Description
Set of Two Books : Hacking & Mastering Hacking
1. Hacking is not a trick, it’s an art.
2. The more you get into it, the
3. more you will gain from it.
ISBN 13 | |
---|---|
ISBN 10 | |
Edition | |
No. of Pages | |
Type of book | |
Year | |
Language | |
Publisher | |
Save | ₹90.62 (23% Off) |
Price |
|
Categories | Computer Science Engineering |
Condition Type | New |
Country Origin | India |
In stock
Set of Two Books : Hacking & Mastering Hacking
1. Hacking is not a trick, it’s an art.
2. The more you get into it, the
3. more you will gain from it.
In an age where our lives are increasingly woven into the digital fabric-from online banking and social media to e-governance and digital payment-the threat of cyber fraud, data breaches, and identity theft often shadows the promise of convenience. India, with its vast and vibrant digital ecosystem, stands at the cups of a cybersecurity revolution. Yet, for millions of househol...
Buy nowSet of Two Books : Hacking & Mastering Hacking 1. Hacking is not a trick, it's an art. 2. The more you get into it, the 3. more you will gain from it.
Buy nowWe are exponentially adapting the digital era and moving our business, daily lifestyle and activities towards the world of internet. Digital Assets are continuously increasing, and thus, there is a massive requirement of securing digital assets and protecting information. Especially the young generation is getting much involved in social media and are quickly get into online...
Buy nowIn today's time where geographical boundaries are easily covered by Internet and computers with click of a button, there are lies risks within the ecosystem. Hacking somebody's details could lead to damages and losses. In this book we have tried to provide a glimpse into the Technology world of the common terms and procedures used by the hackers to intrude into the system. I...
Buy nowSet of Two Books ( Cyber Crime and Its Prevention in Easy Steps & Cyber Attacks and Counter-Measures Made Simple)
Buy nowThis thoroughly revised and updated edition presents a rigorous and comprehensive treatment of transformers and more common types of rotating electrical machine types. Each chapter begins with rudimentary concepts and is so developed that an average student can easily comprehend it. The salient features of this book are : In-depth coverage of transformers, dc machines, 3-pha...
Buy nowThis book 'Basic Mechanical Engineering' has been written to provide knowledge and insight into various aspects of Mechanical Engineering. This book is intended as text book to be used by the students in the technical institutions i.e. Engineering Colleges and Polytechnics. The book covers Syllabi of various Universities on 'Basic Mechanical Engineering', 'Elements of Mechanica...
Buy nowFundamental concepts are introduced in simple terms, Numerous examples are included to illustrate concepts and techniques. The sequence of topics is well planned to provide a seamless transition from design to implementation. With each chapter, the continuity of topics is excellent. The figures appropriately enhance and amplify the topics. Case studies are organized in a lucid ...
Buy nowSalient Features of the Book : 1. Evolution of Robotics and Automation : Traces the fascinating of robotics from mechanical origins to cutting- edge automation. 2. Linear Algebra : Essential for solving complex robotics challenges using vectors, matrices , and transformations. 3. Calculus : A powerful tool for modeling and controlling robotic systems with precision and...
Buy nowThe Proposed book Modern Concepts of Communication Systems is considered as one of most respected and authentic texts in the field of communication systems and engineering. Its profound mathematical treatment, clarity of concepts rich set of assignment problems and of course, novelty in approach defined in many way how analog or digital communication are taught in engineering c...
Buy nowSet of Two Books : Hacking & Mastering Hacking 1. Hacking is not a trick, it's an art. 2. The more you get into it, the 3. more you will gain from it.
Buy nowThis book provides an in-depth introduction to data structures and its uses had also lucid analysis of algorithms. It explains how the abstractions can be made concrete by using a programming language C. Each data structure is implemented in a variety of ways that provides the real choice for programmers and all programs are executed successfully. With the extensive use of figu...
Buy nowThe Origin of Life: God? - Black Hole? Or Evolution? The origins of life, the mysterious nature of black holes, and the idea of a higher power or God have long fascinated humans. The question of ho life originated on Earth has puzzled scientists for centuries. These topics have sparked numerous debates. Discussions, and theories among theologians, and philosophers alike. We att...
Buy nowCalculus, Multivariable Calculus and Linear Algebra covers all the Modules prescribed by AICTE. Model curriculum to all the 1st year students (except CSE) studying in engineering institutions and universities of the country. It serves as both text book and / or useful reference work. It contains 5 units which include calculus, matrices, sequences & series and multivariable ...
Buy nowThis book is an ideal test to provide in depth knowledge on design and analysis of algorithm. The purpose of the book is to make the students understand the fundamentals of design and analysis of algorithm conveniently. It is meant to be used as a text book for BSc/BCA/MCA/MSc/ B.E./B. Tech/MSc/MS/M. Tech and diploma courses, and as a reference book.
Buy nowCalculus, Multivariable Calculus and Linear Algebra covers all the Modules prescribed by AICTE. Model curriculum to all the 1st year students (except CSE) studying in engineering institutions and universities of the country. It serves as both text book and / or useful reference work. It contains 5 units which include calculus, matrices, sequences & series and multivariable ...
Buy nowThis book provides the readers the following insights into how: 1. Websites are hacked by exploiting command injection, file inclusion, file upload and other vulnerabilities. 2. Databases are compromised by basic and advanced SQL injection. 3. Browser clients are targeted by Cross-Site Scripting attacks. 4. Linux computers are breached by exploiting their vulnerabi...
Buy nowWe use cookies to give you a better experience, improve performance, analyze traffic, and to personalize content. By clicking "Allow All Cookies," you agree to allow the storing of cookies in your browser. To learn more, read our cookie policy.
Reviews
There are no reviews yet.