Photo 1/1
![Voler ce livre informatique 4. 0 Ck. 4 : Ce qu'ils ne vous diront pas sur le... - Photo 1/1](https://i.ebayimg.com/images/g/WLoAAOSw32lYoDcD/s-l500.jpg)
Voler ce livre informatique 4. 0 Ck. 4 : Ce qu'ils ne vous diront pas sur le...-
État :
Livraison :
Lieu où se trouve l'objet : Harleysville, Pennsylvania, États-Unis
Délai de livraison :
Estimé entre le ven. 28 juin et le sam. 6 juil. à 43230
Retours :
Paiements :
Achetez en toute confiance
Détails sur le vendeur
Inscrit comme vendeur particulier. En conséquence, les droits des consommateurs découlant de la législation européenne ne s'appliquent pas. Cependant, la plupart des achats sont couverts par la Garantie client eBay.En savoir plusInscrit comme vendeur particulier
Le vendeur assume l'entière responsabilité de cette annonce.
Numéro de l'objet eBay :266724118597
Dernière mise à jour le 25 mai 2024 16:54:55 Paris. Afficher toutes les modificationsAfficher toutes les modifications
Caractéristiques de l'objet
- État
- ISBN
- 9781593271053
- Subject Area
- Computers
- Publication Name
- Steal this Computer Book 4. 0 BK. 4 : What They Won't Tell You about the Internet
- Publisher
- No Starch Press, Incorporated
- Item Length
- 8.9 in
- Subject
- Internet / General, Security / Online Safety & Privacy, Social Aspects / General, Security / General
- Publication Year
- 2006
- Type
- Textbook
- Format
- Trade Paperback
- Language
- English
- Item Height
- 1.1 in
- Features
- New Edition
- Item Weight
- 25.5 Oz
- Item Width
- 7 in
- Number of Pages
- 384 Pages
À propos de ce produit
Product Identifiers
Publisher
No Starch Press, Incorporated
ISBN-10
1593271050
ISBN-13
9781593271053
eBay Product ID (ePID)
51256832
Product Key Features
Number of Pages
384 Pages
Language
English
Publication Name
Steal this Computer Book 4. 0 BK. 4 : What They Won't Tell You about the Internet
Subject
Internet / General, Security / Online Safety & Privacy, Social Aspects / General, Security / General
Publication Year
2006
Features
New Edition
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1.1 in
Item Weight
25.5 Oz
Item Length
8.9 in
Item Width
7 in
Additional Product Features
Edition Number
4
Intended Audience
Trade
LCCN
2005-037435
Dewey Edition
22
Reviews
"A terrific guide...made enjoyable by the sense that you're seeing how the bad guys operate. But beyond this excitement, the book has immediate value." --SD Times
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Part 1: The Early Hackers Chapter 1: The Hacker Mentality Chapter 2: The First Hackers: The Phone Phreakers Chapter 3: Hacking People, Places, and Things Part 2: The PC Pioneers Chapter 4: Ansi Bombs and Viruses Chapter 5: Trojan Horses and Worms Chapter 6: Warez (Software Piracy) Part 3: The Internet Hackers Chapter 7: Where the Hackers Are Chapter 8: Stalking a Computer Chapter 9: Cracking Passwords Chapter 10: Digging Into a Computer with Rootkits Chapter 11: Censoring Information Chapter 12: The Filesharing Networks Part 4: The Real World Hackers Chapter 13: The Internet Con Artists Chapter 14: Finding People on the Internet Chapter 15: Propaganda as News and Entertainment Chapter 16: Hacktivism: Online Activism Chapter 17: Hate Groups and Terrorists on the Internet Part 5: The Future--Hacking for Profit Chapter 18: Identity Theft and Spam Chapter 19: Banner Ads, Pop-up Ads, and Search Engine Spamming Chapter 20: Adware and Spyware Part 6: Protecting Your Computer and Yourself Chapter 21: Computing on a Shoestring: Getting Stuff for (Almost) Free Chapter 22: Computer Forensics: The Art of Deleting and Retrieving Data Chapter 23: Locking Down Your Computer
Edition Description
New Edition
Synopsis
National bestseller with over 175,000 copies sold! If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover: How to manage and fight spam and spyware How Trojan horse programs and rootkits work, and how to defend against them How hackers steal software and defeat copy-protection mechanisms How to tell if your machine is being attacked and what you can do to protect it Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside How corporations use hacker techniques to infect your computer and invade your privacy How you can lock down your computer to protect your data and your personal information using free programs included on the book's CD If you ve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer, or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you're paranoid doesn't mean they aren't after you. And, as Wallace Wang