Hacker techniques, tools, and incident handling
Oriyano, Sean-Philip.
Hacker techniques, tools, and incident handling - Second edition. - Burlington Jones & Bartlett Learning 2014 - xvii, 417 pages : - Jones & Bartlett Learning information systems security & assurance series .
Hacker Techniques, Tools, and Incident Handling, Second Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Second Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.
9781284031713
Computer security.
Penetration testing (Computer security)
Computer networks
Hackers.
005.8 / ORI
Hacker techniques, tools, and incident handling - Second edition. - Burlington Jones & Bartlett Learning 2014 - xvii, 417 pages : - Jones & Bartlett Learning information systems security & assurance series .
Hacker Techniques, Tools, and Incident Handling, Second Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Second Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.
9781284031713
Computer security.
Penetration testing (Computer security)
Computer networks
Hackers.
005.8 / ORI