Book description
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.
Instructor Materials for Hacker Techniques, Tools, and Incident Handling include:
PowerPoint Lecture Slides
Exam Questions
Case Scenarios/Handouts
Table of contents
- Cover
- Title Page
- Copyright
- Contents
- Preface
- Acknowledgments
- About the Author
-
Part One: Hacker Techniques and Tools
- Chapter 1 Hacking: The Next Generation
- Chapter 2 TCP/IP Review
- Chapter 3 Cryptographic Concepts
- Chapter 4 Physical Security
-
Part Two: A Technical and Social Overview of Hacking
-
Chapter 5 Footprinting Tools and Techniques
- The Information-Gathering Process
- The Information on a Company Web Site
- Discovering Financial Information
- Google Hacking
- Exploring Domain Information Leakage
- Tracking an Organization’s Employees
- Exploiting Insecure Applications
- Using Social Networks
- Using Basic Countermeasures
- Chapter Summary
- Key Concepts and Terms
- Chapter 5 Assessment
- Chapter 6 Port Scanning
- Chapter 7 Enumeration and Computer System Hacking
- Chapter 8 Wireless Vulnerabilities
- Chapter 9 Web and Database Attacks
- Chapter 10 Malware
- Chapter 11 Sniffers, Session Hijacking, and Denial of Service Attacks
- Chapter 12 Linux and Penetration Testing
- Chapter 13 Social Engineering
-
Chapter 5 Footprinting Tools and Techniques
-
Part Three: Incident Response and Defensive Technologies
- Chapter 14 Incident Response
- Chapter 15 Defensive Technologies
- Appendix A: Answer Key
- Appendix B: Standard Acronyms
- Glossary of Key Terms
- References
- Index
Product information
- Title: Hacker Techniques, Tools, and Incident Handling, 2nd Edition
- Author(s):
- Release date: August 2013
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9781284031706
You might also like
book
Hacker Techniques, Tools, and Incident Handling
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Hacker Techniques, …
book
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe …
book
Computer and Information Security Handbook, 3rd Edition
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer …
book
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way This practical …