Matches in Library of Congress for { <http://lccn.loc.gov/2012930937> ?p ?o. }
Showing items 1 to 29 of
29
with 100 items per page.
- 2012930937 abstract "Cyber crime and the threat of computer-related attacks are crowing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the thread. If you have an understanding of computers and networking basics and are considering becoming a security tester, this book will show you how to get started in this field. It covers the legalities of ethical hacking, the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and more-- Source other than Library of Congress..".
- 2012930937 contributor B12697207.
- 2012930937 contributor B12697208.
- 2012930937 created "c2013.".
- 2012930937 date "2013".
- 2012930937 date "c2013.".
- 2012930937 dateCopyrighted "c2013.".
- 2012930937 description "Cyber crime and the threat of computer-related attacks are crowing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the thread. If you have an understanding of computers and networking basics and are considering becoming a security tester, this book will show you how to get started in this field. It covers the legalities of ethical hacking, the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and more-- Source other than Library of Congress..".
- 2012930937 description "Ethical hacking overview -- TCP/IP concepts review -- Network and computer attacks -- Footprinting and social engineering -- Port scanning -- Enumeration -- Programming for security professionals -- Desktop and server OS vulnerabilities -- Embedded operating systems : the hidden threat -- Hacking web servers -- Hacking wireless networks -- Cryptography -- Network protection systems.".
- 2012930937 description "Includes bibliographical references (p. 379-385) and index.".
- 2012930937 extent "xxviii, 435 p. :".
- 2012930937 identifier "1133935613".
- 2012930937 identifier "9781133935612".
- 2012930937 identifier 2012930937-b.html.
- 2012930937 identifier 2012930937-d.html.
- 2012930937 identifier 2012930937-t.html.
- 2012930937 issued "2013".
- 2012930937 issued "c2013.".
- 2012930937 language "eng".
- 2012930937 publisher "Boston, MA : Course Technology,".
- 2012930937 subject "005.8 23".
- 2012930937 subject "Computer hackers.".
- 2012930937 subject "Computer networks Security measures.".
- 2012930937 subject "Computer security.".
- 2012930937 subject "Penetration testing (Computer security)".
- 2012930937 subject "QA76.9.A25 S55 2013".
- 2012930937 tableOfContents "Ethical hacking overview -- TCP/IP concepts review -- Network and computer attacks -- Footprinting and social engineering -- Port scanning -- Enumeration -- Programming for security professionals -- Desktop and server OS vulnerabilities -- Embedded operating systems : the hidden threat -- Hacking web servers -- Hacking wireless networks -- Cryptography -- Network protection systems.".
- 2012930937 title "Hands-on ethical hacking and network defense / Michael T. Simpson, Kent Backman, and James E. Corley.".
- 2012930937 type "text".