Normal view MARC view ISBD view

Hands-on ethical hacking and network defense / Michael T. Simpson and Nicholas D. Antill.

By: Simpson, Michael T, 1954-.
Contributor(s): Antill, Nicholas D.
Boston, Massachusetts, USA : Cengage Learning, ©2017Edition: Third edition.Description: xxii, 426 pages : illustrations ; 24 cm + 1 DVD-ROM (4 3/4 in.).Content type: text. ISBN: 9781285454672 (pbk).Subject(s): Penetration testing (Computer security) | Computer security | HackersDDC classification: 005.8/Si58 Other classification: COECS/C
Contents:
1. Ethical Hacking Overview.2. TCP/IP Concepts Review.3. Network and Computer Attacks.4. Footprinting and Social Engineering.5. Port Scanning.6. Enumeration.7. Programming for Security Professionals.8. Desktop and Server OS Vulnerabilities.9. Embedded Operating Systems: The Hidden Threat.10. Hacking Web Applications.11. Hacking Wireless Networks.12. Cryptography.13. Network Protection Systems.Appendix A: Legal Resources.Appendix B: Resources.
Summary: "Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today's cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking." -- Provided by publisher.
Item type Current location Call number Status Date due Barcode
Books Books College Library
General Reference Section
COECS/C 005.8/Si58 (Browse shelf) Available 83863

"Information security"--Cover. Includes index. "Includes a bootable DVD-[ROM] that enables you to use Kali Linux on a classroom or home computer running a Windows OS. Kali, a world-renowned security-testing application and OS, makes hands-on activities easier to perform; therefore, you can spend more time learning how to use security tools than learning how to install and configure Linux. To save time spent downloading, and installing software on your system, you can do all activities by using the DVD-[ROM], which contains all the necessary software tools"--page xiv.

Includes index.

1. Ethical Hacking Overview.2. TCP/IP Concepts Review.3. Network and Computer Attacks.4. Footprinting and Social Engineering.5. Port Scanning.6. Enumeration.7. Programming for Security Professionals.8. Desktop and Server OS Vulnerabilities.9. Embedded Operating Systems: The Hidden Threat.10. Hacking Web Applications.11. Hacking Wireless Networks.12. Cryptography.13. Network Protection Systems.Appendix A: Legal Resources.Appendix B: Resources.

"Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today's cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking." -- Provided by publisher.

In English.

There are no comments for this item.

Log in to your account to post a comment.