As I have noticed over the years, spoon-fed information on anything
that involves network auditing, or anything of the sort, has been
rather scarce. It is for this reason that my book has spawned in
its current form. The idea is to prove that such tasks may be
explained in an articulate manner, while still maintaining a proper
rapport with the reader. People tend to speak in lofty tongue when
they have a superiority complex; I eliminate this completely by
drawing back the verbal curtain and cutting straight to the point.
This is done by speaking in layman's terms, while still maintaining
proper terminology when necessary, and utilizing metaphors to
express the idea in a more descriptive form. As you may have
guessed, this is a network auditor's quick-reference bible. Not
only does it contain step-by-step, illustrated tutorials, but an
explanation as to why each exploitation works, and how to defend
against such attacks. One might also discover a few "rants and
raves," as well as other random nuances.
General
Imprint: |
Lulu.Com
|
Country of origin: |
United States |
Release date: |
December 2012 |
First published: |
December 2012 |
Authors: |
Gordon Johnson
|
Dimensions: |
229 x 152 x 23mm (L x W x T) |
Format: |
Paperback - Trade
|
Pages: |
414 |
ISBN-13: |
978-1-300-50902-8 |
Categories: |
Books >
Computing & IT >
General theory of computing >
General
|
LSN: |
1-300-50902-3 |
Barcode: |
9781300509028 |
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!