Hands-on ethical hacking and network defense / Michael T. Simpson, Nicholas Antill.
By: Simpson, Michael T.
Contributor(s): Antill, Nicholas.
Boston, Massachusetts : Cengage Learning, ©2017Description: xxii, 426 pages ; illustration; 24 cm. optical disk (CD-ROM).Content type: text Media type: unmediated Carrier type: volumeISBN: 9781285454610.Subject(s): Penetration testing (Computer security) | Computer security | Computer networks -- Security measures | Computer hackersGenre/Form: Print books.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | QA76.9.A25 S55 2017 (Browse shelf) | Available | AU00000000013297 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
QA76.9.A25 S46382 2017 The cyber attack survival manual : tools for surviving everything from identity theft to the digital apocalypse / | QA76.9 .A25 S495 2014 Threat modeling : designing for security / | QA76.9.A25 S54 2020 CompTIA security+ certification study guide : network security essentials / | QA76.9.A25 S55 2017 Hands-on ethical hacking and network defense | QA76.9.A25 S55 2020 Penetration testing for dummies / <br> | QA76.9.A25 S56 2018 Beginning ethical hacking with Kali Linux : computational techniques for resolving security issues / | QA76.9 .A25 S562 2014 Cybersecurity and cyberwar : what everyone needs to know / |
Includes bibliographical references (p. 413-426) and index.
1. Ethical Hacking Overview.2. TCP/IP Concepts Review.3. Network and Computer Attacks.4. Footprinting and Social Engineering.5. Port Scanning.6. Enumeration.7. Programming for Security Professionals.8. Desktop and Server OS Vulnerabilities.9. Embedded Operating Systems: The Hidden Threat.10. Hacking Web Applications.11. Hacking Wireless Networks.12. Cryptography.13. Network Protection Systems.Appendix A: Legal Resources.Appendix B: Resources.
"Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today's cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking." -- Provided by publisher.