Practical Hacking Techniques and Countermeasures
Autor Mark D. Spiveyen Limba Engleză Paperback – 2 noi 2006
Written in a lab manual style, the book begins with the installation of the VMware® Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks.
Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures
By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 551.10 lei 6-8 săpt. | |
CRC Press – 2 noi 2006 | 551.10 lei 6-8 săpt. | |
Hardback (1) | 887.47 lei 6-8 săpt. | |
CRC Press – 28 iun 2018 | 887.47 lei 6-8 săpt. |
Preț: 551.10 lei
Preț vechi: 789.68 lei
-30% Nou
Puncte Express: 827
Preț estimativ în valută:
105.47€ • 111.27$ • 87.90£
105.47€ • 111.27$ • 87.90£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780849370571
ISBN-10: 0849370574
Pagini: 750
Ilustrații: 1119 b/w images and 1 table
Dimensiuni: 178 x 254 x 39 mm
Greutate: 1.54 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 0849370574
Pagini: 750
Ilustrații: 1119 b/w images and 1 table
Dimensiuni: 178 x 254 x 39 mm
Greutate: 1.54 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic, Professional, and Professional Practice & DevelopmentCuprins
Preparation. Social Engineering. Footprinting. Scanning. Sniffing. Spoofing. Passwords. Exploit and Attacks. Wireless, Trojans, MTM, Hiding Data. Port Redirection. Denial of Service.
Descriere
This insider’s guide examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack. It shows how an attack is conceptualized, formulated, and performed. With the VMware® Workstation software package available on the downloadable resources, it uses virtua