Hands-On Ethical Hacking and Network Defense

Front Cover
Cengage Learning, Mar 17, 2010 - Computers - 480 pages
3 Reviews
Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Readers are provided with updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also included is a thorough update of federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker.
Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
 

What people are saying - Write a review

User Review - Flag as inappropriate

nice.....

User Review - Flag as inappropriate

Hands-on Ethical Hacking and Network Defense

Contents

Ethical Hacking Overview
1
TCPIP Concepts Review
23
Network and Computer Attacks
51
Footprinting and Social Engineering
77
Port Scanning
109
Enumeration
131
Programming for Security Professionals
165
Desktop and Server OS Vulnerabilities
203
Hacking Wireless Networks
303
Cryptography
333
Network Protection Systems
371
Legal Resources
401
Resources
413
Virtualization and Ethical Hacking
423
Glossary
437
Index
445

Embedded Operating Systems The Hidden Threat
239
Hacking Web Servers
263

Other editions - View all

Common terms and phrases

About the author (2010)

Michael T. Simpson is president/senior consultant of MTS Consulting, Inc., a firm specializing in network security and network design. His certifications include CEH, CISSP, Security+, OSSTMM Professional Security Tester (OPST), OSSTMM Professional Security Analyst (OPSA), ITIL, MCSE, MCDBA, MCSD, MCT, and OCP. He also holds an M.B.A. from M.B.A. Chaminade University and has authored or co-authored eight books. Mike has more than 30 years of industry experience, including 20 years with the U.S. Department of Defense, where he designed and configured computer networks, served as an Oracle database and UNIX administrator, and held multiple cyber security positions.

Kent Backman's expertise is in intrusion analysis, network vulnerability assessment, and opensource solution engineering. His interest and skill in ethical hacking developed while managing Web servers for Fortune 500 companies. An analyst for many security incident response teams, Kent spent several years in Baghdad as part of the advisory team to the Iraq Ministry of Defense, specializing in network security and Linux engineering. He holds RHCT, MCSA, CISSP, and CEH certifications and is a network security consultant in Honolulu.

James (Jim) Corley has more than twenty-five years of experience in IT as a systems analyst, network engineer, and security professional. He worked for the DoD for nine years as a database administrator and information systems security officer. For the past sixteen years, Jim has been a consultant to the DoD on dozens of IT programs supporting both classified and unclassified voice, video, and data systems. He has been a Certified Information Systems Security Professional (CISSP) since 2002.

Bibliographic information