0%

Book Description

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the threat. Government agencies and private companies rely on "ethical hackers"--professional security testers--to put their networks to the test and discover vulnerabilities before attackers do. If you have an understanding of computers and networking basics and are considering becoming a security tester, HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE will show you how to get started in this fascinating, growing field. This book covers the gamut, from the legalities of ethical hacking to the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and much more. Successful security testers know their work calls for creative, critical thinking, and they enjoy the challenge of digging deep to solve complex problems. Step up to the challenge with HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE.

Table of Contents

  1. Title Page
  2. Copyright Page
  3. Dedication
  4. Foreword
  5. Acknowledgments
  6. About the Authors
  7. Contents
  8. Introduction
  9. Methods for Running BackTrack Linux
  10. Chapter 1 Ethical Hacking Overview
  11. Chapter 2 TCP/IP Concepts Review
  12. Chapter 3 Network and Computer Attacks
  13. Chapter 4 Footprinting and Social Engineering
  14. Chapter 5 Port Scanning
  15. Chapter 6 Enumeration
  16. Chapter 7 Programming for Security Professionals
  17. Chapter 8 Desktop and Server OS Vulnerabilities
  18. Chapter 9 Embedded Operating Systems: The Hidden Threat
  19. Chapter 10 Hacking Web Servers
  20. Chapter 11 Hacking Wireless Networks
  21. Chapter 12 Cryptography
  22. Chapter 13 Network Protection Systems
  23. Appendix A Legal Resources
  24. Appendix B Resources
  25. Appendix C Virtualization and Ethical Hacking
  26. Glossary
  27. Index
3.133.137.17