Download the Free Fishpond App!
Download on the App Store

Android App on Google play
Computer Security and Penetration Testing

Already own it?

Sell Yours
Home » Books » Computers » Networking » Security

Computer Security and Penetration Testing

By Alfred Basta, Wolf Halton

Elsewhere $109.82 $46.27   Save $63.55 (58%)
Free shipping Australia wide
Condition: New
Ships within: 2-5 days
New or Used: 2 copies from $46.27
Order now for Christmas delivery
Rating:
 
Register or sign-in to rate and get recommendations.
Format: Paperback, 608 pages
Other Information: Illustrated
Published In: United States, 01 August 2007
This book is designed to give readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. With real-world examples that reflect today's most important and relevant security topics, Penetration Testing will address how and why people attack computers and networks, so that readers can be armed with the knowledge and techniques to successfully combat hackers. Because the world of information security changes so quickly and is often the subject of much hype, this book also aims to provide a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this valuable resource teaches the skills needed to go from hoping a system is secure to knowing that it is.

Table of Contents

Chapter 1 - Ethics of Hacking and Cracking Chapter 2 - Reconnaissance Chapter 3 - Scanning Tools Chapter 4 - Sniffers Chapter 5 - TCP/IP Vulnerabilities Chapter 6 - Techniques of Password Cracking Chapter 7 - Spoofing Chapter 8 - Session Hijacking Chapter 9 - Hacking Network Devices Chapter 10 - Trojan Horses Chapter 11 - Denial of Service Attacks Chapter 12 - Buffer Overflows Chapter 13 - Programming Exploits Chapter 14 - Mail Vulnerabilities Chapter 15 - Web Application Vulnerabilities Chapter 16 - Windows Vulnerabilities Chapter 17 - Linux Vulnerabilities Chapter 18 - Incident Handling Appendices (H1) A.1 Appendix 1 A.2 Appendix 2: ASCII Code A.3 Appendix 3 -IPv4 IP Packet Structure A.4 Appendix 4 -Hunt Menus A.5 Appendix 5 - Historic Windows Glossary References

Reviews

Chapter 1 - Ethics of Hacking and Cracking Chapter 2 - Reconnaissance Chapter 3 - Scanning Tools Chapter 4 - Sniffers Chapter 5 - TCP/IP Vulnerabilities Chapter 6 - Techniques of Password Cracking Chapter 7 - Spoofing Chapter 8 - Session Hijacking Chapter 9 - Hacking Network Devices Chapter 10 - Trojan Horses Chapter 11 - Denial of Service Attacks Chapter 12 - Buffer Overflows Chapter 13 - Programming Exploits Chapter 14 - Mail Vulnerabilities Chapter 15 - Web Application Vulnerabilities Chapter 16 - Windows Vulnerabilities Chapter 17 - Linux Vulnerabilities Chapter 18 - Incident Handling Appendices (H1) A.1 Appendix 1 A.2 Appendix 2: ASCII Code A.3 Appendix 3 -IPv4 IP Packet Structure A.4 Appendix 4 -Hunt Menus A.5 Appendix 5 - Historic Windows Glossary References

EAN: 9781418048266
ISBN: 1418048267
Publisher: Delmar
Dimensions: 22.9 x 18.5 x 3 centimetres (0.72 kg)
Age Range: 15+ years
Tell a friend

Their Email:

Sell Yours

Already own this item?
Sell Yours and earn some cash. It's fast and free to list! (Learn More.)

Review this Product

BAD GOOD
 

Related Searches

 

Webmasters, Bloggers & Website Owners

You can earn a 5% commission by selling Computer Security and Penetration Testing on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep!

 

Authors/Publishers

Are you the Author/Publisher? Improve sales by submitting additional information on this title.