We recommend using a modern web browser such as Google Chrome or Microsoft Edge with their default settings.
READING ON THE GO AT UNION STATION LENDING LIBRARY
In the spring of 2015, The Union Station Redevelopment Corporation launched a […]
Hello, I'm an eBook!
ATTENTION: This item is an eBook. It can be read on iOS, Android, MAC and PC's with a supported eReader. It is not a physical book. eBooks are available via download immediately after you've checked out.
Shipped from other seller
The Book Cellar
Old Colorado City Books
One Stop Shop Bookstore
Through The Stacks LLC
"Hacking Exposed 7: Network Security Secrets and Solutions" is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more The 7th Edition also features a new "5 Deployments" approach for the first time that provides five key actions for every countermeasure--focused on five areas of expertise: 1. Network Security 2. Server Security 3. Mobile Security 4. Endpoint Security 5. Web Security
"Hacking Exposed 7" applies the authors' internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.
New to This Edition Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by hackers to inject malware into networks and establish botnets, and provides countermeasures to defend against these increasingly prevalent threats NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving "one best" command that can be deployed to fight the greatest number of potential attacks Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control remote devices and provides countermeasures to defend against these hacks New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, Windows Server 2010, Cisco, RFID, data theft, and more
Praise for Previous Editions "If there was an "Encyclopedia Britannica" of computer security, it would be "Hacking Exposed."" --Marty Roesch, creator of the Snort tool
"Informational gold." --Bruce Schneier, CTO, Counterpane Internet Security, Inc.
"Real security is proven by trying to break it, and few sources will show you how to do that better than "Hacking Exposed"" --Thomas Ptacek, Researcher at Arbor Networks
"If this book doesn't scare and motivate you to take security seriously, nothing will." --AlephOne, Bugtraq Moderator
"The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy." - Simple Nomad, author of The Hack FAQ and Pandora
"A critical step to knowing your enemy is first understanding their tools. "Hacking Exposed, Fifth Edition" delivers just that...and more." --Lance Spitzner, President and Founder of the Honeynet Project
Come shop our entire inventory of used books. Get discount code »
Gift Certificate = Happy Friend + Books donated to families in need. Make Someone Happy »
We match every book you purchase with a book donation. Learn more »
Sign up now to get news, sales and special promotions!
© Better World Books (BetterWorldBooks.com)