Hands-on ethical hacking and network defense
Simpson, Michael T 1954
Hands-on ethical hacking and network defense Michael T. Simpson - Australia Thomson 2006 - xv+464 ill. ; 23 cm. With CD-ROM
Includes bibliographical references (p. 379-385) and index.
Ethical hacking overview -- TCP/IP concepts review -- Network and computer attacks -- Footprinting and social engineering -- Port scanning -- Enumeration -- Programming for security professionals -- Desktop and server OS vulnerabilities -- Embedded operating systems : the hidden threat -- Hacking web servers -- Hacking wireless networks -- Cryptography -- Network protection systems.
Cyber crime and the threat of computer-related attacks are crowing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the thread. If you have an understanding of computers and networking basics and are considering becoming a security tester, this book will show you how to get started in this field. It covers the legalities of ethical hacking, the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and more--
9780619217082
2012930937
Penetration testing (Computer security)
Computer security.
Computer networks--Security measures.
Computer hackers.
QA76.9.A25 / S55 2013
005.8 SIM
Hands-on ethical hacking and network defense Michael T. Simpson - Australia Thomson 2006 - xv+464 ill. ; 23 cm. With CD-ROM
Includes bibliographical references (p. 379-385) and index.
Ethical hacking overview -- TCP/IP concepts review -- Network and computer attacks -- Footprinting and social engineering -- Port scanning -- Enumeration -- Programming for security professionals -- Desktop and server OS vulnerabilities -- Embedded operating systems : the hidden threat -- Hacking web servers -- Hacking wireless networks -- Cryptography -- Network protection systems.
Cyber crime and the threat of computer-related attacks are crowing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the thread. If you have an understanding of computers and networking basics and are considering becoming a security tester, this book will show you how to get started in this field. It covers the legalities of ethical hacking, the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and more--
9780619217082
2012930937
Penetration testing (Computer security)
Computer security.
Computer networks--Security measures.
Computer hackers.
QA76.9.A25 / S55 2013
005.8 SIM