000 | 01933cam a2200277 i 4500 | ||
---|---|---|---|
005 | 20250421080555.0 | ||
008 | 240214s2024 mau b 001 0 eng | ||
020 | _a9781284248999 (paperback) | ||
037 | _bSBF2023 | ||
040 |
_aDLC _beng _erda _cDLC _dDLC _dAE-Shu _cUKB |
||
050 | 0 | 0 |
_aTK5105.59 _b.O786 2024 |
100 | 1 |
_aSolomon, Michael _q(Michael G.), _d1963- _eauthor. |
|
240 | 1 | 0 | _aHacker techniques, tools, and incident handling |
245 | 1 | 0 |
_aEthical hacking : _btechniques, tools, and countermeasures / _cMichael G. Solomon, Sean-Philip Oriyano. |
250 | _aFourth edition. | ||
260 |
_aBurlington, Massachusetts : _bJones & Bartlett Learning, _c[2024] |
||
300 |
_axxi, 413 pages ; _c24 cm |
||
365 |
_b404.00 _cAED |
||
500 | _aPrevious edition: Hacker techniques, tools, and incident handling. Third edition. Burlington, MA : Jones & Bartlett Learning, 2020. | ||
504 | _aIncludes bibliographical references and index. | ||
520 |
_a"Ethical Hacking covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen-testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies the tools and methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. This title is can be aligned to EC Council's Certified Ethical Hacker in terms of scope (but not rigor)"-- _cProvided by publisher. |
||
650 | 0 | _aHackers. | |
650 | 0 | _aPenetration testing (Computer security) | |
700 | 1 |
_aOriyano, Sean-Philip, _eauthor. |
|
942 | _cBKS | ||
999 |
_c18964 _d18964 |