By subscribing for updates, you agree to the Mighty Ape Terms and Conditions and Privacy Policy and to receiving marketing communications from Mighty Ape. Remember, you can unsubscribe at any time.
Sold by Mighty Ape
Do you want to learn about today’s most sophisticated Hacking attacks?
Do you want to know more about Cyber criminals and their operations? Do you want to learn about Robot Networks, Trojans & Ransomware? In this book you will learn about:ADWARE
SPYWARE
MALWARE
MAN IN THE MIDDLE
LOCKY
TRAFFIC REDIRECTION
PAYLOAD INJECTION
ARP POISONING
WORMS
ROGUE WIRELESS ACCESS POINTS
MISS-ASSOCIATION ATTACKS
DE-AUTHENTICATION ATTACKS
COLLISION ATTACKS
REPLAY ATTACKS
PHISHING
VISHING
WHALING
SMISHING
SPEAR PHISHING
DUMPSTER DIVING
SHOULDER SURFING
BRUTE FORCE ATTACK
DICTIONARY ATTACKS
RAINBOW TABLES
KEYSTROKE LOGGINGS
SPOOFING
SOCIAL ENGINEERING
SPAMMING
SQL INJECTIONS
DDOS ATTACKS
TCP SYN FLOOD ATTACK
PING OF DEATH
VIRUSES
ROOTKITS
LOGIC BOMBS
TROJAN HORSES
WANNA-CRY
RANSOMWARE
BOTNETS
We are committed to protecting your rights under the Consumer Guarantees Act and working with our suppliers to assist with warranty claims. Products sold by Mighty Ape will be covered by a Manufacturer's Warranty for at least a one-year period from the date of purchase.
Your warranty will cover any manufacturing defects which, if existing, will present themselves within this warranty period.
Your warranty will not cover normal wear and tear, faults caused by misuse, and accidents which cause damage or theft caused after delivery. Using the product in a way it is not designed for will void your warranty.
Please refer to our Help Centre for more information.