
- English
- PDF
- Available on iOS & Android
Hands-On Ethical Hacking and Network Defense
About this book
Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This timely text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today's cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Contents
- Foreword
- Introduction
- Chapter 1: Ethical Hacking Overview
- Chapter 2: TCP/IP Concepts Review
- Chapter 3: Network and Computer Attacks
- Chapter 4: Footprinting and Social Engineering
- Chapter 5: Port Scanning
- Chapter 6: Enumeration
- Chapter 7: Programming for Security Professionals
- Chapter 8: Desktop and Server OS Vulnerabilities
- Chapter 9: Embedded Operating Systems: The Hidden Threat
- Chapter 10: Hacking Web Servers
- Chapter 11: Hacking Wireless Networks
- Chapter 12: Cryptography
- Chapter 13: Network Protection Systems
- Appendix A: Legal Resources
- Appendix B: Resources
- Glossary
- Index