Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition : Network Security Secrets and Solutions: Network Security Secrets and Solutions

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition : Network Security Secrets and Solutions: Network Security Secrets and Solutions by Stuart McClure, Joel Scambray, George Kurtz, McGraw-Hill Companies,Inc.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Stuart McClure, Joel Scambray, George Kurtz ISBN: 9780071780292
Publisher: McGraw-Hill Companies,Inc. Publication: July 10, 2012
Imprint: Language: English
Author: Stuart McClure, Joel Scambray, George Kurtz
ISBN: 9780071780292
Publisher: McGraw-Hill Companies,Inc.
Publication: July 10, 2012
Imprint:
Language: English

A fully updated edition of the world’s bestselling computer security book

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

    1. Network Security
    2. Server Security
    3. Mobile Security
    4. Endpoint Security
    5. Web Security

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.

New to This Edition

  • Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by hackers to inject malware into networks and establish botnets, and provides countermeasures to defend against these increasingly prevalent threats
  • NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving “one best” command that can be deployed to fight the greatest number of potential attacks
  • Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control remote devices and provides countermeasures to defend against these hacks
  • New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, Windows Server 2010, Cisco, RFID, data theft, and more

Praise for Previous Editions
“If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed.” --Marty Roesch, creator of the Snort tool

“Informational gold.” --Bruce Schneier, CTO, Counterpane Internet Security, Inc.

“Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed” --Thomas Ptacek, Researcher at Arbor Networks

“If this book doesn't scare and motivate you to take security seriously, nothing will.” --AlephOne, Bugtraq Moderator

“The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy.” - Simple Nomad, author of The Hack FAQ and Pandora

“A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Edition delivers just that...and more.” --Lance Spitzner, President and Founder of the Honeynet Project

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A fully updated edition of the world’s bestselling computer security book

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.

New to This Edition

Praise for Previous Editions
“If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed.” --Marty Roesch, creator of the Snort tool

“Informational gold.” --Bruce Schneier, CTO, Counterpane Internet Security, Inc.

“Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed” --Thomas Ptacek, Researcher at Arbor Networks

“If this book doesn't scare and motivate you to take security seriously, nothing will.” --AlephOne, Bugtraq Moderator

“The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy.” - Simple Nomad, author of The Hack FAQ and Pandora

“A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Edition delivers just that...and more.” --Lance Spitzner, President and Founder of the Honeynet Project

More books from McGraw-Hill Companies,Inc.

Cover of the book Easy French Step-by-Step by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Programming and Customizing the Multicore Propeller Microcontroller: The Official Guide by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book The Six Sigma Handbook, Third Edition, Chapter 11 - The Improve/Design Phase by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Web Design Demystified by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Project Management for Healthcare Information Technology by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Weekend Navigator 2/E by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book The Zigzag Principle: The Goal Setting Strategy that will Revolutionize Your Business and Your Life (EBOOK) by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Mike Meyers' CompTIA A+ Guide: Practical Application Lab Manual, Third Edition (Exam 220-702) by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Oracle Essbase & Oracle OLAP by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Lean Six Sigma for Supply Chain Management, Chapter 9 - Lean Six Sigma Improvement and Control by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book The Mountain Within: Leadership Lessons and Inspiration for Your Climb to the Top by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Ownership Thinking: How to End Entitlement and Create a Culture of Accountability, Purpose, and Profit by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book The Trading Book: A Complete Solution to Mastering Technical Systems and Trading Psychology by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Lean Six Sigma for Supply Chain Management, Appendix II - Key Lean Six Sigma Concepts by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Crush Price Objections: Sales Tactics for Holding Your Ground and Protecting Your Profit by Stuart McClure, Joel Scambray, George Kurtz
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy