Buying Options

Kindle Price: $4.19
includes tax, if applicable

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

Deliver to your Kindle or other device

Deliver to your Kindle or other device

ABCD OF HACKING: The Beginner's guide by [Pai K, Shashank]
Kindle App Ad

ABCD OF HACKING: The Beginner's guide Kindle Edition

See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from

Length: 114 pages Enhanced Typesetting: Enabled Page Flip: Enabled
Language: English

Kindle Daily Deal: Save at least 70%
Each day we unveil a new book deal at a specially discounted price - for that day only. See today's deal or sign up for the newsletter

Product description

Product Description

Ever wondered how the computer hacks or website hacks happen? What constitutes a website hack?How come a Computer, which in layman circle, usually seen as a ‘Perfect’ machine doing computations or calculations at the lightning speed, have security vulnerabilities?!  Can't all websites be safe and secure always? If you have all these innocent doubts in your mind, then this is the right book for you, seeking answers in an intuitive way using layman terms wherever possible!

There are 7 different chapters in the book. The first three of them set up the ground basics of hacking, next three of them discuss deeply the real hackings i.e. the different types of handpicked well-known web attacks and the last chapter that sums up everything. Here is the list of chapters:

1)Introduction: A brief discussion on workings of computers, programs, hacking terminologies, analogies to hacks. This chapter addresses the role of security in a software.

2)A Simplest Hack:  To keep the reader curious, this chapter demonstrates the simplest hack in a computer program and draws all the essential components in a hacking. Though this is not a real hacking yet, it signifies the role of user input and out of box thinking in a nutshell. This chapter summarizes what a hack constitutes.

3)Web Applications: As the book is about website hacks, it would not be fair enough if there is no content related to the basics, explaining components of a website and the working of a website. This chapter makes the user ready to witness the real website hackings happening from the next chapter.

4)The SQL Injection: Reader’s first exposure to a website attack! SQL injection is most famous cyber-attack in Hackers’ community. This chapter explains causes, the way of exploitation and the solution to the problem. Of course, with a lot of analogies and intuitive examples!

5)Cross-site Scripting: Another flavor of attacks! As usual, the causes, way of exploitation and solution to the problem is described in simple terms. Again, with a lot of analogies!

6)Cross-site Request Forgery: The ultimate attack to be discussed in the book. Explaining why it is different from previous two, the causes, exploitation, solution and at the end, a brief comparison with the previous attack. This chapter uses the terms ‘Check request forgery’ and ‘Cross Bank Plundering’ sarcastically while drawing an analogy!

7)Conclusion: This chapter sums up the discussion by addressing questions like why only 3 attacks have been described? why can’t all websites be secure always? The chapter ends by giving a note to ethical hacking and ethical hackers.

Product details

  • Format: Kindle Edition
  • File Size: 5825 KB
  • Print Length: 114 pages
  • Sold by: Amazon Australia Services, Inc.
  • Language: English
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Screen Reader: Supported
  • Enhanced Typesetting: Enabled
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #549,113 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
click to open popover

No customer reviews

Review this product

Share your thoughts with other customers

Most helpful customer reviews on 4.0 out of 5 stars 2 reviews
Kindle Customer
5.0 out of 5 starsEasy to read
15 July 2018 - Published on
Verified Purchase
One person found this helpful.
Stephen Norman
3.0 out of 5 starsAn intro to hacking
16 August 2018 - Published on
One person found this helpful.