Hands-on Ethical Hacking and Network Defense
Seiten
2005
Course Technology Inc
978-0-619-21708-2 (ISBN)
Course Technology Inc
978-0-619-21708-2 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
With cyber-terrorism and corporate espionage, there is a need for trained network security professionals. This book describes the tools and penetration testing methodologies used by ethical hackers to understand how to protect computer networks. It discusses the ethical hacker, and how important they are in protecting from cyber attacks.
1. Ethical Hacking Overview 2. TCP/IP Concepts Review 3. Network and Computer Attacks 4. Footprinting and Social Engineering 5. Port Scanning 6. Enumeration 7. Programming for Security Professionals 8. Microsoft Operating System Vulnerabilites 9. Linux Operating System Vulnerabilities 10. Hacking Web Servers 11. Hacking Wireless Networks 12. Cryptography 13. Protecting Networks with Security Devices Appendices A: Legal Resources B: Resources C: Documentation Forms for Penetration Tests
Erscheint lt. Verlag | 19.10.2005 |
---|---|
Verlagsort | Boston, MA |
Sprache | englisch |
Maße | 216 x 274 mm |
Gewicht | 1112 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-619-21708-1 / 0619217081 |
ISBN-13 | 978-0-619-21708-2 / 9780619217082 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |