Hacking cover art

Hacking

Basic Computer Security and Penetration Testing

Preview

£0.00 for first 30 days

Try for £0.00
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

Hacking

By: John Slavio
Narrated by: Steve Biddle
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £6.99

Buy Now for £6.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

Have you wondered what hacking is all about? How do people hack and what are some basic precautions you can take to prevent being hacked?

It seems like everyone is being hacked. Celebrities, politicians, large organizations, banks, schools, universities etc. Well, how does this happen? What are the different kinds of attacks? Is there any way you can improve your safety? This book answers all.

Do you have a desktop computer, a laptop or even a smartphone? Then you probably have heard the term computer security. In its simplest form computer security refers to protecting computer systems from damage to their software, hardware and the information stored on them, as well as preventing disruption or malicious misdirection of the services they offer.

Computer security involves protecting your computing device from physical damage as well as damage that may come through code injection, network access and data transfer and manipulation whether accidental or intentional. Today everyone owns either a smartphone or a personal computer; this makes learning about computer security an important endeavor. This is particularly important because as the world becomes computerized Internet systems and wireless networks such as Wi-Fi and Bluetooth which most people rely on, are increasingly becoming a source of threat to the computing devices involved.

©2016 Abhishek Kumar (P)2016 Abhishek Kumar
Security & Encryption
activate_Holiday_promo_in_buybox_DT_T2

What listeners say about Hacking

Average customer ratings
Overall
  • 2 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    1
  • 1 Stars
    0
Performance
  • 2 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    1
  • 1 Stars
    0
Story
  • 2 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    1
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.