Ethical Hacking and Countermeasures: Secure Network Infrastructures / Edition 1

Ethical Hacking and Countermeasures: Secure Network Infrastructures / Edition 1

by EC-Council
ISBN-10:
1435483650
ISBN-13:
9781435483651
Pub. Date:
09/24/2009
Publisher:
Cengage Learning
Select a Purchase Option
  • purchase options
    $40.67 $99.95 Save 59% Current price is $40.67, Original price is $99.95. You Save 59%.
    icon-error
    Note: Access code and/or supplemental material are not guaranteed to be included with textbook rental or used textbook.
  • purchase options

Overview

Ethical Hacking and Countermeasures: Secure Network Infrastructures / Edition 1


The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information.

Product Details

ISBN-13: 9781435483651
Publisher: Cengage Learning
Publication date: 09/24/2009
Series: EC-Council Press Series
Pages: 192
Sales rank: 1,124,404
Product dimensions: 8.40(w) x 10.80(h) x 0.50(d)

Table of Contents


Hacking Wireless Networks. Physical Security. Evading IDS, Firewalls and Detecting Honeypots. Cryptography.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews