Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense

Author: Michael T. Simpson

Publisher: Cengage Learning

ISBN: 9781305480681

Category: Computers

Page: 512

View: 129

Download BOOK »

Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This timely text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today’s cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
The Basics of Hacking and Penetration Testing
Language: en
Pages: 180
Authors: Patrick Engebretson
Categories: Computers
Type: BOOK - Published: 2011-07-21 - Publisher: Elsevier

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is required. It shows how to properly
Ninja Hacking
Language: en
Pages: 336
Authors: Thomas Wilhelm, Jason Andress
Categories: Computers
Type: BOOK - Published: 2010-11-02 - Publisher: Elsevier

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world
Hacking the Cable Modem
Language: en
Pages: 320
Authors: DerEngel
Categories: Computers
Type: BOOK - Published: 2006 - Publisher: No Starch Press

A guide to cable modems includes tutorials, diagrams, source code examples, hardware schematics, and hacks to get the most out of this Internet connection.
No Tech Hacking
Language: en
Pages: 384
Authors: Johnny Long
Categories: Computers
Type: BOOK - Published: 2011-04-18 - Publisher: Syngress

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America. As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic
The Birthday of Hacking
Language: en
Pages:
Authors: Sfraye Tilaye Teshome
Categories: Business & Economics
Type: BOOK - Published: - Publisher: Sfraye Tilaye

The Birthday of Hacking will explain to you the most common way to hacking, And it introduces you to security. This book helps you realize how hacking works and how to protect your systems from being hacked. Also, it will help you to protect your system from hacking. It is