|
|
Showing 1 - 2 of
2 matches in All Departments
Examining computer security from the hacker's perspective,
Practical Hacking Techniques and Countermeasures employs virtual
computers to illustrate how an attack is executed, including the
script, compilation, and results. It provides detailed screen shots
in each lab for the reader to follow along in a step-by-step
process in order to duplicate and understand how the attack works.
It enables experimenting with hacking techniques without fear of
corrupting computers or violating any laws. Written in a lab manual
style, the book begins with the installation of the VMware(R)
Workstation product and guides the users through detailed hacking
labs enabling them to experience what a hacker actually does during
an attack. It covers social engineering techniques, footprinting
techniques, and scanning tools. Later chapters examine spoofing
techniques, sniffing techniques, password cracking, and attack
tools. Identifying wireless attacks, the book also explores
Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service
(DoS) attacks. Learn how to secure your computers with this
comprehensive guide on hacking techniques and countermeasures By
understanding how an attack occurs the reader can better understand
how to defend against it. This book shows how an attack is
conceptualized, formulated, and performed. It offers valuable
information for constructing a system to defend against attacks and
provides a better understanding of securing your own computer or
corporate network.
Examining computer security from the hacker's perspective,
Practical Hacking Techniques and Countermeasures employs virtual
computers to illustrate how an attack is executed, including the
script, compilation, and results. It provides detailed screen shots
in each lab for the reader to follow along in a step-by-step
process in order to duplicate and understand how the attack works.
It enables experimenting with hacking techniques without fear of
corrupting computers or violating any laws. Written in a lab manual
style, the book begins with the installation of the VMware
Workstation product and guides the users through detailed hacking
labs enabling them to experience what a hacker actually does during
an attack. It covers social engineering techniques, footprinting
techniques, and scanning tools. Later chapters examine spoofing
techniques, sniffing techniques, password cracking, and attack
tools. Identifying wireless attacks, the book also explores
Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service
(DoS) attacks. Learn how to secure your computers with this
comprehensive guide on hacking techniques and countermeasures By
understanding how an attack occurs the reader can better understand
how to defend against it. This book shows how an attack is
conceptualized, formulated, and performed. It offers valuable
information for constructing a system to defend against attacks and
provides a better understanding of securing your own computer or
corporate network.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Amsterdam
Christian Bale, Margot Robbie, …
DVD
R210
Discovery Miles 2 100
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|