Hacker Techniques, Tools and Incident Handling

Third
£47.99
Jones & Bartlett Learning
9781284147803
450

Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them.

Features and Benefits
Includes the latest content and tactics related to hacking and its methodology
Provides updated and expanded content on important techniques
Incorporates the most current hardware, software, and protocols
Coverage of the Internet of Things and how it has expanded attack surfaces
Additional coverage of what to do if you are attacked
Previous ISBN: 9781284031713
Part One Hacker Techniques and Tools
Chapter One Hacking: The Next Generation
Chapter Two TCP/IP Review
Chapter Three Cryptographic Concepts
Chapter Four Physical Security
Part Two A Technical and Social Overview of Hacking
Chapter Five Footprinting Tools and Techniques
Chapter Six Port Scanning
Chapter Seven Enumeration and Computer System Hacking
Chapter Eight Wireless Vulnerabilities
Chapter Nine Web and Database Attacks
Chapter Ten Malware
Chapter Eleven Sniffers, Session Hijacking, and Denial of Service Attacks
Chapter Twelve Linux and Penetration Testing
Chapter Thirteen Social Engineering
Part Three Incident Response and Defensive Technologies
Chapter Fourteen Incident Response
Chapter Fifteen Defensive Technologies

Reviews (0)

If you would like to submit a review, you will need to log in or create an account first.
There are no reviews yet