Practical Hacking Techniques and Countermeasures - Mark D. Spivey

Practical Hacking Techniques and Countermeasures

(Autor)

Buch | Softcover
750 Seiten
2006
Auerbach (Verlag)
978-0-8493-7057-1 (ISBN)
118,45 inkl. MwSt
This insider’s guide examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack. It shows how an attack is conceptualized, formulated, and performed. With the VMware® Workstation software package available on the downloadable resources, it uses virtua
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws.

Written in a lab manual style, the book begins with the installation of the VMware® Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks.

Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures

By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

Mark D. Spivey

Preparation. Social Engineering. Footprinting. Scanning. Sniffing. Spoofing. Passwords. Exploit and Attacks. Wireless, Trojans, MTM, Hiding Data. Port Redirection. Denial of Service.

Erscheint lt. Verlag 2.11.2006
Zusatzinfo 1 Tables, black and white; 1119 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 178 x 254 mm
Gewicht 1542 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-8493-7057-4 / 0849370574
ISBN-13 978-0-8493-7057-1 / 9780849370571
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99