Hacking Exposed 7 Network Security Secrets and Solutions

by ; ;
Edition: 7th
Format: Paperback
Pub. Date: 2012-08-01
Publisher(s): McGraw Hill
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $52.50

Buy New

Arriving Soon. Will ship when available.
$50.00

Buy Used

Arriving Soon. Will ship when available.
$37.50

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$68.63
$68.63

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

A fully updated edition of the world's bestselling computer security book Hacking Exposed 7: Network Security Secrets and Solutionsis filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new "5 Deployments" approach for the first time that provides five key actions for every countermeasurefocused on five areas of expertise: 1. Network Security 2. Server Security 3. Mobile Security 4. Endpoint Security 5. Web Security Hacking Exposed 7applies the authors' internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues. New to This Edition Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by hackers to inject malware into networks and establish botnets, and provides countermeasures to defend against these increasingly prevalent threats NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving "one best" command that can be deployed to fight the greatest number of potential attacks Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control remote devices and provides countermeasures to defend against these hacks New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, Windows Server 2010, Cisco, RFID, data theft, and more Praise for Previous Editions "If there was an Encyclopedia Britannicaof computer security, it would be Hacking Exposed." --Marty Roesch, creator of the Snort tool "Informational gold." --Bruce Schneier, CTO, Counterpane Internet Security, Inc. "Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed" --Thomas Ptacek, Researcher at Arbor Networks "If this book doesn't scare and motivate you to take security seriously, nothing will." --AlephOne, Bugtraq Moderator "The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy." - Simple Nomad, author of The Hack FAQ and Pandora "A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Editiondelivers just that...and more." --Lance Spitzner, President and Founder of the Honeynet Project

Table of Contents

1: Footprinting
2: Scanning
3: Enumeration
4. Hacking Windows
5. Hacking UNIX
6: Remote Connectivity and VoIP Hacking
7. Network Devices (Expanded)
8: Wireless Devices (Expanded)
9: Embedded Systems (NEW)
10: Web Hacking
11. Countermeasures Map (NEW)
Appendix A: Ports
Appendix B: Top 14 Security Vulnerabilities
Appendix C: Denial of Service (DoS) Attacks

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.