Facebook
Hazte fan en Facebook
Hazte fan nuestro en Facebook

Haz clic aquí

share
Recomiéndanos
Listo para su envío en menos de 24 horasUn mes gratis
trustedshops logo header

Steal this Computer Book 4.0

This non-technical book examines what hackers do, how they do it, and how you can protect yourself.

  • This book descripes the mentality of hackers and gives advises on computer security.
  • It comes with a CD containing various security programs.

Steal this Computer Book 4.0

This non-technical book examines what hackers do, how they do it, and how you can protect yourself.

Artículo n.º 4597

La combinación no es posible
Deine Auswahl ist leider nicht verfügbar. Wir haben daher Deine Auswahl angepasst.
Producto no disponible
Este producto no se encuentra disponible. Una razón puede ser que el productor haya interrumpido la producción del mismo. De momento no puedes solicitarlo.
28,90 € *

* IVA incluido Gastos de envío

Descripción: Steal this Computer Book 4.0

  • This book descripes the mentality of hackers and gives advises on computer security.
  • It comes with a CD containing various security programs.

Advertencia
La descripción de este producto solo está disponible en inglés. En estos momentos estamos trabajando en su traducción al español. Perdón por las molestias.
If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself.

Inside the book, you will discover:

- How to manage and fight spam and spyware
- How Trojan horse programs and rootkits work and how to defend against them
- How hackers steal software and defeat copy-protection mechanisms
- How to tell if your machine is being attacked and what you can do to protect it
- Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside
- How corporations use hacker techniques to infect your computer and invade your privacy
- How you can lock down your computer to protect your data and your personal information using free programs included on the book's CD
- How the media manipulates news to present self-serving stories of questionable accuracy
- How people manipulate search engines and pop-up ads to obtain and use personal information
- Info about the hacker mentality.

The companion CD contains hundreds of megabytes of hacking and security related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.

You can find a sample chapter here. The book is in English and has 360 pages.