Jump to ratings and reviews
Rate this book

Ethical Hacking: The Ultimate Beginner’s Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks, Including Tips on Social Engineering

Rate this book
If you've always wanted to discover the startling world of ethical hacking, then keep reading… Ever feel like you don’t even own the hardware and software you paid dearly for? Ever get the impression that you have to ask for permission before installing or changing a program on your device? Ever feel like Facebook and Instagram are listening to your conversations to show you relevant ads? You’re not alone. Half-baked products and services that chip away at your sense of ownership, independence and privacy are a part of a global wave of corporate indifference that micromanages and spies on honest, uniformed customers. None of it is intentional or meant to cause harm, which makes it all the more damning. There’s a silver lining in all of this, and that is ethical hacking. This book will shine a light on how engineers think and show you how to discern their original intentions, helping you adopt their attitude and perfect their products despite managerial crud doing their worst to stop you. In a world where everything is slowly becoming more managed and overbearing, this book is an attempt to take back some of that original awesomeness envisioned by engineers and at least make your world a slightly better place. Here’s just a tiny fraction of the topics covered in this Fighting against companiesEthical Hacking DefinedWar on the internetEngineer’s mindThe Almighty EULAThe danger of defaultsJohn DeereCopyrightYouTube ContentIDTracking usersDRMGEMA, the copyright policeTorrentsSports channelsMegaupload and AnonymousJulian AssangePatentsPenetration testingJailbreaking Android/iPhoneShut up CortanaHow an hacker could go about hacking your WiFiAnd much, much more!If you want to learn more about ethical hacking, then scroll up and click “add to cart”!

92 pages, Kindle Edition

Published January 12, 2019

16 people are currently reading
29 people want to read

About the author

Lester Evans

6 books3 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
4 (13%)
3 stars
6 (20%)
2 stars
12 (41%)
1 star
7 (24%)
Displaying 1 - 5 of 5 reviews
Profile Image for Grant.
623 reviews2 followers
February 19, 2021
Although there are important points in this book, it's mostly just a patchwork of ideology, reductionist takes and no real tips. It's a waste of time.
Profile Image for brian andrews.
145 reviews1 follower
September 3, 2020
I think the title of the book is wrong, should be around Tips on Social Engineering. I got through 3/4 of this book and it does not cover much (in any detail) on Pen Testing, Audit and Cyber security.
It does cover examples, but would consider this as a coffee table book.

Profile Image for Anthony Smitha.
80 reviews1 follower
January 9, 2021
If you read the book with an intent to see the process, you’ll pick up on some of the social engineering tactics that will be used against you.
Profile Image for Angstreichian.
142 reviews14 followers
August 30, 2021
Completely irrelevant title but on the right track politically and with things like open source and anonymity.
Displaying 1 - 5 of 5 reviews

Can't find what you're looking for?

Get help and learn more about the design.