TY - BOOK AU - Simpson,Michael T AU - Backman,Kent AU - Corley,James E. TI - Hands-on ethical hacking and network defense SN - 9780619217082 AV - QA76.9.A25 S55 2013 U1 - 005.8 SIM 23 PY - 2006/// CY - Australia PB - Thomson KW - Penetration testing (Computer security) KW - Computer security KW - Computer networks KW - Security measures KW - Computer hackers N1 - Includes bibliographical references (p. 379-385) and index; Ethical hacking overview -- TCP/IP concepts review -- Network and computer attacks -- Footprinting and social engineering -- Port scanning -- Enumeration -- Programming for security professionals -- Desktop and server OS vulnerabilities -- Embedded operating systems : the hidden threat -- Hacking web servers -- Hacking wireless networks -- Cryptography -- Network protection systems N2 - Cyber crime and the threat of computer-related attacks are crowing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the thread. If you have an understanding of computers and networking basics and are considering becoming a security tester, this book will show you how to get started in this field. It covers the legalities of ethical hacking, the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and more-- UR - http://www.loc.gov/catdir/enhancements/fy1303/2012930937-b.html UR - http://www.loc.gov/catdir/enhancements/fy1303/2012930937-d.html UR - http://www.loc.gov/catdir/enhancements/fy1303/2012930937-t.html ER -