ISBN-10:
1435486099
ISBN-13:
2901435486095
Pub. Date:
03/17/2010
Publisher:
Cengage Learning
Hands-On Ethical Hacking and Network Defense / Edition 2

Hands-On Ethical Hacking and Network Defense / Edition 2

by Michael T. Simpson

Paperback

View All Available Formats & Editions
Current price is , Original price is $199.95. You
Select a Purchase Option (Older Edition)
  • purchase options
    $43.91 $199.95 Save 78% Current price is $43.91, Original price is $199.95. You Save 78.03950987746937%.
    • Free return shipping at the end of the rental period details
    • Textbook Rentals in 3 Easy Steps  details
    icon-error
    Note: Access code and/or supplemental material are not guaranteed to be included with textbook rental or used textbook.
  • purchase options
    $96.21 $199.95 Save 52% Current price is $96.21, Original price is $199.95. You Save 52%.
    icon-error
    Note: Access code and/or supplemental material are not guaranteed to be included with textbook rental or used textbook.

Overview

Hands-On Ethical Hacking and Network Defense / Edition 2

Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This timely text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today's cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking.

Product Details

ISBN-13: 2901435486095
Publisher: Cengage Learning
Publication date: 03/17/2010
Edition description: Older Edition
Pages: 480
Product dimensions: 6.00(w) x 1.25(h) x 9.00(d)

About the Author

Michael T. Simpson is president/senior consultant of MTS Consulting, Inc., a firm specializing in network security and network design. His certifications include CEH, CISSP, Security+, OSSTMM Professional Security Tester (OPST), OSSTMM Professional Security Analyst (OPSA), ITIL, MCSE, MCDBA, MCSD, MCT, and OCP. He also holds an M.B.A. from M.B.A. Chaminade University and has authored or co-authored eight books. Mike has more than 30 years of industry experience, including 20 years with the U.S. Department of Defense, where he designed and configured computer networks, served as an Oracle database and UNIX administrator, and held multiple cyber security positions.


Nicholas Antill is a seasoned information security professional with over 10 years of specialized cyber security experience. He specializes in penetration testing, proactive security controls, and network defense. In addition to earning a B.S. from the University of Pittsburgh and an M.S. from Capella University, he holds many industry certifications, including the OSCP, GWAPT, GPEN, GCIH, CISA, CISSP, and GCFE. Nicholas started his career at a small grocery chain in Pittsburgh, where he developed a fascination with network attack and defense techniques. He worked in support of the U.S. Department of Justice and the U.S. Department of Defense before returning to the private sector, where he currently manages the ethical hacking program at a large U.S. financial institution.

Table of Contents

1. Ethical Hacking Overview. 2. TCP/IP Concepts Review. 3. Network and Computer Attacks. 4. Footprinting and Social Engineering. 5. Port Scanning. 6. Enumeration. 7. Programming for Security Professionals. 8. Desktop and Server OS Vulnerabilities. 9. Embedded Operating Systems: The Hidden Threat. 10. Hacking Web Applications. 11. Hacking Wireless Networks. 12. Cryptography. 13. Network Protection Systems. Appendix A: Legal Resources. Appendix B: Resources.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews