Picture 1 of 1

Gallery
Picture 1 of 1

Defeating the Hacker: A Non-Technical Guide to Computer Security
by Schifreen, Robert | HC | VeryGood
US $10.74
Approximately£7.91
Condition:
“May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend ”... Read moreAbout condition
Very Good
A book that has been read and does not look new, but is in excellent condition. No obvious damage to the book cover, with the dust jacket (if applicable) included for hard covers. No missing or damaged pages, no creases or tears, no underlining or highlighting of text, and no writing in the margins. Some identifying marks on the inside cover, but this is minimal. Very little wear and tear. See the seller’s listing for full details and description of any imperfections.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
Free Economy Shipping.
Estimated between Wed, 18 Jun and Tue, 24 Jun to 94104
Located in: Aurora, Illinois, United States
Returns:
30 days return. Seller pays for return postage.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:375074020671
Item specifics
- Condition
- Very Good
- Seller notes
- Binding
- Hardcover
- Book Title
- Defeating the Hacker
- Weight
- 1 lbs
- Product Group
- Book
- IsTextBook
- Yes
- ISBN
- 9780470025550
About this product
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0470025557
ISBN-13
9780470025550
eBay Product ID (ePID)
50588873
Product Key Features
Number of Pages
398 Pages
Language
English
Publication Name
Defeating the Hacker : a Non-Technical Guide to Computer Security
Publication Year
2006
Subject
Security / General, Security / Networking
Type
Textbook
Subject Area
Computers
Format
Hardcover
Dimensions
Item Height
1.2 in
Item Weight
27.4 Oz
Item Length
8.8 in
Item Width
6.8 in
Additional Product Features
Intended Audience
Trade
LCCN
2005-033916
Dewey Edition
22
Reviews
, .."It's hard to imagine that there's any category of computer user -- domestic, small business, corporate -- who won't find something of value in this book....Defeating the Hacker is a useful and well-written book, particularly for home and small business users...." ("ZDNet.co.uk", April 2006) , .."Schifreen is now a kosher security expert and Defeating the Hacker is his non-technical guide through this murky world....It's hard to imagine any kind of computer user who won't find something useful here...." ("The Glasgow Daily Record, " April 2006) "It's accessible and easy to read and the best thing is that every chapter has five practical points at the end for you to act on to improve your company's security." ("Radio Five Live", April 2006) , .."definitely worth reading..." ("The Register", July 2006), "... a useful and well-written book, particularly for home and small business users...." ( ZDNet.co.uk , April 2006) "... non-technical guide through this murky world....It's hard to imagine ...computer user who won't find something useful here...." ( The Glasgow Daily Record, April 2006) "...every chapter has five practical points at the end for you to act on to improve your company's security." ( Radio Five Live , April 2006) "...definitely worth reading..." ( The Register , July 2006), "...It's hard to imagine that there's any category of computer user -- domestic, small business, corporate -- who won't find something of value in this book....Defeating the Hacker is a useful and well-written book, particularly for home and small business users...." ( ZDNet.co.uk , April 2006) "...Schifreen is now a kosher security expert and Defeating the Hacker is his non-technical guide through this murky world....It's hard to imagine any kind of computer user who won't find something useful here...." ( The Glasgow Daily Record, April 2006) "It's accessible and easy to read and the best thing is that every chapter has five practical points at the end for you to act on to improve your company's security." ( Radio Five Live , April 2006) "...definitely worth reading..." ( The Register , July 2006)
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Chapter 1: Introduction. Chapter 2: A Hacker is Made. Chapter 3: Preparation and Planning. Chapter 4: International Laws and Standards. Chapter 5: Passwords and Beyond. Chapter 6: Your Information Security Policy Chapter 7: Security Awareness Training. Chapter 8: Patch Management. Chapter 9: Windows Workstation Security. Chapter 10: Basic Server Security. Chapter 11: Understanding Firewalls. Chapter 12: Protecting Your Web Site. Chapter 13: Wireless Networking. Chapter 14: Penetration Testing. Chapter 15: Security Through Obscurity. Chapter 16: Windows Vista. Chapter 17: Email. Chapter 18: The Curse of Spam. Chapter 19: Viruses. Chapter 20: Spyware, Adware and Rogue Diallers. Chapter 21: Piracy. Chapter 22: File Sharing and 'P2P'. Chapter 23: Backups and Archives. Chapter 24: Preventing Internet Misuse. Chapter 25: Document Security. Chapter 26: Data Theft. Chapter 27: Encryption. Chapter 28: Employees' Own Computers. Chapter 29: How Hackers Use Search Engines. Chapter 30: Denial of Service Attacks. Chapter 31: Provisioning and Identity Management. Chapter 32: Data Interception. Chapter 33: Out of the Office. Chapter 34: Social Engineering. Chapter 35: E-Commerce Fraud. Chapter 36: Intrusion Detection Systems. Chapter 37: Outsourcing. Chapter 38: Securing your Premises. Chapter 39: Forensics. Chapter 40: Planning for the Worst. Chapter 41: Hardware Theft. Chapter 42: Let's Be Careful Out There. Index.
