• Hacking

  • Basic Computer Security and Penetration Testing
  • De: John Slavio
  • Narrado por: Steve Biddle
  • Duração: 1 hora e 4 minutos

Assine e ganhe 30% de desconto neste título

R$ 19,90 /mês

R$ 19,90/mês após o teste gratuito de 30 dias. Cancele a qualquer momento.
Curta mais de 100.000 títulos de forma ilimitada.
Ouça quando e onde quiser, mesmo sem conexão
Sem compromisso. Cancele grátis a qualquer momento.
Hacking  Por  capa

Hacking

De: John Slavio
Narrado por: Steve Biddle
Teste grátis por 30 dias

R$ 19,90/mês após o teste gratuito de 30 dias. Cancele a qualquer momento.

Compre agora por R$ 17,99

Compre agora por R$ 17,99

Pagar usando o cartão terminado em
Ao confirmar sua compra, você concorda com as Condições de Uso da Audible e a Política de Privacidade da Amazon. Impostos, quando aplicável. PRECISA SER AJUSTADO

Sinopse

Have you wondered what hacking is all about? How do people hack and what are some basic precautions you can take to prevent being hacked?

It seems like everyone is being hacked. Celebrities, politicians, large organizations, banks, schools, universities etc. Well, how does this happen? What are the different kinds of attacks? Is there any way you can improve your safety? This book answers all.

Do you have a desktop computer, a laptop or even a smartphone? Then you probably have heard the term computer security. In its simplest form computer security refers to protecting computer systems from damage to their software, hardware and the information stored on them, as well as preventing disruption or malicious misdirection of the services they offer.

Computer security involves protecting your computing device from physical damage as well as damage that may come through code injection, network access and data transfer and manipulation whether accidental or intentional. Today everyone owns either a smartphone or a personal computer; this makes learning about computer security an important endeavor. This is particularly important because as the world becomes computerized Internet systems and wireless networks such as Wi-Fi and Bluetooth which most people rely on, are increasingly becoming a source of threat to the computing devices involved.

©2016 Abhishek Kumar (P)2016 Abhishek Kumar

O que os ouvintes dizem sobre Hacking

Nota média dos ouvintes. Apenas ouvintes que tiverem escutado o título podem escrever avaliações.

Avaliações - Selecione as abas abaixo para mudar a fonte das avaliações.