Virtually every organization is reliant on its computer system, and when hackers infiltrate, the consequences can be grave-halts in productivity, sensitive information stolen, assets at risk. Network Security: A Hacker's Perspective, Second Edition will help you step into the minds of computer criminals so that you can predict their moves and stop them before they strike. Written for anyone with some networking experience, this completely updated edition of the bestseller covers the most serious network-related security threats, vulnerabilities, and loopholes related to most major platforms, including Windows, UNIX, and Novell. Using a hands-on approach and numerous real-life case studies, the book identifies the tools, techniques, and methods that criminals use to break into networks for espionage and malicious purposes, with tips for prevention, as well as countermeasures you can take in the event the hackers strike first. In addition to providing information on the significant advancements in the field of security, attacks, and network reconnaissance, this latest edition provides a completely new section on input validation attacks, password cracking, buffer overflows, Trojan attacks, and much, much more. A companion Web site offers all the tools, scripts, and code discussed in the book.
"Sinopsis" puede pertenecer a otra edición de este libro.
Virtually every organization is reliant on its computer system, and when hackers infiltrate, the consequences can be grave-halts in productivity, sensitive information stolen, assets at risk. Network Security: A Hacker's Perspective, Second Edition will help you step into the minds of computer criminals so that you can predict their moves and stop them before they strike. Written for anyone with some networking experience, this completely updated edition of the bestseller covers the most serious network-related security threats, vulnerabilities, and loopholes related to most major platforms, including Windows, UNIX, and Novell. Using a hands-on approach and numerous real-life case studies, the book identifies the tools, techniques, and methods that criminals use to break into networks for espionage and malicious purposes, with tips for prevention, as well as countermeasures you can take in the event the hackers strike first. In addition to providing information on the significant advancements in the field of security, attacks, and network reconnaissance, this latest edition provides a completely new section on input validation attacks, password cracking, buffer overflows, Trojan attacks, and much, much more. A companion Web site offers all the tools, scripts, and code discussed in the book.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 13,04 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoEUR 40,07 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: ThriftBooks-Dallas, Dallas, TX, Estados Unidos de America
Paperback. Condición: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.95. Nº de ref. del artículo: G1598631632I3N00
Cantidad disponible: 1 disponibles
Librería: ThriftBooks-Atlanta, AUSTELL, GA, Estados Unidos de America
Paperback. Condición: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.95. Nº de ref. del artículo: G1598631632I4N00
Cantidad disponible: 1 disponibles
Librería: Better World Books, Mishawaka, IN, Estados Unidos de America
Condición: Very Good. 2nd. Used book that is in excellent condition. May show signs of wear or have minor defects. Nº de ref. del artículo: 4625023-75
Cantidad disponible: 2 disponibles
Librería: Conover Books, Martinsville, VA, Estados Unidos de America
Trade Paperback. Condición: Good. Second Edition. Minor edge and corner wear; lightly scuffed and scratched; some light shelf wear; spine is gently creased; ex-library with the usual library markings; overall a nice used SECOND EDITION! Full-color pictorial wrapper with white and blue lettering. 415 informative and educational pages nicely enhanced by black and white photographs and illustrations! "Learn how to protect your network system from a hacker's perspective. Virtually every organization is reliant on their computer system and when hackers infiltrate, productivity often halts completely. "Network Security: A Hacker's Perspective" provides comprehensive analysis of the most dangerous network-related security threats, vulnerabilities, and loopholes. Using a hands-on approach and numerous real-life case studies, the book identifies the tools, techniques, and methods used by criminals to break into networks for espionage and malicious purposes. Written for anyone with some networking experience, the book covers security issues related to most major platforms including Windows, Unix, and Novell, and features graphics, appendices, tips, and tricks to make new concepts easy to understand. A companion web site will contain source code, network security discussion, tutorials, and more." (SECOND EDITION). Nº de ref. del artículo: 048353
Cantidad disponible: 1 disponibles
Librería: The Book Spot, Sioux Falls, MN, Estados Unidos de America
Paperback. Condición: New. Nº de ref. del artículo: Abebooks494152
Cantidad disponible: 1 disponibles
Librería: Toscana Books, AUSTIN, TX, Estados Unidos de America
Paperback. Condición: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Nº de ref. del artículo: Scanned1598631632
Cantidad disponible: 1 disponibles