Top 5 world famous hacking books download
Top 5 world famous hacking books download
About the Author
Peter H. Gregory, CISA, CISSP, discovered computers in 1976
in his first year at the University of Nevada-Reno. He was taking
a FORTRAN programming course when computer programs
and all). He then got a part-time computer operator job at the
were painstakingly typed in on punch cards (hanging chads
mainframe computer, a Control Data Corporation CDC-6400.
University computer center, where he operated the university’s
His insatiable curiosity about computers led him headlong
Those fancy letters behind Peter’s name: CISSP and CISA, are
into a career that began when he completed his university
education.
two professional security certifications: Certified Information
where he develops security policy, security architecture, secu-
Systems Security Professional and Certified Information
Systems Auditor. Peter has spent the past eleven years in the
wireless telecommunications industry, working in positions
Author’s Acknowledgments
rity emergency response teams, and has been a security con-
sultant in general. His love for personal computers has kept
him attached to one or more of them for twenty years.
I would like to extend thanks to great folks at Trend Micro
Special thanks go to Jennifer Byrne at Symantec who provided
(Michael Sweeny in the U.S. and Del Gemmell in Taiwan) and
Panda Software (Alan Wallace in California, Jose Javier
Merchan, and especially Fernando de la Cuadra in Spain), who
provided information as well as dozens of screen shots.
to ensure the technical accuracy of the book.
invaluable feedback on the draft table of contents, resulting in
numerous improvements. Nalleli Lopez Hosek and David
Alderman read the entire draft manuscript and made numer-
ous productive suggestions to make the book easier to read
and understand. Thanks you two! Tim Crothers worked hard
me how to teach complex subjects to non-technical people.
Special thanks go to Eva Neumann, who provided invaluable
feedback from her perspective as a non-professional com-
puter user. Many thanks to my immediate and extended family
for tolerating the book writing process yet again. I’d like to
dedicate this book to the memory of Ralph Pratt who showed
Media Development
And thanks be to God, through whom all things are possible.
Publisher’s Acknowledgments
We’re proud of this book; please send us your comments through our online registration
form located at www . dummi es.com/register/.
Some of the people who helped bring this book to market include the following:
Acquisitions, Editorial, and
Upgrading or switching brands safely 63
Sticking with Name Brands You Know 51
Considering Important Antivirus Features 53
Fee or free subscription? 53
Scanning: Manual and scheduled 54
Compatibility with your e-mail program 55
Virus-definition updates 55
Fix and recovery 56
Bundling other features 57
Upgrading and Switching Brands 60
Reasons to upgrade 60
Reasons to switch brands 61
list of books
1.Computer Viruses, Hacking and Malware attacks for Dummies
2.Secrets of Super and Professional Hackers
3.G-mail Advance Hacking Guides and Tutorials
4.Black Belt Hacking & Complete Hacking Book
5.Dangerous Google Hacking Database and Attacks
and more information comment here thanks
please comment your choice game ...