Hacker techniques, tools, and incident handling
By: Oriyano, Sean-Philip
Title By: Solomon, Michael
Material type: BookPublisher: Burlington : Jones and Bartlett Learning, c2020.Edition: 3rd ed.Description: xvi, 407 p. : ill. ; 24 cm.ISBN: 9781284147803Subject(s): Computer security | Penetration testing (Computer security) | Computer networks -- Security measures | HackersDDC classification: 005.8 OR HA Online resources: Location MapItem type | Home library | Call number | Status | Notes | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 005.8 OR HA (Browse shelf) | Available | Mar2020 | T0063421 |
, Shelving location: Main Collection Close shelf browser
005.8 NE TW Network security technologies : | 005.8 NE TW Network security and communication engineering : | 005.8 OP EN Open source intelligence investigation : | 005.8 OR HA Hacker techniques, tools, and incident handling | 005.8 OR PE Penetration testing : | 005.8 OT SE Securing the virtual environment : | 005.8 PA CO Corporate computer and network security / |
Includes bibliographical references (pages 387-389) and index.
Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them.