
Size: 5~ mb
Chapter 1: being a hacker
Chapter 2: Windows and linux
Chapter 3: ports and protocols
Chapter 4: services and connections
Chapter 5: system identification
Chapter 6: malware
Chapter 7: attack analysis
Chapter 8: forensics
Chapter 9: email security
Chapter 10: web security and privacy
Chapter 11: passwords
Chapter 12: legalities and ethics
Chapter 2: Windows and linux
Chapter 3: ports and protocols
Chapter 4: services and connections
Chapter 5: system identification
Chapter 6: malware
Chapter 7: attack analysis
Chapter 8: forensics
Chapter 9: email security
Chapter 10: web security and privacy
Chapter 11: passwords
Chapter 12: legalities and ethics



No comments:
Post a Comment