The term cyber-security and an endless list of words prefixed with βcyberβ bombard our senses daily. Widely discussed but often poorly understood, the various terms relate to computers and tine realm of information technology, the key enablers of our interrelated and interdependent world of today. G
Hacking exposed 7: network security secrets and solutions
β Scribed by Kurtz, George;McClure, Stuart;Scambray, Joel
- Publisher
- McGraw-Hill Companies,Inc.
- Year
- 2012
- Tongue
- English
- Leaves
- 741
- Edition
- 7. ed
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
A fully updated edition of the world's bestselling computer security book
Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new "5 Deployments" approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:
1. Network Security
2. Server Security
3. Mobile Security
4. Endpoint Security
5. Web Security
Hacking Exposed 7 applies the authors' internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer...
β¦ Subjects
Sicurezza informatica
π SIMILAR VOLUMES
βOur new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hackerβs mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for
<p><strong>The world's bestselling computer security book--fully expanded and updated</strong><p><p>''Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights <em>Hacking Exposed 6</em> provides t
The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET
The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET