Hands-On Ethical Hacking And Network Defense

Hands-On Ethical Hacking And Network Defense

Paperback

By (author) Michael T. Simpson, By (author) Kent Backman, By (author) James Corley

$29.79
List price $69.12
You save $39.33 56% off

Free delivery worldwide
Available
Dispatched in 2 business days
When will my order arrive?

  • Publisher: Delmar Cengage Learning
  • Format: Paperback | 352 pages
  • Dimensions: 183mm x 229mm x 30mm | 885g
  • Publication date: 30 April 2012
  • Publication City/Country: Clifton Park
  • ISBN 10: 1133935613
  • ISBN 13: 9781133935612
  • Illustrations note: black & white tables, figures
  • Sales rank: 314,383

Product description

Learn the art of ethical hacking and security testing with "Hands-On Ethical Hacking and Network Defense". Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks, this book will help you develop the critical thinking skills and creativity essential to becoming a knowledgeable, efficient computer security professional. It provides practical knowledge in computer programming, documentation of security tests, and ethical and legal ramifications. It also covers the basics of programming with C, HTML and Perl as they relate to network and computer security-and Web applications, wireless networks, and TCP/IP as well. With the continued rise in credit card and identification theft as well as cyber terrorism and corporate espionage, trained network security professionals are more important than ever. Let the step-by-step approach of "Hands-On Ethical Hacking and Network Defense" teach you the techniques and methodologies of security testing.

Other people who viewed this bought:

Showing items 1 to 10 of 10

Other books in this category

Showing items 1 to 11 of 11
Categories:

Author information

Michael Simpson is President/Senior Consultant of MTS Consulting, Inc., specializing in network security and network design. He conducts vulnerability assessment and security testing for businesses and gives network security seminars in the private sector and for the U.S. Department of Defense. The author's certifications include CEH (Certified Ethical Hacker), Security+, OSSTMM Professional Security Tester (OPST) and Analyst (OPSA), MCSE, MCDBA, MCSD, MCT, and OCP. He has co-authored five books and has more than twenty-five years of industry experience, including twelve years with the Department of Defense, where he designed and configured computer networks, was an Oracle DBA and UNIX administrator, and served as the Information Systems Security Officer (ISSO). Kent Backman's expertise is in intrusion analysis, network vulnerability assessment, and open-source solution engineering. His interest and skill in ethical hacking developed while managing Web servers for Fortune 500 companies. An analyst for several security incident response teams, Kent also spent several years in Baghdad as part of the advisory team to the Iraq Ministry of Defense, specializing in network security and Linux engineering. He holds RHCT, MCSA, CISSP, and CEH certifications and is a network security consultant in Honolulu. James (Jim) Corley has more than 25 years of experience in IT as a systems analyst, network engineer, and security professional. He worked for the Department of Defense (DoD) for nine years as a database administrator and information systems security officer. For the past 16 years, Jim has been a consultant to the DoD on dozens of IT programs supporting both classified and unclassified voice, video, and data systems. He has been a Certified Information Systems Security Professional (CISSP) since 2002.

Review quote

Foreword. Introduction. 1. Ethical Hacking Overview. 2. TCP/IP Concepts Review. 3. Network and Computer Attacks. 4. Footprinting and Social Engineering. 5. Port Scanning. 6. Enumeration. 7. Programming for Security Professionals. 8. Desktop and Server OS Vulnerabilities. 9. Embedded Operating Systems: The Hidden Threat. 10. Hacking Web Servers. 11. Hacking Wireless Networks. 12. Cryptography. 13. Network Protection Systems. Appendix A: Legal Resources. Appendix B: Resources. Appendix C: Virtualization and Ethical Hacking. Glossary.

Table of contents

Foreword. Introduction. 1. Ethical Hacking Overview. 2. TCP/IP Concepts Review. 3. Network and Computer Attacks. 4. Footprinting and Social Engineering. 5. Port Scanning. 6. Enumeration. 7. Programming for Security Professionals. 8. Desktop and Server OS Vulnerabilities. 9. Embedded Operating Systems: The Hidden Threat. 10. Hacking Web Servers. 11. Hacking Wireless Networks. 12. Cryptography. 13. Network Protection Systems. Appendix A: Legal Resources. Appendix B: Resources. Appendix C: Virtualization and Ethical Hacking. Glossary.