Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition : Network Security Secrets and Solutions: Network Security Secrets and Solutions

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Hacking Exposed 7 Network Security Secrets & Solutions Seventh Edition : Network Security Secrets and Solutions: Network Security Secrets and Solutions by Stuart McClure, Joel Scambray, George Kurtz, McGraw-Hill Companies,Inc.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Stuart McClure, Joel Scambray, George Kurtz ISBN: 9780071780292
Publisher: McGraw-Hill Companies,Inc. Publication: July 10, 2012
Imprint: Language: English
Author: Stuart McClure, Joel Scambray, George Kurtz
ISBN: 9780071780292
Publisher: McGraw-Hill Companies,Inc.
Publication: July 10, 2012
Imprint:
Language: English

A fully updated edition of the world’s bestselling computer security book

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

    1. Network Security
    2. Server Security
    3. Mobile Security
    4. Endpoint Security
    5. Web Security

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.

New to This Edition

  • Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by hackers to inject malware into networks and establish botnets, and provides countermeasures to defend against these increasingly prevalent threats
  • NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving “one best” command that can be deployed to fight the greatest number of potential attacks
  • Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control remote devices and provides countermeasures to defend against these hacks
  • New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, Windows Server 2010, Cisco, RFID, data theft, and more

Praise for Previous Editions
“If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed.” --Marty Roesch, creator of the Snort tool

“Informational gold.” --Bruce Schneier, CTO, Counterpane Internet Security, Inc.

“Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed” --Thomas Ptacek, Researcher at Arbor Networks

“If this book doesn't scare and motivate you to take security seriously, nothing will.” --AlephOne, Bugtraq Moderator

“The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy.” - Simple Nomad, author of The Hack FAQ and Pandora

“A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Edition delivers just that...and more.” --Lance Spitzner, President and Founder of the Honeynet Project

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A fully updated edition of the world’s bestselling computer security book

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.

New to This Edition

Praise for Previous Editions
“If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed.” --Marty Roesch, creator of the Snort tool

“Informational gold.” --Bruce Schneier, CTO, Counterpane Internet Security, Inc.

“Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed” --Thomas Ptacek, Researcher at Arbor Networks

“If this book doesn't scare and motivate you to take security seriously, nothing will.” --AlephOne, Bugtraq Moderator

“The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy.” - Simple Nomad, author of The Hack FAQ and Pandora

“A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Edition delivers just that...and more.” --Lance Spitzner, President and Founder of the Honeynet Project

More books from McGraw-Hill Companies,Inc.

Cover of the book Logic DeMYSTiFied by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Effective Oracle Database 10g Security by Design by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Practice Makes Perfect The French Subjunctive Up Close by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Algebra Demystified 2/E by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Applied SAP BI 7.0 Web Reports: Using BEx Web Analyzer and Web Application Designer by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book The Six Sigma Handbook, Third Edition, Chapter 5 - Project Management Using DMAIC and DMADV by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book HTML & CSS: The Complete Reference, Fifth Edition by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book PowerShell for Microsoft SharePoint 2010 Administrators by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Six Sigma Business Scorecard, Chapter 16 - Integrating the Six Sigma Business Scorecard and Quality Management Systems by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Programming and Customizing the Multicore Propeller Microcontroller: The Official Guide by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Chemistry Demystified 2/E by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Manager's Guide to Effective Coaching, Second Edition (EBOOK) by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book CISSP Practice Exams by Stuart McClure, Joel Scambray, George Kurtz
Cover of the book Microsoft SharePoint 2010 Web Applications The Complete Reference by Stuart McClure, Joel Scambray, George Kurtz
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy