000 01933cam a2200277 i 4500
005 20250421080555.0
008 240214s2024 mau b 001 0 eng
020 _a9781284248999 (paperback)
037 _bSBF2023
040 _aDLC
_beng
_erda
_cDLC
_dDLC
_dAE-Shu
_cUKB
050 0 0 _aTK5105.59
_b.O786 2024
100 1 _aSolomon, Michael
_q(Michael G.),
_d1963-
_eauthor.
240 1 0 _aHacker techniques, tools, and incident handling
245 1 0 _aEthical hacking :
_btechniques, tools, and countermeasures /
_cMichael G. Solomon, Sean-Philip Oriyano.
250 _aFourth edition.
260 _aBurlington, Massachusetts :
_bJones & Bartlett Learning,
_c[2024]
300 _axxi, 413 pages ;
_c24 cm
365 _b404.00
_cAED
500 _aPrevious edition: Hacker techniques, tools, and incident handling. Third edition. Burlington, MA : Jones & Bartlett Learning, 2020.
504 _aIncludes bibliographical references and index.
520 _a"Ethical Hacking covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen-testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies the tools and methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. This title is can be aligned to EC Council's Certified Ethical Hacker in terms of scope (but not rigor)"--
_cProvided by publisher.
650 0 _aHackers.
650 0 _aPenetration testing (Computer security)
700 1 _aOriyano, Sean-Philip,
_eauthor.
942 _cBKS
999 _c18964
_d18964