000 02394cam a2200433 i 4500
999 _c124962
_d124962
001 20501332
003 OSt
005 20220304103838.0
007 ta
008 180518s2020 mau b 001 0 eng
010 _a 2018023782
020 _a9781284147803
_q(pbk.)
040 _aDLC
_beng
_cHNU
_erda
_dDLC
042 _apcc
050 0 0 _aTK5105.59
_b.O786 2020
082 0 0 _a005.8 Or49 2020
_223
_3GC
100 1 _aOriyano, Sean-Philip,
_eauthor.
245 1 0 _aHacker techniques, tools, and incident handling /
_cSean-Philip Oriyano, Michael G. Solomon.
250 _aThird edition.
264 1 _aBurlington, MA :
_bJones & Bartlett Learning,
_c©2020.
300 _axvi, 407 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references (pages 387-389) and index.
505 _apt.1: Hacker techniques and tools -- Hacking: the next generation -- TCP/IP review -- Cryptographic concepts -- Physical security -- pt.2: A technical and social overview of hacking -- Footprinting tools and techniques -- Port scanning -- Enumeration and computer system hacking -- Wireless vulnerabilities -- Web and database attacks -- Malware -- Sniffers, session hijacking, and denial of service attacks -- Linux and penetration testing -- Social engineering -- pt.3: Incident response and defensive technologies -- Defensive technologies.
520 _aThis edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cybersecurity activities, with increased focus on pen testing and red teams.
521 _aCOECS
_bBachelor of Science in Computer Engineering
546 _aText in English
650 0 _aComputer security.
650 0 _aPenetration testing (Computer security)
650 0 _aComputer networks
_xSecurity measures.
650 0 _aHackers.
700 1 _aSolomon, Michael
_q(Michael G.),
_d1963-
_eauthor.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
_h000-099