Image from Google Jackets

Ethical hacking : techniques, tools, and countermeasures / Michael G. Solomon, Sean-Philip Oriyano.

By: Contributor(s): Material type: TextTextPublication details: Burlington, Massachusetts : Jones & Bartlett Learning, [2024]Edition: Fourth editionDescription: xxi, 413 pages ; 24 cmISBN:
  • 9781284248999 (paperback)
Uniform titles:
  • Hacker techniques, tools, and incident handling
Subject(s): LOC classification:
  • TK5105.59 .O786 2024
Summary: "Ethical Hacking covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen-testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies the tools and methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. This title is can be aligned to EC Council's Certified Ethical Hacker in terms of scope (but not rigor)"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Previous edition: Hacker techniques, tools, and incident handling. Third edition. Burlington, MA : Jones & Bartlett Learning, 2020.

Includes bibliographical references and index.

"Ethical Hacking covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen-testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies the tools and methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. This title is can be aligned to EC Council's Certified Ethical Hacker in terms of scope (but not rigor)"-- Provided by publisher.

There are no comments on this title.

to post a comment.

© 2025 University of Kalba. All Rights Reserved.