Academic book request
In order to decide if a book might be suitable for your course we know that you need to look at it in detail.
If you are an academic teaching a course of 12 or more students you can choose up to three complimentary inspection copies of textbooks that are applicable to the courses that you teach.
To request your inspection copies, please complete the form below.
Hacker Techniques, Tools and Incident HandlingAuthors: Sean-Philip Oriyano, Michael G. Solomon
Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them.
Features and Benefits
- Includes the latest content and tactics related to hacking and its methodology
- Provides updated and expanded content on important techniques
- Incorporates the most current hardware, software, and protocols
- Coverage of the Internet of Things and how it has expanded attack surfaces
- Additional coverage of what to do if you are attacked
TABLE OF CONTENTS
Part One Hacker Techniques and Tools
Chapter One Hacking: The Next Generation
Chapter Two TCP/IP Review
Chapter Three Cryptographic Concepts
Chapter Four Physical Security
Part Two A Technical and Social Overview of Hacking
Chapter Five Footprinting Tools and Techniques
Chapter Six Port Scanning
Chapter Seven Enumeration and Computer System Hacking
Chapter Eight Wireless Vulnerabilities
Chapter Nine Web and Database Attacks
Chapter Ten Malware
Chapter Eleven Sniffers, Session Hijacking, and Denial of Service Attacks
Chapter Twelve Linux and Penetration Testing
Chapter Thirteen Social Engineering
Part Three Incident Response and Defensive Technologies
Chapter Fourteen Incident Response
Chapter Fifteen Defensive Technologies