CONCLUSION: -
Thanks For reading this book and I hope the contents described in this book will help you to know the intents of hackers. Now you are capable of securing your own and your surrounding computers, mobile phones and other networks from the Threat we called “HACKING- An art of exploitation ”.
BIBLIOGRAPHY
Various www.blogspot.com Blogs
Pc advisor
Hacking for dummies
Hacking exposed
Hacking crux
XDA developers
Etc.