Bishop Stuart University Catalog

Computer security and penetration testing / Alfred Basta, Nadine Basta, Mary Brown.

By: Basta, AlfredContributor(s): Basta, Nadine | Brown, MaryMaterial type: TextTextPublication details: Stamford: Cengage Learning, c 2014Edition: Second editionDescription: xix, 376 pages : illustrations ; 23 cmISBN: 0840020937; 9780840020932Subject(s): Computer networks -- Security measures | Computer networks -- Security measuresDDC classification: 005.8 Online resources: Contributor biographical information | Publisher description | Table of contents only
Contents:
Ethics of hacking and cracking -- Reconnaissance -- Scanning tools -- Sniffers -- TCP/IP vulnerabilities -- Encryption and password cracking -- Spoofing -- Session hijacking -- Hacking network devices -- Trojan horses -- Denial-of-service attacks -- Buffer overflows -- Programming exploits -- Mail vulnerabilities -- Web application vulnerabilities -- Windows vulnerabilities -- UNIX/Linux vulnerabilities -- Incident handling.
Summary: Spotlighting the latest threats and vulnerabilities, this book is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks, equipping readers with the knowledge and techniques to successfully combat hackers. Also includes new emphasis on ethics and legal issues and readers are provided with a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this comprehensive resource teaches the skills needed to go from hoping a system is secure to knowing that it is.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books Main Library

Main Library

Reserve
005.8 BAS (Browse shelf (Opens below)) 1 Not For Loan 33783

Includes index.

Ethics of hacking and cracking -- Reconnaissance -- Scanning tools -- Sniffers -- TCP/IP vulnerabilities -- Encryption and password cracking -- Spoofing -- Session hijacking -- Hacking network devices -- Trojan horses -- Denial-of-service attacks -- Buffer overflows -- Programming exploits -- Mail vulnerabilities -- Web application vulnerabilities -- Windows vulnerabilities -- UNIX/Linux vulnerabilities -- Incident handling.

Spotlighting the latest threats and vulnerabilities, this book is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks, equipping readers with the knowledge and techniques to successfully combat hackers. Also includes new emphasis on ethics and legal issues and readers are provided with a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this comprehensive resource teaches the skills needed to go from hoping a system is secure to knowing that it is.

There are no comments on this title.

to post a comment.

© 2017 Bishop Stuart University Library. All Rights Reserved.
Kakoba Campus, Plot 150 Buremba Road | P.O. Box 9, Mbarara, UGANDA | Tel: +256-772-463068
Email: library@bsu.ac.ug