Computing & Information Technology

Computing & Information Technology

상품 썸네일

돋보기
  • 페이스북
  • 구글
  • 트위터
  • 카카오톡

Hands-On Ethical Hacking and Network Defense

Simpson/Antill 지음 | 2017

ISBN 9781285454610 (1285454618)
Author Simpson/Antill
Copyright 2017
Edition 3E
Page 512쪽
Size 7 3/8 x 9 1/8
Bookseller 문의
자세히보기
  • 판매처
  • Tel
  • Fax

* 교재는 판매처를 통해 구매하실 수 있습니다.

닫기
책소개 목차 특징
Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This timely text helps readers gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today’s cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking.
1. Ethical Hacking Overview.
2. TCP/IP Concepts Review.
3. Network and Computer Attacks.
4. Footprinting and Social Engineering.
5. Port Scanning.
6. Enumeration.
7. Programming for Security Professionals.
8. Desktop and Server OS Vulnerabilities.
9. Embedded Operating Systems: The Hidden Threat.
10. Hacking Web Applications.
11. Hacking Wireless Networks.
12. Cryptography.
13. Network Protection Systems.
Appendix A: Legal Resources.
Appendix B: Resources.
Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This timely text helps readers gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today’s cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking. The text includes updated information on computer crime laws at the state and federal level, including recent changes in penalties for illegal computer hacking. A new, bootable Kali Linux™ DVD contains many of the security tools discussed in the text, making hands-on activities easier to perform and allowing readers to devote more time to mastering the use of security tools, rather than learning how to install and configure Linux®. In addition, instructions for creating a bootable USB drive with Kali Linux extend the same advantages to students using eBooks. The authors have added discussion of smartphone security, providing valuable insights and guidance on the current mobile security landscape in a time when smartphone usage and mobile networking continue to grow. Web application hacking sections are now enhanced with coverage of newer attacks, as well as new web application testing methodology. This hands-on, highly practical text provides a step-by-step approach to penetration testing techniques and methodologies, equipping readers to apply what they learn with confidence in a variety of scenarios. The authors help readers identify network vulnerabilities and prevent potential threats by deploying the tools and techniques hackers use to bypass network security. In addition to detailed practical material on network security, wireless technology, and their effect on Wide Area Networks, the text provides a useful grounding in ethical and legal issues relevant to penetration testing. Extensive learning tools--including Review Questions, Hands-On Projects, and Case Projects--help reinforce key concepts and allow readers to gain valuable practice applying what they have learned. Numerous case studies guide readers through all aspects of network planning, including interconnectivity issues, physical transmission options, voice and data integration, WAN transport methods, and ATM technologies.