{
"item_title" : "Hacking of Computer Networks",
"item_author" : [" Hidaia Mahmood Alassouli "],
"item_description" : "The objective of the book is to summarize to the user with main issues in certified ethical hacker course. The complete book consists of many parts: 1. Part 1: Lab Setup 2. Part2: Foot printing and Reconnaissance 3. Part 3: Scanning Methodology 4. Part 4: Enumeration 5. Part 5: System Hacking 6. Part 6: Trojans and Backdoors and Viruses 7. Part 7: Sniffer and Phishing Hacking 8. Part 8: Hacking Web Servers 9. Part 9: Hacking Windows and Linux Systems 10. Part 10: Wireless Hacking 11. Part 11: Hacking Mobile Applications",
"item_img_path" : "https://covers1.booksamillion.com/covers/bam/1/72/718/558/1727185587_b.jpg",
"price_data" : {
"retail_price" : "35.00", "online_price" : "35.00", "our_price" : "35.00", "club_price" : "35.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : ""
}
}
Hacking of Computer Networks
Overview
The objective of the book is to summarize to the user with main issues in certified ethical hacker course. The complete book consists of many parts: 1. Part 1: Lab Setup 2. Part2: Foot printing and Reconnaissance 3. Part 3: Scanning Methodology 4. Part 4: Enumeration 5. Part 5: System Hacking 6. Part 6: Trojans and Backdoors and Viruses 7. Part 7: Sniffer and Phishing Hacking 8. Part 8: Hacking Web Servers 9. Part 9: Hacking Windows and Linux Systems 10. Part 10: Wireless Hacking 11. Part 11: Hacking Mobile Applications
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9781727185584
- ISBN-10: 1727185587
- Publisher: Createspace Independent Publishing Platform
- Publish Date: September 2018
- Dimensions: 9 x 6 x 0.56 inches
- Shipping Weight: 0.8 pounds
- Page Count: 268
Related Categories
