Normal view MARC view ISBD view

Hacker techniques, tools, and incident handling / Sean-Philip Oriyano, Michael G. Solomon.

By: Oriyano, Sean-Philip [author.].
Contributor(s): Solomon, Michael (Michael G.), 1963- [author.].
Publisher: Burlington, MA : Jones & Bartlett Learning, ©2020Edition: Third edition.Description: xvi, 407 pages : illustrations ; 24 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781284147803.Subject(s): Computer security | Penetration testing (Computer security) | Computer networks -- Security measures | HackersDDC classification: 005.8 Or49 2020
Contents:
pt.1: Hacker techniques and tools -- Hacking: the next generation -- TCP/IP review -- Cryptographic concepts -- Physical security -- pt.2: A technical and social overview of hacking -- Footprinting tools and techniques -- Port scanning -- Enumeration and computer system hacking -- Wireless vulnerabilities -- Web and database attacks -- Malware -- Sniffers, session hijacking, and denial of service attacks -- Linux and penetration testing -- Social engineering -- pt.3: Incident response and defensive technologies -- Defensive technologies.
Summary: This edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cybersecurity activities, with increased focus on pen testing and red teams.
Item type Current location Collection Call number Status Date due Barcode
Books Books College Library
General Circulation Section
GC GC 005.8 Or49 2020 (Browse shelf) Available HNU002612

Includes bibliographical references (pages 387-389) and index.

pt.1: Hacker techniques and tools --
Hacking: the next generation --
TCP/IP review --
Cryptographic concepts --
Physical security --
pt.2: A technical and social overview of hacking --
Footprinting tools and techniques --
Port scanning --
Enumeration and computer system hacking --
Wireless vulnerabilities --
Web and database attacks --
Malware --
Sniffers, session hijacking, and denial of service attacks --
Linux and penetration testing --
Social engineering --
pt.3: Incident response and defensive technologies --
Defensive technologies.

This edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cybersecurity activities, with increased focus on pen testing and red teams.

College of Engineering and Computer Studies Bachelor of Science in Computer Engineering

Text in English

There are no comments for this item.

Log in to your account to post a comment.