TY - BOOK AU - Oriyano,Sean-Philip AU - Gregg,Michael TI - Hacker techniques, tools, and incident handling T2 - Information systems security & assurance series SN - 9781284031713 (pbk.) U1 - 005.8 22 PY - 2014///] CY - Burlington, MA : PB - Jones & Bartlett Learning, KW - Computer security KW - Computer networks KW - Security measures KW - Hackers N1 - computer bookfair2015; Includes bibliographical referencesand index; Ch1 :The Evolution of Hacking -- Ch2 : TCP/IP Review -- Ch3: Cryptographic Concepts -- Ch 4 : Physical Security -- Ch5 : Footprinting the Environment -- Ch6 : Scanning the Environment and Network -- Ch7 : System Enumeration and System Hacking -- Ch8 : Wireless Vulnerabilitie s -- Ch9 : Web Applications and Cloud Technologies -- Ch10 : Malware -- Ch11 : Sniffers, Session Hijacking, and Denial of Service -- Ch12 : Backtrack R3 -- Ch13 : Social Engineering -- Ch14 : Incident Response -- Ch15 : Defensive Technologies N2 - This book begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, this second edition provides readers with a clear, comprehensive introduction to the many threats on the Internet environment and security, and what can be done to combat them ER -