0
Your cart

Your cart is empty

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Buy Now

The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New) Loot Price: R3,991
Discovery Miles 39 910
The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New): Susan Young, Dave Aitel

The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New)

Susan Young, Dave Aitel

 (sign in to rate)
Loot Price R3,991 Discovery Miles 39 910 | Repayment Terms: R374 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

General

Imprint: Auerbach Publishers Inc.
Country of origin: United Kingdom
Release date: November 2003
First published: 2004
Authors: Susan Young • Dave Aitel
Dimensions: 234 x 156 x 53mm (L x W x T)
Format: Hardcover
Pages: 896
Edition: New
ISBN-13: 978-0-8493-0888-8
Categories: Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Promotions
LSN: 0-8493-0888-7
Barcode: 9780849308888

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,483 Discovery Miles 34 830
Conflicts, Crimes and Regulations in…
SY Laurent Hardcover R3,743 Discovery Miles 37 430
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,170 Discovery Miles 61 700
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Information Security and Ethics - Social…
Marian Quigley Hardcover R2,140 Discovery Miles 21 400

See more

Partners