WELCOME TO MOI UNIVERSITY LIBRARY SERVICES


Please, type in the keywords, the title, subject, or author name below for your search. For detailed manual see this manual
Amazon cover image
Image from Amazon.com

Hands-on ethical hacking and network defense / Michael T. Simpson, Kent Backman, and James E. Corley.

By: Material type: TextTextPublication details: Australia ; Course Technology, c2006.Description: xxviii, 435 pages : illustrations 23 cmISBN:
  • 9781133935612
  • 1133935613
  • 9780619217082
  • 0619217081
Subject(s): LOC classification:
  • QA 76.9 .A25S55 2006
Online resources:
Contents:
Ethical hacking overview -- TCP/IP concepts review -- Network and computer attacks -- Footprinting and social engineering -- Port scanning -- Enumeration -- Programming for security professionals -- Desktop and server OS vulnerabilities -- Embedded operating systems : the hidden threat -- Hacking web servers -- Hacking wireless networks -- Cryptography -- Network protection systems.
Summary: Cyber crime and the threat of computer-related attacks are crowing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the thread. If you have an understanding of computers and networking basics and are considering becoming a security tester, this book will show you how to get started in this field. It covers the legalities of ethical hacking, the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and more-- Source other than Library of Congress..
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Barcode
Loan Margaret Thatcher Library Second Floor QA 76.9 .A25S55 2006 (Browse shelf(Opens below)) Available 23009435

Includes bibliographical references (p. 379-385) and index.

Ethical hacking overview -- TCP/IP concepts review -- Network and computer attacks -- Footprinting and social engineering -- Port scanning -- Enumeration -- Programming for security professionals -- Desktop and server OS vulnerabilities -- Embedded operating systems : the hidden threat -- Hacking web servers -- Hacking wireless networks -- Cryptography -- Network protection systems.

Cyber crime and the threat of computer-related attacks are crowing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the thread. If you have an understanding of computers and networking basics and are considering becoming a security tester, this book will show you how to get started in this field. It covers the legalities of ethical hacking, the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and more-- Source other than Library of Congress..

There are no comments on this title.

to post a comment.

Copyright @ The Margaret Thatcher Library August 2023
T