reveals, they probably are. The companion CD contains hundreds of megabytes of 100% FREE hacking and security-related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux., National bestseller with over 175,000 copies sold! If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful," Steal This Computer Book 4.0" will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover: How to manage and fight spam and spyware How Trojan horse programs and rootkits work, and how to defend against them How hackers steal software and defeat copy-protection mechanisms How to tell if your machine is being attacked and what you can do to protect it Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside How corporations use hacker techniques to infect your computer and invade your privacy How you can lock down your computer to protect your data and your personal information using free programs included on the book's CD If you ve ever logged onto awebsite, conducted an online transaction, sent or received email, used a networked computer, or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you're paranoid doesn't mean they aren't after you. And, as Wallace Wang reveals, they probably are. The companion CD contains hundreds of megabytes of 100% FREE hacking and security-related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux., If ever a book on cyberculture wore a fedora and trenchcoat and leaned against a lamppost on a foggy street,this is the one. It is an unabashed look at the dark sideof the Net - the stuff many other books gloss over. It'shard-edged, wisecracking, and often quite cynical as itpours over the reality of online scams, illegalactivities, ......, If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover- -How to manage and fight spam and spyware -How Trojan horse programs and rootkits work and how to defend against them -How hackers steal software and defeat copy-protection mechanisms -How to tell if your machine is being attacked and what you can do to protect it -Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside -How corporations use hacker techniques to infect your computer and invade your privacy -How you can lock down your computer to protect your data and your personal information using free programs included on the book's CD If you've ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you're paranoid doesn't mean they aren't after you. And, as Wallace Wang reveals, they probably are. The companion CD contains hundreds of megabytes of 100% FREE hacking and security related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux., If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy. Inside, you'll discover: -How to manage and fight spam and spyware -How Trojan horse programs and rootkits work and how to defend against them -How hackers steal software and defeat copy-protection mechanisms -How to tell if your machine is being attacked and what you can do to protect it -Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside -How corporations use hacker techniques to infect your computer and invade your privacy -How you can lock down your computer to protect your data and your personal information using free programs included on the book's CD If you've ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you're paranoid doesn't mean they aren't after you. And, as Wallace Wang reveals, they probably are. The companion CD contains hundreds of megabytes of 100% FREE hacking and security related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.
LC Classification Number
TK5105.875.I57W3727
ebay_catalog_id
4
Copyright Date
2006
Description de l'objet fournie par le vendeur
Le vendeur assume l'entière responsabilité de cette annonce.
Numéro de l'objet eBay :266724118597
Dernière mise à jour le 25 mai 2024 16:54:55 Paris. Afficher toutes les modificationsAfficher toutes les modifications
Livraison et expédition
Lieu où se trouve l'objet :
Harleysville, Pennsylvania, États-Unis
Destination :
