You can access the distribution details by navigating to My Print Books(POD) > Distribution
The introduction of the wide world web has been one of man’s greatest achievements in the 21st century. Communications have been simplified day by day with the wide connectivity of the entire globe. From banking systems, hospitals, educational institutions and government institutions, all activities have been broken down to a simple click and text.
This however has come up with a dark side known in the modern day as “Hacking”. It is defined as the art of breaking into networks without the right access permissions. With over 10,830 cyber attacks that happen every single day, the internet as we know it has become one of the most unsecure place for one to keep sensitive information like usernames and passwords to online banking systems,bank accounts and emails. If network administrators simply instituted proper configuration
policies and conducted good network monitoring, about 80 percent of commonly known cyber attacks could be prevented. And this has given a rise in different protection mechanisms and groups. In this we have White hat hacker, grey hat hacker and black hat hackers. These all range from independent researchers to security scholars with certifications from the leading security companies like CISE, CEH, CISPP and many more.
The idea is, the more people become aware of the loop holes in computer systems and the methods that they get bleached; the level of cyber attacks and hacks will be greatly improved. With the English saying you set a thief to catch a thief;- I have written this book in details to expose the minds of computer hackers, the tricks, methods and tools of attack. I explain how computer systems can get compromised from a hackers perspective. There is also a detailed chapter that explains more on computer attachments like Bluetooth devices, how they can get attacked and the solutions to these several fawns.
Ronnie Nsale, C|EH, CISSP, MCSE, CCNA is an independent computer security researcher and expert. Holds an Msc.MSc. Security and Mobile Computing and has majored in the field of software engineering and cyber security. He is famously known for his kalip windows RPC exploit and blue_ron Bluetooth exploit.