• Hands-On Ethical Hacking And Network Defense See large image

    Hands-On Ethical Hacking And Network Defense (Paperback) By (author) Michael T. Simpson, By (author) Kent Backman, By (author) James Corley

    Hard to find title available from Book Depository

    $30.21 - Save $37.59 55% off - RRP $67.80 Free delivery worldwide Available
    Dispatched in 3 business days
    When will my order arrive?
    Add to basket | Add to wishlist |

    DescriptionLearn the art of ethical hacking and security testing with "Hands-On Ethical Hacking and Network Defense". Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks, this book will help you develop the critical thinking skills and creativity essential to becoming a knowledgeable, efficient computer security professional. It provides practical knowledge in computer programming, documentation of security tests, and ethical and legal ramifications. It also covers the basics of programming with C, HTML and Perl as they relate to network and computer security-and Web applications, wireless networks, and TCP/IP as well. With the continued rise in credit card and identification theft as well as cyber terrorism and corporate espionage, trained network security professionals are more important than ever. Let the step-by-step approach of "Hands-On Ethical Hacking and Network Defense" teach you the techniques and methodologies of security testing.


Other books

Other people who viewed this bought | Other books in this category
Showing items 1 to 10 of 10

 

Reviews | Bibliographic data
  • Full bibliographic data for Hands-On Ethical Hacking And Network Defense

    Title
    Hands-On Ethical Hacking And Network Defense
    Authors and contributors
    By (author) Michael T. Simpson, By (author) Kent Backman, By (author) James Corley
    Physical properties
    Format: Paperback
    Number of pages: 352
    Width: 189 mm
    Height: 246 mm
    Thickness: 20 mm
    Weight: 907 g
    Language
    English
    ISBN
    ISBN 13: 9781133935612
    ISBN 10: 1133935613
    Classifications

    BIC E4L: COM
    Nielsen BookScan Product Class 3: S10.2
    B&T Book Type: NF
    B&T Modifier: Region of Publication: 01
    B&T Modifier: Subject Development: 20
    B&T Modifier: Academic Level: 03
    LC classification: QA
    B&T General Subject: 229
    B&T Modifier: Text Format: 01
    B&T Merchandise Category: COM
    Abridged Dewey: 005
    B&T Approval Code: A93661400
    DC21: 005.8
    Warengruppen-Systematik des deutschen Buchhandels: 26360
    BIC subject category V2: URY
    B&T Approval Code: A93663050
    BISAC V2.8: COM053000
    DC22: 005.8
    Ingram Subject Code: XE
    Libri: I-XE
    BISAC V2.8: COM043050
    Illustrations note
    black & white tables, figures
    Publisher
    Cengage Learning, Inc
    Imprint name
    Delmar Cengage Learning
    Publication date
    30 April 2012
    Publication City/Country
    Clifton Park
    Author Information
    Michael Simpson is President/Senior Consultant of MTS Consulting, Inc., specializing in network security and network design. He conducts vulnerability assessment and security testing for businesses and gives network security seminars in the private sector and for the U.S. Department of Defense. The author's certifications include CEH (Certified Ethical Hacker), Security+, OSSTMM Professional Security Tester (OPST) and Analyst (OPSA), MCSE, MCDBA, MCSD, MCT, and OCP. He has co-authored five books and has more than twenty-five years of industry experience, including twelve years with the Department of Defense, where he designed and configured computer networks, was an Oracle DBA and UNIX administrator, and served as the Information Systems Security Officer (ISSO). Kent Backman's expertise is in intrusion analysis, network vulnerability assessment, and open-source solution engineering. His interest and skill in ethical hacking developed while managing Web servers for Fortune 500 companies. An analyst for several security incident response teams, Kent also spent several years in Baghdad as part of the advisory team to the Iraq Ministry of Defense, specializing in network security and Linux engineering. He holds RHCT, MCSA, CISSP, and CEH certifications and is a network security consultant in Honolulu. James (Jim) Corley has more than 25 years of experience in IT as a systems analyst, network engineer, and security professional. He worked for the Department of Defense (DoD) for nine years as a database administrator and information systems security officer. For the past 16 years, Jim has been a consultant to the DoD on dozens of IT programs supporting both classified and unclassified voice, video, and data systems. He has been a Certified Information Systems Security Professional (CISSP) since 2002.
    Review quote
    Foreword. Introduction. 1. Ethical Hacking Overview. 2. TCP/IP Concepts Review. 3. Network and Computer Attacks. 4. Footprinting and Social Engineering. 5. Port Scanning. 6. Enumeration. 7. Programming for Security Professionals. 8. Desktop and Server OS Vulnerabilities. 9. Embedded Operating Systems: The Hidden Threat. 10. Hacking Web Servers. 11. Hacking Wireless Networks. 12. Cryptography. 13. Network Protection Systems. Appendix A: Legal Resources. Appendix B: Resources. Appendix C: Virtualization and Ethical Hacking. Glossary.
    Table of contents
    Foreword. Introduction. 1. Ethical Hacking Overview. 2. TCP/IP Concepts Review. 3. Network and Computer Attacks. 4. Footprinting and Social Engineering. 5. Port Scanning. 6. Enumeration. 7. Programming for Security Professionals. 8. Desktop and Server OS Vulnerabilities. 9. Embedded Operating Systems: The Hidden Threat. 10. Hacking Web Servers. 11. Hacking Wireless Networks. 12. Cryptography. 13. Network Protection Systems. Appendix A: Legal Resources. Appendix B: Resources. Appendix C: Virtualization and Ethical Hacking. Glossary.