Afghanistan, Afrique du Sud, Albanie, Algérie, Allemagne, Andorre, Angola, Anguilla, Antigua-et-Barbuda, Arabie saoudite, Argentine, Arménie, Aruba, Australie, Autriche, Azerbaïdjan, Bahamas, Bahreïn, Bangladesh, Belgique, Belize, Bermudes, Bhoutan, Bolivie, Bosnie-Herzégovine, Botswana, Brunei Darussalam, Brésil, Bulgarie, Burkina Faso, Burundi, Bénin, Cambodge, Cameroun, Canada, Cap-Vert, Chili, Chine, Chypre, Colombie, Corée du Sud, Costa Rica, Croatie, Côte d'Ivoire, Danemark, Djibouti, Espagne, Estonie, Fidji, Finlande, France, Gabon, Gambie, Ghana, Gibraltar, Grenade, Groenland, Grèce, Guatemala, Guinée, Guinée équatoriale, Guinée-Bissau, Guyana, Géorgie, Haïti, Honduras, Hong Kong, Hongrie, Inde, Indonésie, Irlande, Islande, Israël, Italie, Jamaïque, Japon, Jordanie, Kazakhstan, Kenya, Kirghizistan, Kiribati, Koweït, Laos, Lesotho, Lettonie, Liban, Liberia, Liechtenstein, Lituanie, Luxembourg, Macao, Macédoine, Madagascar, Malaisie, Malawi, Maldives, Mali, Malte, Maroc, Maurice, Mauritanie, Mexique, Moldavie, Monaco, Mongolie, Montserrat, Monténégro, Mozambique, Namibie, Nauru, Nicaragua, Niger, Nigeria, Norvège, Nouvelle-Zélande, Népal, Oman, Ouganda, Ouzbékistan, Pakistan, Panama, Papouasie-Nouvelle-Guinée, Paraguay, Pays-Bas, Philippines, Pologne, Portugal, Pérou, Qatar, Roumanie, Royaume-Uni, Rwanda, République centrafricaine, République dominicaine, République du Congo, République démocratique du Congo, République tchèque, Saint-Christophe-et-Niévès, Saint-Marin, Saint-Vincent-et-les-Grenadines, Sainte-Lucie, Salvador, Samoa occidentales, Serbie, Seychelles, Sierra Leone, Singapour, Slovaque, Slovénie, Sri Lanka, Suisse, Suriname, Suède, Swaziland, Sénégal, Tadjikistan, Tanzanie, Taïwan, Tchad, Thaïlande, Togo, Tonga, Trinité-et-Tobago, Tunisie, Turkménistan, Turquie, Uruguay, Vanuatu, Vatican, Viêt Nam, Wallis-et-Futuna, Yémen, Zambie, Zimbabwe, Égypte, Émirats arabes unis, Équateur, Érythrée, États-Unis, Éthiopie, Îles Caïmans, Îles Salomon, Îles Turques-et-Caïques
Exclus :
Barbade, Guadeloupe, Guyane, Libye, Martinique, Nouvelle-Calédonie, Polynésie française, Russie, Réunion, Ukraine, Venezuela
Livraison et expédition | à | Service | Livraison*Afficher les instructions de livraison |
---|---|---|---|
4,13 USD (environ 3,85 EUR) | États-Unis | Economique (USPS Media MailTM) | Estimé entre le ven. 28 juin et le sam. 6 juil. à 43230 |
Délai d'expédition |
---|
Envoi sous 3 jours ouvrés après réception du paiement. |
Taxes |
---|
Des taxes pourront être appliquées lors de la finalisation de l'achat. En savoir plusEn savoir plus sur le paiement des taxes sur les achats eBay |
Taxe de vente pour l'objet n°266724118597
Taxe de vente pour l'objet n°266724118597
Le vendeur facture une taxe de vente pour les États suivants :
État | Taux de la taxe de vente |
---|
Conditions de retour
Détails des conditions de retour |
---|
Votre achat est protégé par une garantie contre les vices cachés. Cependant, il n'existe aucune garantie légale de conformité des objets. Les achats auprès de vendeurs particuliers ne bénéficient pas du droit de rétractation. Si le vendeur accepte les rétractations, cette information sera indiquée dans l'annonce. |
En savoir plus sur les garanties légales sur eBay |
Droit de la vente applicable aux transactions entre particuliers |
Droit de la responsabilité civile applicable |
Cliquez iciici pour en savoir plus sur les retours. Pour les transactions répondant aux conditions requises, vous êtes couvert par la Garantie client eBay si l'objet que vous avez reçu ne correspond pas à la description fournie dans l'annonce.
Détails du paiement
Modes de paiement
Remarque : il se peut que certains modes de paiement ne soient pas disponibles lors de la finalisation de l'achat en raison de l'évaluation des risques associés à l'acheteur.
Inscrit comme vendeur particulier
En conséquence, les droits des consommateurs découlant de la législation européenne ne s'appliquent pas. La Garantie client eBay continue de s'appliquer pour la plupart des achats. En savoir plusEn savoir plus
Évaluations en tant que vendeur (113)
u***o (227)- Évaluations laissées par l'acheteur.
Dernier mois
Achat vérifié
Item as described , very well packed , shipping fast , thanks
n***s (21)- Évaluations laissées par l'acheteur.
Dernier mois
Achat vérifié
Great seller - good communication, great price, fast shipment of perfect book
s***4 (299)- Évaluations laissées par l'acheteur.
Dernier mois
Achat vérifié
Thank you!
Notes et avis sur le produit
Rédigez un avis en premier.
Découvrir d'autres objets :
- Livres de fiction Penguin Books,
- Livres de fiction Penguin Books, en anglais,
- Livres de fiction poche Penguin Books,
- Stylos bille et roller 4 couleurs,
- Livres 4 à 8 ans pour la jeunesse,
- Livres en poche 4 à 8 ans pour la jeunesse,
- Livres pour la jeunesse, 4 à 8 ans, en anglais,
- Livres de fiction 4 à 8 ans pour la jeunesse,
- Bandes dessinées et romans graphiques franco-belges et européens les 4 as,
- Livres, bandes dessinées et revues de non-fiction livres Penguin Books