𝔖 Scriptorium
✦   LIBER   ✦

📁

Ethical Hacking and Countermeasures: Attack Phases

✍ Scribed by The Experts: EC-Council.


Tongue
English
Leaves
354
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Course Technology, 2009. - 352 р. ISBN: 143548360X

Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information.

✦ Subjects


Информатика и вычислительная техника;Информационная безопасность;Кибербезопасность и киберпреступления


📜 SIMILAR VOLUMES


Ethical Hacking and Countermeasures
✍ CEH 📂 Library 📅 2002 🏛 EC-Council 🌐 English

Ethical Hacking and Countermeasures Version 6 Module VII System Hacking Password Cracking Escalating Privileges Hiding Files Password Attacks Executing Applications Rootkits Password Cracking Tools Keyloggers and Spywares Steganography Password Cracking Countermeasures Coverin

Hacking VoIP: Protocols, Attacks, and Co
✍ Himanshu Dwivedi 📂 Library 📅 2008 🌐 English

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversat

Hacking VoIP: Protocols, Attacks, and Co
✍ Himanshu Dwivedi 📂 Library 📅 2008 🏛 No Starch Press 🌐 English

<DIV><p>Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on c

Hacking VoIP: Protocols, Attacks, and Co
✍ Himanshu Dwivedi 📂 Library 📅 2008 🏛 No Starch Press 🌐 English

<DIV><p>Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on c

Hacking VoIP: Protocols, Attacks, and Co
✍ Himanshu Dwivedi 📂 Library 📅 2008 🏛 No Starch Press 🌐 English

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversat

Ethical Hacking: Techniques, Tools, and
✍ Michael G. Solomon, Sean-Philip Oriyano 📂 Library 📅 2022 🏛 Jones & Bartlett Learning 🌐 English

<span>Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with nu