Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--
Image from Google Jackets

Hacker techniques, tools, and incident handling / Sean-Philip Oriyano and Michael Gregg.

By: Contributor(s): Material type: TextTextSeries: Jones & Bartlett Learning information systems security & assurance seriesPublisher: Burlington, MA : Jones & Bartlett Learning, [2014]Copyright date: ©2014Edition: Second editionDescription: xvii, 417 pages : illustrations (black and white) ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781284031713 (pbk.)
  • 9780763791834 (pbk.)
  • 0763791830 (pbk.)
Subject(s): DDC classification:
  • 22 005.8 O.S.H
Contents:
Ch1 :The Evolution of Hacking -- Ch2 : TCP/IP Review -- Ch3: Cryptographic Concepts -- Ch 4 : Physical Security -- Ch5 : Footprinting the Environment -- Ch6 : Scanning the Environment and Network -- Ch7 : System Enumeration and System Hacking -- Ch8 : Wireless Vulnerabilitie s -- Ch9 : Web Applications and Cloud Technologies -- Ch10 : Malware -- Ch11 : Sniffers, Session Hijacking, and Denial of Service -- Ch12 : Backtrack R3 -- Ch13 : Social Engineering -- Ch14 : Incident Response -- Ch15 : Defensive Technologies
Summary: This book begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, this second edition provides readers with a clear, comprehensive introduction to the many threats on the Internet environment and security, and what can be done to combat them.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

computer bookfair2015

Includes bibliographical referencesand index.

Ch1 :The Evolution of Hacking -- Ch2 : TCP/IP Review -- Ch3: Cryptographic Concepts -- Ch 4 : Physical Security -- Ch5 : Footprinting the Environment -- Ch6 : Scanning the Environment and Network -- Ch7 : System Enumeration and System Hacking -- Ch8 : Wireless Vulnerabilitie s -- Ch9 : Web Applications and Cloud Technologies -- Ch10 : Malware -- Ch11 : Sniffers, Session Hijacking, and Denial of Service -- Ch12 : Backtrack R3 -- Ch13 : Social Engineering -- Ch14 : Incident Response -- Ch15 : Defensive Technologies

This book begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, this second edition provides readers with a clear, comprehensive introduction to the many threats on the Internet environment and security, and what can be done to combat them.

There are no comments on this title.

to post a comment.