Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition : Network Security Secrets and Solutions: Network Security Secrets and Solutions

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition : Network Security Secrets and Solutions: Network Security Secrets and Solutions by Stuart McClure, Joel Scambray, George Kurtz, McGraw-Hill Companies,Inc.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Stuart McClure, Joel Scambray, George Kurtz ISBN: 9780071780292
Publisher: McGraw-Hill Companies,Inc. Publication: July 10, 2012
Imprint: Language: English
Author: Stuart McClure, Joel Scambray, George Kurtz
ISBN: 9780071780292
Publisher: McGraw-Hill Companies,Inc.
Publication: July 10, 2012
Imprint:
Language: English

A fully updated edition of the world’s bestselling computer security book

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

    1. Network Security
    2. Server Security
    3. Mobile Security
    4. Endpoint Security
    5. Web Security

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.

New to This Edition

  • Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by hackers to inject malware into networks and establish botnets, and provides countermeasures to defend against these increasingly prevalent threats
  • NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving “one best” command that can be deployed to fight the greatest number of potential attacks
  • Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control remote devices and provides countermeasures to defend against these hacks
  • New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, Windows Server 2010, Cisco, RFID, data theft, and more

Praise for Previous Editions
“If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed.” --Marty Roesch, creator of the Snort tool

“Informational gold.” --Bruce Schneier, CTO, Counterpane Internet Security, Inc.

“Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed” --Thomas Ptacek, Researcher at Arbor Networks

“If this book doesn't scare and motivate you to take security seriously, nothing will.” --AlephOne, Bugtraq Moderator

“The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy.” - Simple Nomad, author of The Hack FAQ and Pandora

“A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Edition delivers just that...and more.” --Lance Spitzner, President and Founder of the Honeynet Project

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A fully updated edition of the world’s bestselling computer security book

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.

New to This Edition

Praise for Previous Editions
“If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed.” --Marty Roesch, creator of the Snort tool

“Informational gold.” --Bruce Schneier, CTO, Counterpane Internet Security, Inc.

“Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed” --Thomas Ptacek, Researcher at Arbor Networks

“If this book doesn't scare and motivate you to take security seriously, nothing will.” --AlephOne, Bugtraq Moderator

“The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy.” - Simple Nomad, author of The Hack FAQ and Pandora

“A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Edition delivers just that...and more.” --Lance Spitzner, President and Founder of the Honeynet Project

More books from McGraw-Hill Companies,Inc.

Cover of the book The Innovation Secrets of Steve Jobs: Insanely Different Principles for Breakthrough Success by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Minitab Demystified by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 6 - Hypothesis Testing by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Plug-In JavaScript 100 Power Solutions by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Managing Virtual Teams by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book The Six Sigma Handbook, Third Edition, Chapter 11 - The Improve/Design Phase by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 7 - Statistical Process Control by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Practice Makes Perfect Physics by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book 38 - Theory of Constraints for Personal Productivity Dilemmas by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Lean Six Sigma for Supply Chain Management, Chapter 2 - Deploying Lean Six Sigma Projects Using Lean Tools by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Complete Guide to Coaching Girls Basketball (EBOOK) by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book The Mountain Within: Leadership Lessons and Inspiration for Your Climb to the Top by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 12 - The Taguchi Method by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Make Sure It's Deductible, Fourth Edition by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Oracle CRM On Demand Combined Analyses by Stuart McClure, Joel Scambray, George Kurtz
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy