Hands-On Ethical Hacking and Network Defense - James Corley, Kent Backman

Hands-On Ethical Hacking and Network Defense

Buch | Softcover
352 Seiten
2012 | New edition
Cengage Learning, Inc (Verlag)
978-1-133-93561-2 (ISBN)
69,80 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks, this book helps you to develop the critical thinking skills and creativity essential to becoming a knowledgeable, efficient computer security professional. It teaches you the techniques and methodologies of security testing.
It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the threat. Government agencies and private companies rely on "ethical hackers"--professional security testers--to put their networks to the test and discover vulnerabilities before attackers do. If you have an understanding of computers and networking basics and are considering becoming a security tester, HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE will show you how to get started in this fascinating, growing field. This book covers the gamut, from the legalities of ethical hacking to the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and much more. Successful security testers know their work calls for creative, critical thinking, and they enjoy the challenge of digging deep to solve complex problems. Step up to the challenge with HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE.

Michael T. Simpson is president/senior consultant of MTS Consulting, Inc., a firm specializing in network security and network design. His certifications include CEH, CISSP, Security+, OSSTMM Professional Security Tester (OPST), OSSTMM Professional Security Analyst (OPSA), ITIL, MCSE, MCDBA, MCSD, MCT, and OCP. He also holds an M.B.A. from M.B.A. Chaminade University and has authored or co-authored eight books. Mike has more than 30 years of industry experience, including 20 years with the U.S. Department of Defense, where he designed and configured computer networks, served as an Oracle® database and UNIX® administrator, and held multiple cyber security positions. Kent Backman's expertise is in intrusion analysis, network vulnerability assessment, and opensource solution engineering. His interest and skill in ethical hacking developed while managing Web servers for Fortune 500 companies. An analyst for many security incident response teams, Kent spent several years in Baghdad as part of the advisory team to the Iraq Ministry of Defense, specializing in network security and Linux engineering. He holds RHCT, MCSA, CISSP, and CEH certifications and is a network security consultant in Honolulu. James (Jim) Corley has more than twenty-five years of experience in IT as a systems analyst, network engineer, and security professional. He worked for the DoD for nine years as a database administrator and information systems security officer. For the past sixteen years, Jim has been a consultant to the DoD on dozens of IT programs supporting both classified and unclassified voice, video, and data systems. He has been a Certified Information Systems Security Professional (CISSP) since 2002.

Foreword.
Introduction.
1. Ethical Hacking Overview.
2. TCP/IP Concepts Review.
3. Network and Computer Attacks.
4. Footprinting and Social Engineering.
5. Port Scanning.
6. Enumeration.
7. Programming for Security Professionals.
8. Desktop and Server OS Vulnerabilities.
9. Embedded Operating Systems: The Hidden Threat.
10. Hacking Web Servers.
11. Hacking Wireless Networks.
12. Cryptography.
13. Network Protection Systems.
Appendix A: Legal Resources.
Appendix B: Resources.
Appendix C: Virtualization and Ethical Hacking.
Glossary.

Erscheint lt. Verlag 17.4.2012
Verlagsort Florence
Sprache englisch
Maße 188 x 234 mm
Gewicht 924 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 1-133-93561-3 / 1133935613
ISBN-13 978-1-133-93561-2 / 9781133935612
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00