Normal view MARC view ISBD view

Hacker techniques, tools, and incident handling

By: Oriyano, Sean-Philip
Title By: Solomon, Michael
Material type: BookPublisher: Burlington : Jones and Bartlett Learning, c2020.Edition: 3rd ed.Description: xvi, 407 p. : ill. ; 24 cm.ISBN: 9781284147803Subject(s): Computer security | Penetration testing (Computer security) | Computer networks -- Security measures | HackersDDC classification: 005.8 OR HA Online resources: Location Map
Summary:
Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Notes Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
005.8 OR HA (Browse shelf) Available Mar2020 T0063421
Total holds: 0

Includes bibliographical references (pages 387-389) and index.

Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them.

Powered by Koha