
Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Computer Science | >> | Hacking Exposed 7: N... |
ISBN
:
9781259061158
Publisher
:
Tata McGraw Hill Education
Subject
:
Computer Science, Information Technology: General Issues
Binding
:
Paperback
Year
:
2012
₹
1045.0
₹
856.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
Hacking Exposed 7: Network Security Secrets and Solutions covers all-new attacks and countermeasures for advanced persistent threats, infrastructure hacks, industrial automation and embedded devices, wireless security, the new SCADA protocol hacks, Microsoft Windows Server 2010, Web 2.0, Ubuntu Linux, hardware, Cisco, RFID, malware, and more! The 7th Edition also features a new 5 Deployments approach for the first time that provides five key actions for every countermeasurefocused on five areas of expertise: 1. Network Security 2. Server Security 3. Mobile Security 4. Endpoint Security 5. Web Security Hacking Exposed has led the market as the Bible for IT security professionals for more than a decade. The authors have a cult following due to an ability to cut to the chase in their book, which details all the best-kept anti-hacker secrets. Threats to network security are more virulent today than ever beforeand our author team has lived it. The 7th Edition is an essential read for existing and new customers alike in order to successfully troubleshoot the newest, toughest hacks ever seen. Hacking Exposed 7 applies the authors internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues. Table of Contents 1: Footprinting 2: Scanning 3: Enumeration 4. Hacking Windows 5. Hacking UNIX 6: Remote Connectivity and VoIP Hacking 7. Network Devices (Expanded) 8: Wireless Devices (Expanded) 9: Embedded Systems (NEW) 10: Web Hacking 11. Countermeasures Map (NEW) Appendix A: Ports Appendix B: Top 14 SecurityVulnerabilities Appendix C: Denial of Service (DoS) Attacks
Related Items
-
of
Neural Networks and Artificial Intelligence for Biomedical Engineering
Donna L. Hudson
Starts At
15918.0
18510.0
14% OFF
Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition
Douglas R. Hofstadter
Starts At
813.0
1099.0
26% OFF
Designing Concurrent, Distributed, and Real-Time Applications with UML
Hassan Gomaa
Starts At
6079.0
7999.0
24% OFF
Artificial Life V: Proceedings of the Fifth International Workshop on the Synthesis and Simulation of Living Systems (Complex Adaptive Systems)
Christopher G. Langton
Starts At
6602.0
7677.0
14% OFF
Are you sure you want to remove the item from your Bag?
Yes
No
Added to Your Wish List
OK
Your Shopping Bag
- 1 Item
Item
Delivery
Unit Price
Quantity
Sub Total
Order Summary