Hands-On Ethical Hacking and Network Defense

Author:   Michael T. Simpson ,  Kent Backman ,  James Corley
Publisher:   Cengage Learning, Inc
Edition:   2nd edition
ISBN:  

9781435496651


Pages:   480
Publication Date:   01 April 2012
Format:   Mixed media product
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $152.64 Quantity:  
Add to Cart

Share |

Hands-On Ethical Hacking and Network Defense


Add your own review!

Overview

Hands-On Ethical Hacking and Network Defense, International Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Readers are provided with updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also included is a thorough update of the federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker.

Full Product Details

Author:   Michael T. Simpson ,  Kent Backman ,  James Corley
Publisher:   Cengage Learning, Inc
Imprint:   Delmar Cengage Learning
Edition:   2nd edition
Dimensions:   Width: 18.80cm , Height: 2.00cm , Length: 23.40cm
Weight:   0.742kg
ISBN:  

9781435496651


ISBN 10:   1435496655
Pages:   480
Publication Date:   01 April 2012
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Mixed media product
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Reviews

1: Ethical Hacking Overview. 2: TCP/IP Concepts Review. 3: Network and Computer Attacks. 4: Footprinting and Social Engineering. 5: Port Scanning. 6: Enumeration. 7: Programming for Security Professionals. 8: Embedded Operating Systems. 9: Linux Operating System Vulnerabilities. 10: Hacking Web Servers. 11: Hacking Wireless Networks. 12: Cryptography. 13: Protecting Networks with Security Devices. Appendix A: Legal Resources. Appendix B: Resources. Appendix C: Virtual Machine Instructions. Appendix: Documentation Forms for Penetration Tests (Will appear on DVD in the back of the book only).


Author Information

James (Jim) Corley has more than twenty-five years of experience in IT as a systems analyst, network engineer, and security professional. He worked for the DoD for nine years as a database administrator and information systems security officer. For the past sixteen years, Jim has been a consultant to the DoD on dozens of IT programs supporting both classified and unclassified voice, video, and data systems. He has been a Certified Information Systems Security Professional (CISSP) since 2002. Kent Backman's expertise is in intrusion analysis, network vulnerability assessment, and opensource solution engineering. His interest and skill in ethical hacking developed while managing Web servers for Fortune 500 companies. An analyst for many security incident response teams, Kent spent several years in Baghdad as part of the advisory team to the Iraq Ministry of Defense, specializing in network security and Linux engineering. He holds RHCT, MCSA, CISSP, and CEH certifications and is a network security consultant in Honolulu. Michael T. Simpson is president/senior consultant of MTS Consulting, Inc., specializing in network security and network design. Mike's certifications include CEH, CISSP, Security+, OSSTMM Professional Security Tester (OPST), OSSTMM Professional Security Analyst (OPSA), MCSE, MCDBA, MCSD, MCT, and OCP. He has authored or co-authored eight books and has more than twenty-four years of industry experience, including fifteen years with the Department of Defense (DoD), where he designed and configured computer networks and served as an Oracle database administrator, UNIX administrator, and information systems security officer (ISSO).

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List