Synopsis
"Excellent, practical, comprehensive; peppered with good data, colourful anecdotes and practical common sense action points enabling you to solve some big problems in an intelligent way. A great read and an even greater "Handbook."" --John Madelin, Director of Corporate Development, RSA "This is a refreshingly different approach to writing about security." --Martin Veitch, Executive Editor, IT Week According to a survey carried out by Lloyds TSB, 54% of all PCs and laptops have been infected with a computer virus Computers and the Internet are a virtual battleground for IT security and hackers. For years, systems have been attacked and defended; the cost of this cyber war has spiralled and will continue to rise. As technology improves, so do the hacker's weapons of mass destruction. Defeating the Hacker is a book about hackers, crackers, phishing, pharming, spammers, scammers, virus-writers, Trojan horses, malware and spyware, and how to keep them at bay. Whether you are working in the office or from home, shopping online or checking your e-mails, the hacker could be stalking your computer system. So what makes this book different from other security books? Quite simply, the author used to be a world-famous hacker. So you're getting advice from someone who knows just how exhilarating it can be to break into other people's computers and who has, in the past, got his kicks from exploiting information surrounding a member of the Royal Family. This gripping book shows you how to protect yourself, your computer and your organisation with practical advice from someone who has now beaten the addiction, and for the first time, reveals all the dirty tricks to watch out for!, The current struggle between IT security and computer hackers is reaching crisis point. Corporate dependency on computers and the Internet as well as the rapid spread of broadband into more households has resulted in a feeding ground for hackers around the world. Estimated damage costs are now making their way into the billions., The current struggle between IT security and computer hackers is reaching crisis point. Corporate dependency on computers and the Internet as well as the rapid spread of broadband into more households has resulted in a feeding ground for hackers around the world. Estimated damage costs are now making their way into the billions. The need for some good advice is long overdue. Robert Schifreen, a self-confessed ex-hacker, made history in 1985 when he became the first person in the world to face a jury trial in connection with computer hacking. His subsequent acquittal in the High Court led to a change in UK Law and the introduction of the Computer Misuse Act 1990. His 20 years experience in IT security now lends itself to global radio and TV broadcasts, as well as appearances at conferences and lectures around the world. Keeping your company's computers free from hackers, viruses, spammers, phishing attacks, social engineers and all the other things that can result in loss of data is a difficult job. Defeating the Hacker is a book about how to protect your computer systems becoming another victim of the hacker. It's an instant primer into all the things that can go wrong, with advice on how to stop it happening or, if it's too late, how to fix the damage. Presents unique, UK based, insider information on hacking and security from someone who has operated on both sides of the divide Develops a populist seam within a hot IT area: security Shows readers how and why hacking is made possible, whilst suggesting ways to avoid being a victim of it Written in a dynamic, conversational, yet knowledgeable, style Filled with information and anecdotal evidence aimed at IT professionals and those with a more general interest Defeating the Hacker allows the reader to learn how to protect their computer systems with advice from someone who knows how to break into them.
LC Classification Number
QA76.9.A25S343 2006
Item description from the seller
Seller business information
About this seller
ThriftBooks
98.9% positive Feedback•19.5M items sold
Registered as a business seller
Popular categories from this shop
Seller Feedback (5,652,430)
- c***m (404)- Feedback left by buyer.Past 6 monthsVerified purchaseWOW!; I cannot believe this 3 Days to Hawaii! ; AAA+++; Excellent Service; Great Pricing; Fast Delivery-Faster Than Expected to Hawaii!; Shipped 05/05, Mon, Received 05/08, Thu to Hawaii using free shipping; USPS Ground Mail, Book in Excellent Condition--Better Than Described ; TLC Packaging; Excellent Seller Communication, Sends updates . Highly Recommended!, Thank you very much!
- e***r (2705)- Feedback left by buyer.Past 6 monthsVerified purchaseThank you so much for offering this art book. Your price was fabulous on it. I had no communication, but you are no doubt a kind person. You are also a professional person, and your attention to detail really helped me in making my purchase decision. I'm adding you to my favorite seller list, and I always do shop with this list first. And also, I'd like to thank you for the lovely packaging, and the extremely fast shipping. The book was exactly as you described it. Happy New Year, if I can say.Sonia Boyce: Feeling Her Way by Ridgway, Emma; Martin, Courtney J. (#197040368082)
- t***1 (63)- Feedback left by buyer.Past monthVerified purchaseI had a problem after placing my order. I contacted the seller who responded within an hour and resolved the issue with no hassle. This book was a fair price and received today. I failed to notice, but the description did indicate it was missing the dust jacket. I highly recommend this seller.
More to explore:
- Non-Fiction Computer Security Fiction & Non-Fiction Books,
- Non-Fiction Computer Security Paperback Fiction & Books,
- Non-Fiction Fiction Books & Security,
- Non-Fiction Security Hardcover Books,
- Computing School Textbook and Study Guide,
- Insight Guides & Fiction Non-Fiction Books,
- Non-Fiction Rough Guides Cities Fiction & Non-Fiction Books,
- Insight Guides Non-Fiction Books & Fiction Books,
- Non-Fiction Rough Guides Music Fiction & Books,
- Politics & Society Non-Fiction Fiction Books & Security