Image from Google Jackets

Hands-on ethical hacking and network defense / Michael T. Simpson

By: By: Material type: TextTextPublication details: Australia: Thomson, 2006Description: xv+464 ill. ; 23 cm. With CD-ROMISBN:
  • 9780619217082
Subject(s): DDC classification:
  • 005.8 SIM 23
LOC classification:
  • QA76.9.A25 S55 2013
Online resources:
Contents:
Ethical hacking overview -- TCP/IP concepts review -- Network and computer attacks -- Footprinting and social engineering -- Port scanning -- Enumeration -- Programming for security professionals -- Desktop and server OS vulnerabilities -- Embedded operating systems : the hidden threat -- Hacking web servers -- Hacking wireless networks -- Cryptography -- Network protection systems.
Summary: Cyber crime and the threat of computer-related attacks are crowing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the thread. If you have an understanding of computers and networking basics and are considering becoming a security tester, this book will show you how to get started in this field. It covers the legalities of ethical hacking, the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and more--
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Notes Date due Barcode Item holds
Reference Book Reference Book Alliance School of Law 005.8 SIM (Browse shelf(Opens below)) Not for loan Includes 1 CD ROM L02739
Total holds: 0

Includes bibliographical references (p. 379-385) and index.

Ethical hacking overview -- TCP/IP concepts review -- Network and computer attacks -- Footprinting and social engineering -- Port scanning -- Enumeration -- Programming for security professionals -- Desktop and server OS vulnerabilities -- Embedded operating systems : the hidden threat -- Hacking web servers -- Hacking wireless networks -- Cryptography -- Network protection systems.

Cyber crime and the threat of computer-related attacks are crowing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the thread. If you have an understanding of computers and networking basics and are considering becoming a security tester, this book will show you how to get started in this field. It covers the legalities of ethical hacking, the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and more--

There are no comments on this title.

to post a comment.