on all orders of $79 or more

7% OFF your purchase of $75 or more!
Use coupon code TUESDAY in checkout.

Hacking Exposed 7 Network Security Secrets and Solutions

, by ; ;
Hacking Exposed 7 Network Security Secrets and Solutions by McClure, Stuart; Scambray, Joel; Kurtz, George, 9780071780285
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
  • ISBN: 9780071780285 | 0071780289
  • Cover: Paperback
  • Copyright: 8/1/2012
  • Rent Book


  • Buy Used Book

    In Stock Usually Ships in 24 Hours.

  • Buy New Book

    Usually Ships in 3-4 Business Days

  • eBook

    Available Instantly

    Online: 365 Days

    Downloadable: Lifetime Access

A fully updated edition of the world's bestselling computer security book Hacking Exposed 7: Network Security Secrets and Solutionsis filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new "5 Deployments" approach for the first time that provides five key actions for every countermeasurefocused on five areas of expertise: 1. Network Security 2. Server Security 3. Mobile Security 4. Endpoint Security 5. Web Security Hacking Exposed 7applies the authors' internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues. New to This Edition Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by hackers to inject malware into networks and establish botnets, and provides countermeasures to defend against these increasingly prevalent threats NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving "one best" command that can be deployed to fight the greatest number of potential attacks Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control remote devices and provides countermeasures to defend against these hacks New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, Windows Server 2010, Cisco, RFID, data theft, and more Praise for Previous Editions "If there was an Encyclopedia Britannicaof computer security, it would be Hacking Exposed." --Marty Roesch, creator of the Snort tool "Informational gold." --Bruce Schneier, CTO, Counterpane Internet Security, Inc. "Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed" --Thomas Ptacek, Researcher at Arbor Networks "If this book doesn't scare and motivate you to take security seriously, nothing will." --AlephOne, Bugtraq Moderator "The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy." - Simple Nomad, author of The Hack FAQ and Pandora "A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Editiondelivers just that...and more." --Lance Spitzner, President and Founder of the Honeynet Project

You might also enjoy...

Please wait while the item is added to your bag...