Spivey | Practical Hacking Techniques and Countermeasures | E-Book | sack.de
E-Book

E-Book, Englisch, 752 Seiten

Spivey Practical Hacking Techniques and Countermeasures


Erscheinungsjahr 2006
ISBN: 978-1-4200-1338-2
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 752 Seiten

ISBN: 978-1-4200-1338-2
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws.

Written in a lab manual style, the book begins with the installation of the VMware® Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks.

Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures

By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

Spivey Practical Hacking Techniques and Countermeasures jetzt bestellen!

Zielgruppe


Practitioners responsible for building safeguards for computers, managers responsible for security of IT systems, or anyone with a curiosity of computer security or hacking techniques.


Autoren/Hrsg.


Weitere Infos & Material


Preparation
Banner Identification
Target Enumeration
Scanning
Sniffing Traffic
Spoofing
Brute Force
Vulnerability Scanning
Wireless
Redirection
Denial-of-Service (DoS)
Appendix A
Appendix B



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.