วันอาทิตย์ที่ 22 กุมภาพันธ์ พ.ศ. 2552

Hands-On Ethical Hacking And Network Defense

Hands-On Ethical Hacking and Network Defense

Product Description


With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. This book describes the tools and penetration testing methodologies used by ethical hackers to better understand how to protect computer networks. A thorough discussion is first established outlining what and who an ethical hacker is, and how important they are in protecting corporate and government data from cyber attacks. This title provides a structured knowledge base for preparing security professionals to understand how to protect a network using some of the skills and tools of a penetration or ethical hacker.
Rate Points :4.0
Binding :Paperback
Label :Course Technology
Manufacturer :Course Technology
ProductGroup :Book
Studio :Course Technology
Publisher :Course Technology
EAN :9780619217082
Price :$106.95USD
Lowest Price :$62.10USD
Customer ReviewsGreat book!
Rating Point :5 Helpful Point :2
This was used as the textbook for the ethical hacking class I took last fall. It was a great intro book although some of the links are outdated and the CD did not work (the CD did not work for anyone regardless of the source - including the campus bookstore)

I kept the book for reference.
Make sure you get the up to date version!
Rating Point :3 Helpful Point :3
I purchased this book new from Amazon. I just recentley found out that the software disk provided no longer works and that there should have been a new version disk included with the book. You must have the correct disk to complete the labs. So basicly I have a new door stop!
Buyer Beware!
Similar Item
  • Security+ Guide to Networking Security Fundamentals, Second Edition
  • Guide to Network Defense and Countermeasures
  • Guide to Network Defense and Countermeasures, 2E is the second of two books that are required for Level One of the Security Certified Program (SCP). This edition has been revised with updated content and maps clearly to the exam objectives for the cu
  • Network+ Guide to Networks, Fourth Edition (Networking)
  • Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) (Radia Perlman Series in Computer Networking and Security)
  • "I finally get it! I used to hear words like rootkit, buffer overflow, and idle scanning, and they just didnt make any sense. I asked other people and they didnt seem to know how these things work, or at least they couldnt explain them in a way that
  • Guide to Computer Forensics and Investigations, Third Edition
  • ไม่มีความคิดเห็น:

    แสดงความคิดเห็น