Hacker techniques, tools, and incident handling / Sean-Philip Oriyano and Michael Gregg.
Material type:
TextSeries: Jones & Bartlett Learning information systems security & assurance seriesPublisher: Burlington, MA : Jones & Bartlett Learning, [2014]Copyright date: ©2014Edition: Second editionDescription: xvii, 417 pages : illustrations (black and white) ; 24 cmContent type: - text
- unmediated
- volume
- 9781284031713 (pbk.)
- 9780763791834 (pbk.)
- 0763791830 (pbk.)
- 22 005.8 O.S.H
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library A2 | Computers & Information Technology ( Computer Science ) | 005.8 O.S.H (Browse shelf(Opens below)) | Available | 00012252 |
Browsing Main library shelves, Shelving location: A2 Close shelf browser (Hides shelf browser)
computer bookfair2015
Includes bibliographical referencesand index.
Ch1 :The Evolution of Hacking -- Ch2 : TCP/IP Review -- Ch3: Cryptographic Concepts -- Ch 4 : Physical Security -- Ch5 : Footprinting the Environment -- Ch6 : Scanning the Environment and Network -- Ch7 : System Enumeration and System Hacking -- Ch8 : Wireless Vulnerabilitie s -- Ch9 : Web Applications and Cloud Technologies -- Ch10 : Malware -- Ch11 : Sniffers, Session Hijacking, and Denial of Service -- Ch12 : Backtrack R3 -- Ch13 : Social Engineering -- Ch14 : Incident Response -- Ch15 : Defensive Technologies
This book begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, this second edition provides readers with a clear, comprehensive introduction to the many threats on the Internet environment and security, and what can be done to combat them.
There are no comments on this title.