Target New ArrivalsGift Ideas for MomClothing, Shoes & AccessoriesHome & DecorKitchen & DiningOutdoor Living & GardenGroceryHousehold EssentialsBabyBeautyPersonal CareHealthWellnessLuggageSports & OutdoorsToysElectronicsVideo GamesMovies, Music & BooksSchool & Office SuppliesParty SuppliesGift IdeasGift CardsPetsUlta Beauty at TargetShop by CommunityTarget OpticalDealsClearanceTarget New ArrivalsSpring OutfitsGift Ideas for MomWomen’s Festival OutfitsTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores
Ethical Hacking for Beginners - (Computer Networking) by  Ramon Adrian Nastase (Paperback) - 1 of 1

Ethical Hacking for Beginners - (Computer Networking) by Ramon Adrian Nastase (Paperback)

$10.43Save $2.56 (20% off)

In Stock

Free & easy returns

Free & easy returns

Return this item by mail or in store within 90 days for a full refund.
Eligible for registries and wish lists

About this item

Highlights

  • Ever wondered how a Hacker thinks?
  • Author(s): Ramon Adrian Nastase
  • 130 Pages
  • Computers + Internet, Security
  • Series Name: Computer Networking

Description



About the Book




This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information.



Book Synopsis



Ever wondered how a Hacker thinks? Or how you could become a Hacker?


This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do to protect yourself from cyber threats and the most common hacking techniques used today.


Structured in 10 chapters, all about cyber-security and ethical hacking, this is in short what the book covers in its

pages:

  • The type of hackers
  • How the process of Hacking works and how attackers cover their traces
  • How to install and use Kali Linux
  • The basics of CyberSecurity
  • All the information on malware and cyber attacks
  • How to scan the servers and the network
  • WordPress Security & Hacking
  • How to do Google Hacking
  • What's the role of a firewall and what are your firewall options
  • What you need to know about cryptography and digital signatures
  • What is a VPN and how to use it for your security

Hacking is real, and many people know how to do it. You can protect yourself from cyber attacks by being informed and learning how to secure your computer and other devices.


Grab your copy of this CyberSecurity & Hacking book today!




Review Quotes




⭐⭐⭐⭐⭐ "OUTSTANDING Explanation and Resource!"

"Bought this tonight after watching videos and reading the Network Text for College course in TCP/IP and could not get a good grasp through my assigned textbook. Looked up some websites for tutorials, practice pages, etc but they weren't giving me the understanding. I found this book and figured "What could I lose for a few bucks" and Man is it worth the $. I wish this guy wrote my textbook!!! Ramon, this is awesome. Outstanding explanation of network subnetting. I took a break and had to write this!!! Thank you!! btw I grabbed your other books also. I'm making a transition to IT from a prior career. This will definitely help on the journey!" - Ray Temt


⭐⭐⭐⭐⭐ "Love it!"

"Very good materials and straight to the point." - Tam Nguyen


⭐⭐⭐⭐⭐ "Excellent book"

"It's easy to understand and very helpful." - Orlando A.


⭐⭐⭐⭐⭐ "Straight to it"

"I have some background in IT so I find it easy to read, someone new to the field might need to read a couple of times and practice to understand." - Carlos A. Ayuso


⭐⭐⭐⭐⭐ "Excellent buy"

"This book was EXACTLY what I needed. Straight and to the point, not too wordy and very easy to understand." - Loyda Rivera


Dimensions (Overall): 9.0 Inches (H) x 6.0 Inches (W) x .28 Inches (D)
Weight: .4 Pounds
Suggested Age: 22 Years and Up
Series Title: Computer Networking
Sub-Genre: Security
Genre: Computers + Internet
Number of Pages: 130
Publisher: Nastase A. Ramon
Theme: Viruses & Malware
Format: Paperback
Author: Ramon Adrian Nastase
Language: English
Street Date: April 7, 2022
TCIN: 89774706
UPC: 9781956525922
Item Number (DPCI): 247-39-6090
Origin: Made in the USA or Imported
If the item details aren’t accurate or complete, we want to know about it.

Shipping details

Estimated ship dimensions: 0.28 inches length x 6 inches width x 9 inches height
Estimated ship weight: 0.4 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO, Alaska, Hawaii

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, delivered to the guest, delivered by a Shipt shopper, or picked up by the guest.
See the return policy for complete information.

Q: What kind of audience is this book intended for?

submitted by AI Shopping Assistant - 1 month ago
  • A: The book is aimed at individuals aged 22 and above, especially those interested in cybersecurity and ethical hacking.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: What topics are covered in this book on hacking?

submitted by AI Shopping Assistant - 1 month ago
  • A: The book covers hacking techniques, cybersecurity basics, and protection strategies against cyber threats.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: What software is mentioned for installing in the book?

submitted by AI Shopping Assistant - 1 month ago
  • A: Kali Linux is discussed as a key software tool for ethical hacking practices.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: What role do firewalls play according to the book?

submitted by AI Shopping Assistant - 1 month ago
  • A: The book explains the function of firewalls and discusses different firewall options for security.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: How is the book structured?

submitted by AI Shopping Assistant - 1 month ago
  • A: The book is divided into 10 chapters focusing on various aspects of cybersecurity and ethical hacking.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Additional product information and recommendations

Discover more options

Trending Computers & Technology Books

Get top deals, latest trends, and more.

Privacy policy