Hacking is something that many people fall victim to at some point in their life. You may only experience an amateur hacker breaking into your information ‘just because they can’ and leaving again without taking anything. On the other hand, you may experience hacking where your information is stolen and someone uses it to take money or even your identity. Any type of hacking can leave you feeling vulnerable, even if they don’t take anything while they are there. That’s a feeling that you never want to have and the idea that someone could take anything you own just that easily is terrifying as well. This book is an introduction to protecting yourself from hacking. Find out more about what hackers do to get into your information and your system and what you can do to keep them out. Make sure that you understand different skills and techniques from how to create a proper password and choose a good virus software to how you should be storing your information for the most security. All of this and more are included in this book. Don’t miss out on it!
Hackers are a global fascination with cybercrime representing our single biggest threat to national security. But putting their sinister motives aside, the dark underworld of hackers contains some of the most creative minds on the planet.
First volume of a collection of tech-fiction short stories. Designed to be a perfect mobile reading for geeks, who from time to time desperately need to recover from tech-related stress, the one which says hello when you don't remember the password to your Gmail account. Or Twitter account. Or both.
Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout.
Topics include:An in-depth view of routers and routingSwitching, using Cisco Catalyst and Nexus switches as examplesSOHO VoIP and SOHO wireless access point design and configurationIntroduction to IPv6 with configuration examplesTelecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLSSecurity, firewall theory, and configuration, as well as ACL and authenticationQuality of Service (QoS), with an emphasis on low-latency queuing (LLQ)IP address allocation, Network Time Protocol (NTP), and device failures
You've read the news stories about how hackers are stealing your money and holding your data hostage, but how do you protect yourself against it? You're not a computer security guru, so how do your protect yourself? This guide, written in plain English with (very little) technical jargon, will help you, the home user, navigate the world of protecting your home environment from the threats on the Internet. Written by an irreverent but talented information security professional, it's a quick-and-dirty guide to protecting yourself, how and why you need each piece, and, best of all, how to do it all for free.