- Delivery: Can be download Immediately after purchasing
- Version: Only PDF Version.
- Compatible Devices: Can be read on any devices (Kindle, NOOK, Android/IOS devices, Windows, MAC)
- Quality: High Quality. No missing contents. Printable
_____________________________________________________________
[Ebook PDF] Hacker Techniques, Tools, and Incident Handling, 3rd Edition
ISBN-13: 978-1284147803
ISBN-10: 1284147800
Author: Sean-Philip Oriyano (Author), Michael G. Solomon (Author)
Hacker Techniques, Tools, and Incident Handling, Third Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.
Preface
Purpose of This Book
This book is part of the Information Systems Security & Assurance Series from Jones & Bartlett Learning (www.jblearning.com). Designed for courses and curricula in IT security, cybersecurity, information assurance, and information systems security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information security principles packed with real-world applications and examples. Authored by Certified Information Systems
Security Professionals (CISSPs), the book delivers comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current but forward thinking—putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow as well.
The first part of this book on information security examines the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It covers the history of hacking and the standards of ethical hacking. The second part provides a technical overview of hacking: how attackers target networks and the methodology they follow. It reviews the various methods attackers use, including footprinting, port scanning, enumeration, malware, sniffers, denial of service, and social engineering. The third part reviews incident response
and defensive technologies: how to respond to hacking attacks and how to fend them off, especially in an age of increased reliance on the web.
Learning Features
The writing style of this book is practical and conversational. Each chapter begins with a statement of learning objectives. Step-by-step examples of information security concepts and procedures are presented throughout the text. Illustrations are used to both clarify the material and vary the presentation. The text is sprinkled with Notes, Tips, FYIs, Warnings, and sidebars to alert the reader to additional helpful information related to the subject under discussion. Chapter Assessments appear at the end of each chapter, with solutions provided in the back of the book.
Chapter summaries are included in the text to provide a rapid review or preview of the material and to help students understand the relative importance of the concepts presented.
Audience
The material is suitable for undergraduate or graduate computer science majors or information science majors, students at a two-year technical college or community college who have a basic technical background, and readers who have a basic understanding of IT security and want to expand their knowledge.
Reviews
There are no reviews yet.