Track using Order ID
Login and do more!
- Track individual Orders
- View your entire Order history
- Cancel individual Orders
- Conveniently review products and sellers
* Shipments from locations where relevant permissions have been obtained.
You have probably noticed varying estimated delivery times for Sellers of the product you are interested in. Delivery times are influenced by product availability, geographic location of the Seller, your shipping destination and the courier partner's time-to-deliver to your location.
Please enter your default pin code on the product page (you don't have to enter it every single time) to know more accurate delivery times on the product page itself.
Enter your pincode on the product page (you don't have to enter it every single time) to know whether the product can be delivered to your location.
If you haven't provided your pincode until the checkout stage, the pincode in your last used shipping address will be used to check for serviceability.
Whether your location can be serviced or not depends on:
At times Sellers prefer not to ship to certain locations. This is entirely at their discretion.
|10 days from delivery||Damaged, Defective, Item not as described||Replacement|
|30 days from delivery||Damaged, Defective, Item not as described||Replacement|
|10 days from delivery||Exchange for colors and size, Does not fit||Exchange|
|30 days from delivery||Exchange for colors and size, Does not fit||Exchange|
An Unofficial Guide To Ethical Hacking by Ankit Fadia provides an introduction to the techniques of hacking.
Summary of The Book
Hacking involves the ability to penetrate any computer system or network, using its inherent weakness or security loopholes. The word has negative connotations, but the techniques can also be used in positive ways. An Unofficial Guide To Ethical Hacking, authored by Ankit Fadia, introduces the reader to the world of hacking, and explains the various techniques, and how they can used beneficially.
The word hacker generally invokes the picture of a technical wizard who exploits weaknesses in networks and systems for destructive purposes. But, hackers also work openly for companies that use their expertise to find the loopholes in their systems so that they can fix them before those weak points are exploited by others for negative purposes.
Hackers generally have a thorough knowledge of the system, the OS, hardware, security implementations, and especially the drawbacks in all of these. They can use these weak points to gain entry into the systems or networks where they have no official authorization.
The hackers community are now campaigning to change their image, to differentiate between ethical hackers and others who use the techniques for illegal activities. The hacking community generally refers to ethical hackers as hackers and criminal hackers as crackers.
Hackers use a variety of methods to gain access to a system. An Unofficial Guide To Ethical Hacking starts by explaining who is a hacker, and then takes the readers into the world of hacking. Various hacking methods are also explained. The author explores hacking into networks and the World Wide Web, and techniques used to gain access, types of of attacks, etc.
Privacy attacks, input validation attacks, password hacking, denial of service attacks, and more such threats are discussed. The book then explains TCP/IP protocols, firewalls, and batch files and shows how some loopholes in these can be exploited by hackers. Then, the book takes a look at virus and exploit scripts.
An Unofficial Guide To Ethical Hacking is considered to be a good introduction to the subject of hacking and system security. It give a detailed explanation of the concepts, methods, and even types of hacking - a good introduction for those who want to get familiar with the hardcore internal working of a system.
About Ankit Fadia
Ankit Fadia is a system security consultant who wrote the book An Unofficial Guide to Ethical Hacking when he was just 15 years old. He was born in 1985, and he completed his education at Delhi Public School.
Some books by Ankit Fadia include How to Unblock Everything on the Internet, Even You Can Hack: E-mail Hacking, Windows Hacking 2.0, and Software Hacking.
|Publisher||MACMILLAN PUBLISHERS INDIA LTD|
|Number of Pages||616 Pages|
|Author Info||Ankit Fadia - A 17-year-old student fascinated and intrigued by the wonder world of Computer Technology. A digital intelligence consultant with a definitive experience in the field of network security.|
Have you used this product?
Rate it now.Write a Review
Jun 29, 2014
Isse ghatiya book ni milega bhaiyon...
Feb 24, 2014
Dec 25, 2013
Great Book! Must Buy.
Nov 7, 2013
God awful book.
Jul 2, 2012
Minus one rating....
Nov 19, 2011
Completely plagiarized from other materials.This is one of the most worst book ever for hacking (as media calls it, computer culture calls it cracking). Ankit Fadia is a scumbag who just plagiarized other great books. PLease do not buy it! BTW google for "Ankit Fadia fraud" or read the Controversy section in his wikipedia article.
Nov 14, 2011
The Worst Ever Book i have ever studiedThe book did not have anything inside as it says in the title, it is the worst ever title i have ever read, i will not recommend this book for ethical hacking, there are lots of good books available out there
Nov 26, 2011
BACK DATED BOOKMONEY WASTED FOR THIS BACKDATED BOOK 'AN UNOFFICIAL GUIDE TO ETHICAL HACKING' BASED ON WINDOWS 98. ANKIT FADIA MAY BE REQUESTED TO UPDATE THIS BOOK. AS NOW A DAYS NO ONE IS USING WINDOWS 98, PURCHASING THIS BOOK WAS A WASTAGE OF MONEY.
Mar 3, 2012
I canât imagine why it was ever published!Quite frankly, I canât imagine why it was ever published! Aside from the fact that it was published this year (2002), and aside from the fact that the author appears to have used a Windows 95 machine to do his tinkering (I wonât even give the author the respect of using the word âhackingâ), this book is riddled with misinformation, inconsistencies, and uncommented source code (which incidentally only compiles, according to the author, on a version of *nix that very few people use). Any hobbyist with more than one year of experience knows AT LEAST whatâs covered in this book, and they… (Expand)
Feb 8, 2012
it is really a useless bookas i think it is a useless book the book of hacking should be contain latest techniques.
Feb 22, 2012
Absolutely rubbishIf you know the slightest about computers, going through the pages of this book you can tell how rubbish it is. I don't see the point of this because from no part of the content here you will actually end up learning anything. And this stands despite the fact that every thing in this book is a lift-off from various other sources. I mean if you're going to do some plagiarism, at least do it right! If I could give this no stars at all, I would.
Feb 16, 2012
An Unofficial Guide To Ethical Hacking 1403929645well this book is not even fit for ratting..just the worst of all books i ever found...Just making fool to the people who are not aware of hacking thats all..Even i was fooled...dont ever ever ever buy books written by Ankit fadiya...
Jan 13, 2012
OMGOMG i was a hacker at age 12!!
Jul 2, 2012
Minus one rating....I just wish there was minus rating, at least for this book...…
Jan 21, 2012
Substandard comic bookI myself am a techie , and I have read some pages of this book in google books. This book is totally worthless and the author is a kid who wants to make money online. Not even worth for beginners who wants to get acquainted with hacking. Flipkart shud remove this book.