Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition : Network Security Secrets and Solutions: Network Security Secrets and Solutions

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition : Network Security Secrets and Solutions: Network Security Secrets and Solutions by Stuart McClure, Joel Scambray, George Kurtz, McGraw-Hill Companies,Inc.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Stuart McClure, Joel Scambray, George Kurtz ISBN: 9780071780292
Publisher: McGraw-Hill Companies,Inc. Publication: July 10, 2012
Imprint: Language: English
Author: Stuart McClure, Joel Scambray, George Kurtz
ISBN: 9780071780292
Publisher: McGraw-Hill Companies,Inc.
Publication: July 10, 2012
Imprint:
Language: English

A fully updated edition of the world’s bestselling computer security book

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

    1. Network Security
    2. Server Security
    3. Mobile Security
    4. Endpoint Security
    5. Web Security

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.

New to This Edition

  • Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by hackers to inject malware into networks and establish botnets, and provides countermeasures to defend against these increasingly prevalent threats
  • NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving “one best” command that can be deployed to fight the greatest number of potential attacks
  • Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control remote devices and provides countermeasures to defend against these hacks
  • New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, Windows Server 2010, Cisco, RFID, data theft, and more

Praise for Previous Editions
“If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed.” --Marty Roesch, creator of the Snort tool

“Informational gold.” --Bruce Schneier, CTO, Counterpane Internet Security, Inc.

“Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed” --Thomas Ptacek, Researcher at Arbor Networks

“If this book doesn't scare and motivate you to take security seriously, nothing will.” --AlephOne, Bugtraq Moderator

“The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy.” - Simple Nomad, author of The Hack FAQ and Pandora

“A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Edition delivers just that...and more.” --Lance Spitzner, President and Founder of the Honeynet Project

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A fully updated edition of the world’s bestselling computer security book

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.

New to This Edition

Praise for Previous Editions
“If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed.” --Marty Roesch, creator of the Snort tool

“Informational gold.” --Bruce Schneier, CTO, Counterpane Internet Security, Inc.

“Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed” --Thomas Ptacek, Researcher at Arbor Networks

“If this book doesn't scare and motivate you to take security seriously, nothing will.” --AlephOne, Bugtraq Moderator

“The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy.” - Simple Nomad, author of The Hack FAQ and Pandora

“A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Edition delivers just that...and more.” --Lance Spitzner, President and Founder of the Honeynet Project

More books from McGraw-Hill Companies,Inc.

Cover of the book Six Sigma Business Scorecard, Chapter 16 - Integrating the Six Sigma Business Scorecard and Quality Management Systems by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Mike Meyers' CompTIA A+ Guide: Practical Application, Third Edition (Exam 220-702) by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Oracle JDeveloper 10g for Forms & PL/SQL Developers: A Guide to Web Development with Oracle ADF by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Algebra Demystified 2/E by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Electronic Circuits for the Evil Genius 2/E by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Programming and Customizing the PICAXE Microcontroller 2/E by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book The McGraw-Hill Homeland Security Handbook : The Definitive Guide for Law Enforcement, EMT, and all other Security Professionals: The Definitive Guide for Law Enforcement, EMT, and all other Security Professionals by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book The Six Sigma Handbook, Third Edition, Chapter 10 - Analyze Phase by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Minitab Demystified by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book The Mountain Within: Leadership Lessons and Inspiration for Your Climb to the Top by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Plug-In PHP: 100 Power Solutions by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book NetBeans IDE Programmer Certified Expert Exam Guide (Exam 310-045) by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Microsoft Visual Studio 2010: A Beginner's Guide by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Excel 2007 VBA Macro Programming by Stuart McClure, Joel Scambray, George Kurtz
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy