×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Hands-On Ethical Hacking and Network Defense / Edition 2
     

Hands-On Ethical Hacking and Network Defense / Edition 2

4.0 1
by Michael T. Simpson
 

See All Formats & Editions

ISBN-10: 1435486099

ISBN-13: 9781435486096

Pub. Date: 03/17/2010

Publisher: Cengage Learning

Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and

Overview

Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Readers are provided with updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also included is a thorough update of the federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker.

Product Details

ISBN-13:
9781435486096
Publisher:
Cengage Learning
Publication date:
03/17/2010
Edition description:
Older Edition
Pages:
480
Sales rank:
707,670
Product dimensions:
7.40(w) x 9.10(h) x 0.90(d)

Table of Contents

1: Ethical Hacking Overview. 2: TCP/IP Concepts Review. 3: Network and Computer Attacks. 4: Footprinting and Social Engineering. 5: Port Scanning. 6: Enumeration. 7: Programming for Security Professionals. 8: Embedded Operating Systems. 9: Linux Operating System Vulnerabilities. 10: Hacking Web Servers. 11: Hacking Wireless Networks. 12: Cryptography. 13: Protecting Networks with Security Devices. Appendix A: Legal Resources. Appendix B: Resources. Appendix C: Virtual Machine Instructions. Appendix: Documentation Forms for Penetration Tests (Will appear on DVD in the back of the book only).

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews