Book description
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.
Table of contents
- Copyright
- Preface
- Acknowledgments
- About the Authors
-
ONE. Hacker Techniques and Tools
- 1. Hacking: The Next Generation
- 2. TCP/IP Review
- 3. Cryptographic Concepts
- 4. Physical Security
-
TWO. A Technical Overview of Hacking
-
5. Footprinting Tools and Techniques
- The Information-Gathering Process
- The Information on a Company Web Site
- Discovering Financial Information
- Google Hacking
- Exploring Domain Information Leakage
- Tracking an Organization's Employees
- Exploiting Insecure Applications
- Using Basic Countermeasures
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 5 ASSESSMENT
- 6. Port Scanning
- 7. Enumeration and Computer System Hacking
- 8. Wireless Vulnerabilities
- 9. Web and Database Attacks
- 10. Malware, Worms, and Viruses
- 11. Trojans and Backdoors
- 12. Sniffers, Session Hijacking, and Denial of Service Attacks
- 13. Linux, Live CDs, and Automated Assessment Tools
-
5. Footprinting Tools and Techniques
-
THREE. Incident Response and Defensive Technologies
- 14. Incident Response
- 15. Defensive Technologies
- A. Answer Key
- B. Standard Acronyms
- Glossary of Key Terms
- References
Product information
- Title: Hacker Techniques, Tools, and Incident Handling
- Author(s):
- Release date: October 2010
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9780763791841
You might also like
book
Hacker Techniques, Tools, and Incident Handling, 2nd Edition
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and …
book
Internet Security: How to Defend Against Attackers on the Web, 2nd Edition
The Second Edition of Security Strategies in Web Applications and Social Networking provides an in-depth look …
book
Security Strategies in Linux Platforms and Applications, 2nd Edition
The Second Edition of Security Strategies in Linux Platforms and Applications covers every major aspect of …
video
Ethical Hacking - Networks and Websites
Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you …