Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition : Network Security Secrets and Solutions: Network Security Secrets and Solutions

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition : Network Security Secrets and Solutions: Network Security Secrets and Solutions by Stuart McClure, Joel Scambray, George Kurtz, McGraw-Hill Companies,Inc.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Stuart McClure, Joel Scambray, George Kurtz ISBN: 9780071780292
Publisher: McGraw-Hill Companies,Inc. Publication: July 10, 2012
Imprint: Language: English
Author: Stuart McClure, Joel Scambray, George Kurtz
ISBN: 9780071780292
Publisher: McGraw-Hill Companies,Inc.
Publication: July 10, 2012
Imprint:
Language: English

A fully updated edition of the world’s bestselling computer security book

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

    1. Network Security
    2. Server Security
    3. Mobile Security
    4. Endpoint Security
    5. Web Security

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.

New to This Edition

  • Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by hackers to inject malware into networks and establish botnets, and provides countermeasures to defend against these increasingly prevalent threats
  • NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving “one best” command that can be deployed to fight the greatest number of potential attacks
  • Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control remote devices and provides countermeasures to defend against these hacks
  • New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, Windows Server 2010, Cisco, RFID, data theft, and more

Praise for Previous Editions
“If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed.” --Marty Roesch, creator of the Snort tool

“Informational gold.” --Bruce Schneier, CTO, Counterpane Internet Security, Inc.

“Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed” --Thomas Ptacek, Researcher at Arbor Networks

“If this book doesn't scare and motivate you to take security seriously, nothing will.” --AlephOne, Bugtraq Moderator

“The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy.” - Simple Nomad, author of The Hack FAQ and Pandora

“A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Edition delivers just that...and more.” --Lance Spitzner, President and Founder of the Honeynet Project

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A fully updated edition of the world’s bestselling computer security book

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.

New to This Edition

Praise for Previous Editions
“If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed.” --Marty Roesch, creator of the Snort tool

“Informational gold.” --Bruce Schneier, CTO, Counterpane Internet Security, Inc.

“Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed” --Thomas Ptacek, Researcher at Arbor Networks

“If this book doesn't scare and motivate you to take security seriously, nothing will.” --AlephOne, Bugtraq Moderator

“The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy.” - Simple Nomad, author of The Hack FAQ and Pandora

“A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Edition delivers just that...and more.” --Lance Spitzner, President and Founder of the Honeynet Project

More books from McGraw-Hill Companies,Inc.

Cover of the book Perfect Phrases for Conflict Resolution: Hundreds of Ready-to-Use Phrases for Encouraging a More Productive and Efficient Work Environment (EBOOK) by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 10 - Regression Analysis by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Transforming Infoglut! A Pragmatic Strategy for Oracle Enterprise Content Management by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book 26 - Theory of Constraints for Education by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Applied Value Investing, Conclusion: by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Mike Meyers' CompTIA A+ Certification Passport, Fourth Edition (Exams 220-701 & 220-702) by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Zend Framework, A Beginner's Guide by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Six Sigma Statistics with EXCEL and MINITAB, Chapter 3 - Basic Tools for Data Collection, Organization and Description by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Practical PowerPivot & DAX Formulas for Excel 2010 by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Java Demystified by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Anatomy Demystified by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book SSCP Systems Security Certified Practitioner All-in-One Exam Guide by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book The Six Sigma Handbook, Third Edition, Chapter 6 - The Define Phase by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book The Six Sigma Handbook, Third Edition, Chapter 7 - The Measure Phase by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book iPad & iPhone Administrators Guide by Stuart McClure, Joel Scambray, George Kurtz
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy