(eBook PDF) Hacker Techniques, Tools, and Incident Handling 3rd Edition – Digital Ebook – Instant Delivery Download
Product details:
- ISBN-10 : 1284147800
- ISBN-13 : 978-1284147803
- Author: Sean-Philip Oriyano, Michael G Solomon
Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them
Table contents:
Part One Hacker Techniques and Tools
Chapter One Hacking: The Next Generation
Chapter Two TCP/IP Review
Chapter Three Cryptographic Concepts
Chapter Four Physical Security
Part Two A Technical and Social Overview of Hacking
Chapter Five Footprinting Tools and Techniques
Chapter Six Port Scanning
Chapter Seven Enumeration and Computer System Hacking
Chapter Eight Wireless Vulnerabilities
Chapter Nine Web and Database Attacks
Chapter Ten Malware
Chapter Eleven Sniffers, Session Hijacking, and Denial of Service Attacks
Chapter Twelve Linux and Penetration Testing
Chapter Thirteen Social Engineering
Part Three Incident Response and Defensive Technologies
Chapter Fourteen Incident Response
Chapter Fifteen Defensive Technologies
People also search:
what is incident handling in cyber security
casualty handling techniques
hacker tools techniques exploits and incident handling
hacker tools techniques and incident handling sans
tools and techniques you could use to investigate workplace incidents