Hands on ethical hacking and network defense

Front Cover
Thomson Course Technology, 2006 - Computers - 464 pages
0 Reviews
With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. This book describes the tools and penetration testing methodologies used by ethical hackers to better understand how to protect computer networks. A thorough discussion is first established outlining what and who an ethical hacker is, and how important they are in protecting corporate and government data from cyber attacks. This title provides a structured knowledge base for preparing security professionals to understand how to protect a network using some of the skills and tools of a penetration or ethical hacker.

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

CHAPTER
1
TABLE OF CONTENTS
2
CHAPTER
19
Copyright

23 other sections not shown

Common terms and phrases

About the author (2006)

Michael T. Simpson has 20 years of experience in IT as a software engineer, network engineer, database administrator, and security professional. He worked for the Department of Defense for 12 years, serving as Information Systems Security Officer for three years. Michael is also the president of MTS Consulting, Inc., an IT consulting company.
He holds the following certifications: OPST, OPSA (OSSTMM Professional Security Tester/Analyst), CEH (Certified Ethical Hacker, EC-Council), CompTIA Security + and Network+, MCSE, MCDBA, MCSD, MCDST, and OCP (Oracle Certified Professional). Michael has co-authored Guide to Novell NetWare 6.0 Administration (2003) and Guide to Novell NetWare 6.0/6.5 Administration (2004) for Course Technology, as well as several books on MCDST, MCSE, and MCSA certification topics.

Bibliographic information