Listen and read

Step into an infinite world of stories

  • Read and listen as much as you want
  • Over 1 million titles
  • Exclusive titles + Storytel Originals
  • 7 days free trial, then €9.99/month
  • Easy to cancel anytime
Try for free
Details page - Device banner - 894x1036
Cover for Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.

Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.

4 Ratings

3.5

Duration
3H 21min
Language
English
Format
Category

Non-fiction

Ever found yourself being fascinated by the idea of being able to hack into any system? While modern culture has pushed hacking to a screen-based villainous role that can do miracles, there is much more to hacking that remains untold. Hardly anyone feels it necessary to mention how hacking can be an illustrious career option. Similarly, the ease with which cyberattacks can be diverted often remains untold.

Handling computers has gotten easier than before. However, do you know the world of the Internet? What makes a computer go online? How can you identify someone else’s device? What are the different types of networks and how can you safeguard yourself from the different threats? Let’s find out.

© 2020 Alex Published (Audiobook): 9781662275494

Release date

Audiobook: August 17, 2020

Others also enjoyed ...

  1. Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security
    Computer Systems and Networking Guide: A Complete Guide to the Basic Concepts in Computer Systems, Networking, IP Subnetting and Network Security Hans Weber
  2. Biggest Cyber Crimes in the History
    Biggest Cyber Crimes in the History Introbooks Team
  3. Cloud Security For Dummies
    Cloud Security For Dummies Ted Coombs
  4. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
    Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
  5. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
    CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
  6. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
    CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
  7. Ethical Hacking for Beginners: Comprehensive Introduction to the  World of Cybersecurity
    Ethical Hacking for Beginners: Comprehensive Introduction to the World of Cybersecurity Brandon Scott
  8. Cybersecutity First Principles
    Cybersecutity First Principles Rick Howard
  9. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
  10. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
    Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
  11. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication.
    Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  12. The Language of Deception: Weaponizing Next Generation AI
    The Language of Deception: Weaponizing Next Generation AI Justin Hutchens
  13. Hacking: How to Hack
    Hacking: How to Hack Alex Wagner
  14. The NSA Report: Liberty and Security in a Changing World
    The NSA Report: Liberty and Security in a Changing World Richard A. Clarke
  15. Distrust: Big Data, Data-Torturing, and the Assault on Science
    Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
  16. They Know Everything About You: How Data-Collecting Corporations and Snooping Government Agencies Are Destroying Democracy
    They Know Everything About You: How Data-Collecting Corporations and Snooping Government Agencies Are Destroying Democracy Robert Scheer
  17. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
    Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
  18. Striking Back: The End of Peace in Cyberspace—and How to Restore It
    Striking Back: The End of Peace in Cyberspace—and How to Restore It Lucas Kello
  19. The Great Depression: The Causes of the 1930s Economic Crices, and the Consequences on Society and Culture
    The Great Depression: The Causes of the 1930s Economic Crices, and the Consequences on Society and Culture History Retold
  20. Quantum Computing for Beginners: Unveiling the Future of Technology and Transforming Computational Horizons
    Quantum Computing for Beginners: Unveiling the Future of Technology and Transforming Computational Horizons Steve Abrams
  21. CompTIA A+ Certification Study Guide For 220-1102 Exam 2 Books In 1: Operating Systems, Software Troubleshooting, Security Awareness & Operational Procedures
    CompTIA A+ Certification Study Guide For 220-1102 Exam 2 Books In 1: Operating Systems, Software Troubleshooting, Security Awareness & Operational Procedures HISTORY FOREVER
  22. Greatest Hackers in the History
    Greatest Hackers in the History Introbooks Team
  23. Auto Repair For Dummies: 2nd Edition
    Auto Repair For Dummies: 2nd Edition Deanna Sclar
  24. Mafia Wars in the History
    Mafia Wars in the History Introbooks Team
  25. Studying the chemistry of cannabis: cannabinoid extraction methods
    Studying the chemistry of cannabis: cannabinoid extraction methods Pharmacology University
  26. Nikola Tesla and Thomas Edison: (2 Books in 1) The Rival Inventors Who Powered the Modern Era
    Nikola Tesla and Thomas Edison: (2 Books in 1) The Rival Inventors Who Powered the Modern Era Michael W. Simmons
  27. How Great Generals Win
    How Great Generals Win Bevin Alexander
  28. Re-Made in the USA: How We Can Restore Jobs, Retool Manufacturing, and Compete With the World
    Re-Made in the USA: How We Can Restore Jobs, Retool Manufacturing, and Compete With the World Todd Lipscomb
  29. Industrial Development: Aeronautical, Aerospace, Civil, and Industrial Engineering (5 in 1)
    Industrial Development: Aeronautical, Aerospace, Civil, and Industrial Engineering (5 in 1) Phil Gilberts
  30. RYA Yacht Sailing Techniques (A-G94): Describes the Basic Skills that a Skipper and Crew Require to Enjoy their Cruising in Good Conditions
    RYA Yacht Sailing Techniques (A-G94): Describes the Basic Skills that a Skipper and Crew Require to Enjoy their Cruising in Good Conditions Jeremy Evans
  31. That's Not Funny: How the Right Makes Comedy Work for Them
    That's Not Funny: How the Right Makes Comedy Work for Them Nick Marx
  32. Tech Monopoly: (The MIT Press Essential Knowledge series)
    Tech Monopoly: (The MIT Press Essential Knowledge series) Herbert Hovenkamp
  33. Defending the Free Market: The Moral Case for a Free Economy
    Defending the Free Market: The Moral Case for a Free Economy Robert Sirico
  34. The History of the Oberlin-Wellington Rescue
    The History of the Oberlin-Wellington Rescue Herbert Addison Burns
  35. Long Hard Road: The Lithium-Ion Battery and the Electric Car
    Long Hard Road: The Lithium-Ion Battery and the Electric Car Charles J. Murray
  36. Confessions of a Radical Tax Protestor: An Inside Expose of the Tax Resistance Movement
    Confessions of a Radical Tax Protestor: An Inside Expose of the Tax Resistance Movement Larry R. Williams
  37. Unequal: How extreme inequality is damaging democracy and what we can do about it
    Unequal: How extreme inequality is damaging democracy and what we can do about it David Buckham
  38. Earth's Acidifying Oceans
    Earth's Acidifying Oceans John Rafferty
  39. Across the Board: The Mathematics of Chessboard Problems
    Across the Board: The Mathematics of Chessboard Problems John J. Watkins
  40. Fatal Risk: A Cautionary Tale of AIG's Corporate Suicide
    Fatal Risk: A Cautionary Tale of AIG's Corporate Suicide Roddy Boyd
  41. They Never Let a Crisis Go to Waste: The Truth About Disaster Liberalism
    They Never Let a Crisis Go to Waste: The Truth About Disaster Liberalism Jason Chaffetz
  42. Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power
    Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power Matthew S. Cohen
  43. Debt, Deficits, and the Demise of the American Economy
    Debt, Deficits, and the Demise of the American Economy Jeff Cox

This is why you’ll love Storytel

  • Listen and read without limits

  • 800 000+ stories in 40 languages

  • Kids Mode (child-safe environment)

  • Cancel anytime

Unlimited stories, anytime

Unlimited

Listen and read as much as you want

9.99 € /month
7 days for free
  • 1 account

  • Unlimited Access

  • Offline Mode

  • Kids Mode

  • Cancel anytime

Try now