Hands-On Ethical Hacking and Network Defense / Edition 1

Hands-On Ethical Hacking and Network Defense / Edition 1

by Michael T. Simpson
     
 

ISBN-10: 0619217081

ISBN-13: 9780619217082

Pub. Date: 10/19/2005

Publisher: Cengage Learning


Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This timely text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its

Overview


Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This timely text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today's cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking.

Product Details

ISBN-13:
9780619217082
Publisher:
Cengage Learning
Publication date:
10/19/2005
Edition description:
BK&CD-ROM
Pages:
480
Product dimensions:
10.80(w) x 8.40(h) x 1.10(d)

Related Subjects

Table of Contents


1. Ethical Hacking Overview. 2. TCP/IP Concepts Review. 3. Network and Computer Attacks. 4. Footprinting and Social Engineering. 5. Port Scanning. 6. Enumeration. 7. Programming for Security Professionals. 8. Desktop and Server OS Vulnerabilities. 9. Embedded Operating Systems: The Hidden Threat. 10. Hacking Web Applications. 11. Hacking Wireless Networks. 12. Cryptography. 13. Network Protection Systems. Appendix A: Legal Resources. Appendix B: Resources.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >