Amazon cover image
Image from Amazon.com
Image from Coce

Hacker techniques, tools, and incident handling / Sean-Philip Oriyano and Michael G. Solomon.

By: Contributor(s): Material type: TextTextPublication details: Burlington, Massachusetts : Jones and Barlett Learning, 2020.Edition: Third editionDescription: xvi, 407 pages : illustrations ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781284147803
Subject(s): DDC classification:
  • 005.8 Or49h
LOC classification:
  • TK5105.59
Contents:
Part I Hacker techniques and tools -- Hacking: the next generation -- TCP/IP review -- Cryptographic concepts -- Physical security -- Part II A technical and social overview of hacking -- Footprinting tools and techniques -- Port scanning -- Enumeration and computer system hacking -- Wireless vulnerabilities -- Web and database attacks -- Malware -- Sniffers, session hijacking, and denial of service attacks -- Linux and penetration testing -- Social engineering -- Part III Incident response and defensive technologies -- Incident response -- Defensive technologies.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library-Nabua Circulation Section CIR 005.8 Or49h 2020 (Browse shelf(Opens below)) 1-2 Available 025274
Books Books Main Library-Nabua Circulation Section CIR 005.8 Or49h 2020 (Browse shelf(Opens below)) 2-2 Available 028067

Includes bibliographical references and index.

Part I Hacker techniques and tools -- Hacking: the next generation -- TCP/IP review -- Cryptographic concepts -- Physical security -- Part II A technical and social overview of hacking -- Footprinting tools and techniques -- Port scanning -- Enumeration and computer system hacking -- Wireless vulnerabilities -- Web and database attacks -- Malware -- Sniffers, session hijacking, and denial of service attacks -- Linux and penetration testing -- Social engineering -- Part III Incident response and defensive technologies -- Incident response -- Defensive technologies.

There are no comments on this title.

to post a comment.