Hands on ethical hacking and network defense
With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. This book describes the tools and penetration testing methodologies used by ethical hackers to better understand how to protect computer networks. A thorough discussion is first established outlining what and who an ethical hacker is, and how important they are in protecting corporate and government data from cyber attacks. This title provides a structured knowledge base for preparing security professionals to understand how to protect a network using some of the skills and tools of a penetration or ethical hacker.
What people are saying - Write a review
We haven't found any reviews in the usual places.
access list activity administrator algorithm allows application attack authentication binary browser buffer overflow certificate Chapter Checking client ColdFusion command company's Concern or Vulnerability configuration connect create cryptography database default Description dialog box domain name e-mail employees enables encryption enumeration example exploits file system filter firewall function hackers hacking host ICMP Identified installed interface Internet IP address Linux logon loop MBSA Microsoft Nessus NetBIOS NetWare Nmap operating system options packet password penetration test perform Perl ping Port Protocol port scanning press Enter prompt public key remote Required rootkit router running script security professionals security tester shell SMTP social engineer SQL Server SSID standard TCP/IP Testing Company Trojan program UNIX updates virus wardriving Web browser Web server Windows Server 2003 Windows XP wireless network