Open Access Open Access  Restricted Access Subscription Access

Moral Hacking & Hacking Assaults

Mohsin Rashid Shaikh, Harshal Sunil Sangle

Abstract


Know about hacking and hacker, Know about who is a hacker and how to attack?, Identify different types of hackers.


Full Text:

PDF

References


Internet Crime Complaint Centre link: www.ic3.gov

Liu, Bingchang; Shi, Liang; Cai, Zhuhua; Li, Min; “Software vulnerability Discovery Techniques: A Survey” IEEE Conference Publication, DOI: 10.1109/MINES.2012.202, Page(s) 152-156, 2012

Smith, Yurick, Doss “Ethical Hacking” IEEE Conference Publication, DOI: 10.1147/sj.403.0769, Page(s): 769-780

Bradley, Rubin “Computer Security Education and Research: Handle with care” IEEE Conference Publication, DOI: 10.1109/MSP.2006.146, Page(s): 56-59

WIKIPEDIA

GURPREET K. JUNEJA,”ETHICAL HANKING :A TECHNIQUE TO ENHANCE INFORMATION SECURITY”INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS(3297: 2007),VOL. 2,ISSUE 12,DECEMBER2013

K.BALA CHOWDAPPA ET AL, / (IJCSIT) INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGIES, VOL. 5 (3) , 2014, 3389-3393 [4] ELEVENTH LACCEI LATIN AMERICAN AND CARIBBEAN CONFERENCE FOR ENGINEERING AND TECHNOLOGY (LACCEI’2013)

”INNOVATION IN ENGINEERING, TECHNOLOGY AND EDUCATION FOR COMPETITIVENESS AND PROSPERITY” AUGUST 14 - 16, 2013 CANCUN, MEXICO. “FACULTY ATTITUDES TOWARD TEACHING ETHICAL HACKING TO COMPUTER AND INFORMATION SYSTEMS “UNDERGRADUATES STUDENTS AURY M. CURBELO, PH.D,ALFREDO CRUZ, PH.D.

KUMAR UTKARSH” SYSTEM SECURITY AND ETHICAL HACKING”


Refbacks

  • There are currently no refbacks.