0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Conducting Network Penetration and Espionage in a Global Environment (Paperback) Loot Price: R1,862
Discovery Miles 18 620
Conducting Network Penetration and Espionage in a Global Environment (Paperback): Bruce Middleton

Conducting Network Penetration and Espionage in a Global Environment (Paperback)

Bruce Middleton

 (sign in to rate)
Loot Price R1,862 Discovery Miles 18 620 | Repayment Terms: R174 pm x 12*

Bookmark and Share

Expected to ship within 12 - 17 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

General

Imprint: Crc Press
Country of origin: United Kingdom
Release date: September 2018
First published: 2014
Authors: Bruce Middleton
Dimensions: 234 x 156mm (L x W)
Format: Paperback
Pages: 599
ISBN-13: 978-1-138-37491-1
Categories: Books > Social sciences > Politics & government > General
Books > Social sciences > Warfare & defence > General
Books > Science & Mathematics > Science: general issues > Forensic science
Books > Computing & IT > General theory of computing > General
Books > Computing & IT > Computer communications & networking > Network security
Books > Computing & IT > Applications of computing > General
Books > Computing & IT > Social & legal aspects of computing > General
Books > Reference & Interdisciplinary > Interdisciplinary studies > Peace studies > General
Promotions
LSN: 1-138-37491-1
Barcode: 9781138374911

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,774 R1,415 Discovery Miles 14 150
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,290 Discovery Miles 12 900
PCI Dss: A Pocket Guide
IT Governance Paperback R425 Discovery Miles 4 250
Two-Factor Authentication
Mark Stanislav Paperback R543 Discovery Miles 5 430
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R695 Discovery Miles 6 950
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R7,074 Discovery Miles 70 740
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,848 Discovery Miles 88 480
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,388 Discovery Miles 13 880
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,766 Discovery Miles 67 660
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,766 Discovery Miles 67 660
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,083 R933 Discovery Miles 9 330
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,766 Discovery Miles 67 660

See more

Partners