Computer Security and Penetration Testing
eBook - PDF

Computer Security and Penetration Testing

  1. English
  2. PDF
  3. Available on iOS & Android
eBook - PDF

About this book

Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. Spotlighting the latest threats and vulnerabilities, this cutting-edge text is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks--equipping readers with the knowledge and techniques to successfully combat hackers. This edition also includes new emphasis on ethics and legal issues. The world of information security is changing every day – readers are provided with a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this comprehensive resource teaches the skills needed to go from hoping a system is secure to knowing that it is.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Computer Security and Penetration Testing by Alfred Basta, Nadine Basta, Mary Brown, PhD, CISSP, CISA,,Alfred Basta, Nadine Basta, Mary Brown, PhD, CISSP, CISA in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.
chapter
1
Ethics
of
Hacking
and
Cracking
After
reading
this
chapter
and
completing
the
exercises,
you
will
be
able
to:
•
Explain
how
unethical
computer
hacking
is
a
crime
•
Identify
the
various
groups
and
classes
of
hackers
and
crackers
•
Identify
the
various
things
that
motivate
hackers
and
crackers
•
Explain
differences
in
information
security
industry
certifications
•
Describe
the
origin
and
evolution
of
computer
hacking
•
Recognize
the
important
issues
related
to
ethical
hacking
1
Copyright 
201

Cengage 
Learning. 
All 
Rights 
Reserved. 
May 
not 
be 
copied, 
scanned, 
or 
duplicated, 
in 
whole 
or 
in 
part. 
Due 
to 
electronic 
rights, 
some 
third 
party 
content 
may 
be 
suppressed 
from 
the 
eBook 
and/or 
eChapter(s).
Editorial 
review 
has 
deemed 
that 
any 
suppressed 
content 
does 
not 
materially 
affect 
the 
overall 
learning 
experience. 
Cengage 
Learning 
reserves 
the 
right 
to 
remove 
additional 
content 
at 
any 
time 
if 
subsequent 
rights 
restrictions 
require 
it.

Table of contents

  1. Brief Contents
  2. Table of Contents
  3. Introduction
  4. Ch 1: Ethics of Hacking and Cracking
  5. Ch 2: Reconnaissance
  6. Ch 3: Scanning Tools
  7. Ch 4: Sniffers
  8. Ch 5: TCP/IP Vulnerabilities
  9. Ch 6: Encryption and Password Cracking
  10. Ch 7: Spoofing
  11. Ch 8: Session Hijacking
  12. Ch 9: Hacking Network Devices
  13. Ch 10: Trojan Horses
  14. Ch 11: Denial-of-Service Attacks
  15. Ch 12: Buffer Overflows
  16. Ch 13: Programming Exploits
  17. Ch 14: Mail Vulnerabilities
  18. Ch 15: Web Application Vulnerabilities
  19. Ch 16: Windows Vulnerabilities
  20. Ch 17: UNIX/Linux Vulnerabilities
  21. Ch 18: Incident Handling
  22. Glossary
  23. Index