Computer Security and Penetration Testing

Author:   Alfred Basta ,  Wolf Halton
Publisher:   Cengage Learning, Inc
ISBN:  

9781418048266


Pages:   608
Publication Date:   31 August 2007
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $203.15 Quantity:  
Add to Cart

Share |

Computer Security and Penetration Testing


Add your own review!

Overview

This book is designed to give readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. With real-world examples that reflect today's most important and relevant security topics, Penetration Testing will address how and why people attack computers and networks, so that readers can be armed with the knowledge and techniques to successfully combat hackers. Because the world of information security changes so quickly and is often the subject of much hype, this book also aims to provide a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this valuable resource teaches the skills needed to go from hoping a system is secure to knowing that it is.

Full Product Details

Author:   Alfred Basta ,  Wolf Halton
Publisher:   Cengage Learning, Inc
Imprint:   Delmar Cengage Learning
Dimensions:   Width: 18.50cm , Height: 3.00cm , Length: 22.90cm
Weight:   0.720kg
ISBN:  

9781418048266


ISBN 10:   1418048267
Pages:   608
Publication Date:   31 August 2007
Audience:   College/higher education ,  Professional and scholarly ,  Undergraduate ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Reviews

Chapter 1 - Ethics of Hacking and Cracking Chapter 2 - Reconnaissance Chapter 3 - Scanning Tools Chapter 4 - Sniffers Chapter 5 - TCP/IP Vulnerabilities Chapter 6 - Techniques of Password Cracking Chapter 7 - Spoofing Chapter 8 - Session Hijacking Chapter 9 - Hacking Network Devices Chapter 10 - Trojan Horses Chapter 11 - Denial of Service Attacks Chapter 12 - Buffer Overflows Chapter 13 - Programming Exploits Chapter 14 - Mail Vulnerabilities Chapter 15 - Web Application Vulnerabilities Chapter 16 - Windows Vulnerabilities Chapter 17 - Linux Vulnerabilities Chapter 18 - Incident Handling Appendices (H1) A.1 Appendix 1 A.2 Appendix 2: ASCII Code A.3 Appendix 3 -IPv4 IP Packet Structure A.4 Appendix 4 -Hunt Menus A.5 Appendix 5 - Historic Windows Glossary References


Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List