Hands-On Ethical Hacking and Network Defense by Kent Backman, Michael Simpson and James Corley (2012, Trade Paperback)

ThriftBooks (3946647)
98,9% positive Bewertungen
Preis:
US $8,75
(inkl. MwSt.)
Ca.CHF 7,07
+ $12,29 Versand
Lieferung ca. Mo, 1. Sep - Mo, 22. Sep
Rücknahme:
Keine Rückgabe, aber abgesichert über den eBay-Käuferschutz.
Artikelzustand:
Gut

Über dieses Produkt

Product Identifiers

PublisherCourse Technology
ISBN-101133935613
ISBN-139781133935612
eBay Product ID (ePID)128571878

Product Key Features

Number of Pages352 Pages
LanguageEnglish
Publication NameHands-On Ethical Hacking and Network Defense
Publication Year2012
SubjectSecurity / General, General, Security / Networking
FeaturesNew Edition
TypeTextbook
AuthorKent Backman, Michael Simpson, James Corley
Subject AreaComputers
FormatTrade Paperback

Dimensions

Item Height0.9 in
Item Weight32.9 Oz
Item Length9.2 in
Item Width7.4 in

Additional Product Features

Intended AudienceScholarly & Professional
Dewey Edition22
ReviewsForeword.Introduction.1. Ethical Hacking Overview.2. TCP/IP Concepts Review.3. Network and Computer Attacks.4. Footprinting and Social Engineering.5. Port Scanning.6. Enumeration.7. Programming for Security Professionals.8. Desktop and Server OS Vulnerabilities.9. Embedded Operating Systems: The Hidden Threat.10. Hacking Web Servers.11. Hacking Wireless Networks.12. Cryptography.13. Network Protection Systems.Appendix A: Legal Resources.Appendix B: Resources.Appendix C: Virtualization and Ethical Hacking.Glossary.
IllustratedYes
Dewey Decimal005.8
Table Of ContentForeword. Introduction. 1. Ethical Hacking Overview. 2. TCP/IP Concepts Review. 3. Network and Computer Attacks. 4. Footprinting and Social Engineering. 5. Port Scanning. 6. Enumeration. 7. Programming for Security Professionals. 8. Desktop and Server OS Vulnerabilities. 9. Embedded Operating Systems: The Hidden Threat. 10. Hacking Web Servers. 11. Hacking Wireless Networks. 12. Cryptography. 13. Network Protection Systems. Appendix A: Legal Resources. Appendix B: Resources. Appendix C: Virtualization and Ethical Hacking. Glossary.
Edition DescriptionNew Edition
SynopsisIt's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the threat. Government agencies and private companies rely on "ethical hackers"--professional security testers--to put their networks to the test and discover vulnerabilities before attackers do. If you have an understanding of computers and networking basics and are considering becoming a security tester, HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE will show you how to get started in this fascinating, growing field. This book covers the gamut, from the legalities of ethical hacking to the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and much more. Successful security testers know their work calls for creative, critical thinking, and they enjoy the challenge of digging deep to solve complex problems. Step up to the challenge with HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE., It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the threat. Government agencies and private companies rely on 'ethical hackers'--professional security testers--to put their networks to the test and discover vulnerabilities before attackers do. If you have an understanding of computers and networking basics and are considering becoming a security tester, HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE will show you how to get started in this fascinating, growing field. This book covers the gamut, from the legalities of ethical hacking to the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and much more. Successful security testers know their work calls for creative, critical thinking, and they enjoy the challenge of digging deep to solve complex problems. Step up to the challenge with HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE.
LC Classification NumberQA76.9.A25S55 2013

Alle Angebote für dieses Produkt

Sofort-Kaufen
Gebraucht
Noch keine Bewertungen oder Rezensionen