0
Your cart

Your cart is empty

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Buy Now

The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New) Loot Price: R4,018
Discovery Miles 40 180
The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New): Susan Young, Dave Aitel

The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New)

Susan Young, Dave Aitel

 (sign in to rate)
Loot Price R4,018 Discovery Miles 40 180 | Repayment Terms: R377 pm x 12*

Bookmark and Share

Expected to ship within 12 - 17 working days

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

General

Imprint: Auerbach Publishers Inc.
Country of origin: United Kingdom
Release date: November 2003
First published: 2004
Authors: Susan Young • Dave Aitel
Dimensions: 234 x 156 x 53mm (L x W x T)
Format: Hardcover
Pages: 896
Edition: New
ISBN-13: 978-0-8493-0888-8
Categories: Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
LSN: 0-8493-0888-7
Barcode: 9780849308888

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,375 R1,276 Discovery Miles 12 760
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,643 Discovery Miles 36 430
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R627 R563 Discovery Miles 5 630
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R7,039 Discovery Miles 70 390
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R858 Discovery Miles 8 580
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R7,039 Discovery Miles 70 390
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R796 R704 Discovery Miles 7 040
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R874 Discovery Miles 8 740
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,546 R1,281 Discovery Miles 12 810
Technical Articles about the Voynich…
National Security Agency Hardcover R641 Discovery Miles 6 410
New Research on the Voynich Manuscript…
National Security Agency Hardcover R578 Discovery Miles 5 780
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R889 R768 Discovery Miles 7 680

See more

Partners