. I found an interesting part where it explains how your email can be hacked and this actually happened to one of my friend's email; I got an email from him saying that he was on vacation but had lost everything and needed an immediate monetary help.As I was getting ready to find a way to help, I mentioned it to my other friend who told me to call direct and see if the email was genuine; and lucky enough when I called, my friend was at work. This book mentions similar cases and much more.I figured; -in this internet-age I will be better-of if I understand a little on how hackers work and how to protect my information as this book advice.
I wanted to know some more effective way to protect my private information and how to create stronger passwords, searching in the library I got this book on special offer, helped me to better understand how hackers works and how can I protect more effectively of the malwares.I have always been wanted to know about hacking and its procedure. Come this book which gives me a lot of information which made me more interested about hacking! This is really cool! I like the tips provided on this book and the explanation provided about hacking and different types of hacking. Very interesting book. I have always thought hacking was a bad thing, but this book has changed my perspective. This is a very informative book, and after reading it for a bit, I now know some basic hacking skills that work. This book also shows you many ways you can do things, like cracking a password.
Conclusively, this book is not meant to offer the idea of hacking as a way to maliciously harm other people's devices. Rather, the knowledge of hacking could simply put someone at a better edge in securing information and protecting his or her device from potential hackers. The first phase of this book discusses hacking techniques which seem quite complicated to me. Perhaps, i just don't have a flair for computer programming languages. The guidelines and tips on how to secure one's device are discussed in the latter part of this book. And I am very interested to learn this part. As a bonus, there is a second book that has been attached to this one which discusses cyber security. This is an interesting topic as well, especially that there are a lot of potential threats on the internet today. The knowledge that I gain from this book has substantially given me more confidence in exploring the world of computers and the internet.
Reading about hacking techniques and knowing how they can get to our private information was pretty interesting and it always helps to know how to prevent these hackers from accessing our information. Especially when most of these techniques depends on little drawbacks or weak spots in the software that we use. Where these techniques can be easily protected against if you know about it. This book is very useful for those who like to learn about hacking and how it is done along with some other interesting stories about the most famous hacks that happened in the past. Computer hacking is not reserved for geeks or nerds who spent their entire day in front of their PC. Regular people with standard schedules and lives are also gaining interest in this field. This book also explains hacking clearly so that you can safely and legally learn how to hack, as well as what to watch out for when dealing with hackers.
This is absolutely incredible book! It really caught my attention. Firstly, I just want to know stuff about hacking. Secondly, because I want to try it on my very own account. And wow! I guess hacking is not bad at all. It always comes on our mind the negative part of hacking. There is goodness in every creation as they say. This is very good book. It teaches me a lot on Cyber Security. I was able to know how to protect my own cyber activities. Chapter 9 : Cyber Security Techniques in Use Today is one of my favorite chapter in this book.Good job Walter Spivak!
The main reason why this book caught my attention is that I am so curious of what hackers do, how they are able to get information from people and what is the reason behind all those hacking. This book discusses the answers to my curiosity. Also, not because you wanted to know how to hack means that you wanted to gain something from hacking. This book is about ethical hacking and yes that does truly exists it covers all you need to know the licenses and certificates you should get. It also helps the average user know how hackers do what they do and how you can prevent yourself from becoming a victim of their online activities.
Hacking: Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide Hacking: How to Computer Hack: An Ultimate Beginner's Guide to Hacking (Programming, Penetration Testing, Network Security) (Cyber Hacking with Virus, Malware and Trojan Testing) Hacking: The Ultimate Beginners Guide (Computer Hacking, Hacking and Penetration, Hacking for dummies, Basic security Coding and Hacking) (Hacking and Coding Book 1) How to Create and Manage a Facebook Page: Creating and Managing a Facebook Page Hacking: Beginner's Guide to Computer Hacking, Basic Security, Penetration Testing (Hacking, How to Hack, Penetration Testing, Basic security, Computer Hacking) Hacking: How to Hack Computers, Basic Security and Penetration Testing (Hacking, How to Hack, Hacking for Dummies, Computer Hacking, penetration testing, basic security, arduino, python) The Most Famous Speeches of Abraham Lincoln: The History of the Cooper Union Address, the Gettysburg Address, and the Second Inaugural Address Hacking: Ultimate Hacking for Beginners, How to Hack (Hacking, How to Hack, Hacking for Dummies, Computer Hacking) Hacking: Wireless Hacking, How to Hack Wireless Networks, A Step-by-Step Guide for Beginners (How to Hack, Wireless Hacking, Penetration Testing, Social ... Security, Computer Hacking, Kali Linux) Hacking: The Ultimate Beginners Guide (Hacking, How to Hack, Hacking for Dummies, Computer Hacking, Basic Security) Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense (Advances in Information Security) Hacking University: Sophomore Edition. Essential Guide to Take Your Hacking Skills to the Next Level. Hacking Mobile Devices, Tablets, Game Consoles, and ... (Hacking Freedom and Data Driven Book 2) Hacking University: Freshman Edition Essential Beginner's Guide on How to Become an Amateur Hacker (Hacking, How to Hack, Hacking for Beginners, Computer ... (Hacking Freedom and Data Driven Book 1) HACKING: Learn Hacking FAST! Ultimate Course Book For Beginners (computer hacking, programming languages, hacking for dummies) Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition The B2B Social Media Book: Become a Marketing Superstar by Generating Leads with Blogging, LinkedIn, Twitter, Facebook, Email, and More Wireless Hacking: How To Hack Wireless Network (How to Hack, Wireless Hacking, Penetration Testing, Social ... Security, Computer Hacking, Kali Linux) Email Marketing Mastery: The Step-By-Step System for Building an Email List of Raving Fans Who Buy From You and Share Your Message You Need A Rush Limbaugh Email Address IPv6 Address Planning: Designing an Address Plan for the Future