We recommend using a modern web browser such as Google Chrome or Microsoft Edge with their default settings.
WORDSWORTH AT ALA!
At the yearly gathering of booklovers held in Chicago’s McCormick Place convention center June 22 – 27, Wordsworth the Better World Bookmobile is...
Hello, I'm an eBook!
ATTENTION: This item is an eBook. It can be read on iOS, Android, MAC and PC's with a supported eReader. It is not a physical book. eBooks are available via download immediately after you've checked out.
Shipped from other seller
Half Price Books Inc
Outlook Books, Inc
"Hacking Exposed 7: Network Security Secrets and Solutions" is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more The 7th Edition also features a new "5 Deployments" approach for the first time that provides five key actions for every countermeasure--focused on five areas of expertise: 1. Network Security 2. Server Security 3. Mobile Security 4. Endpoint Security 5. Web Security
"Hacking Exposed 7" applies the authors' internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.
New to This Edition Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by hackers to inject malware into networks and establish botnets, and provides countermeasures to defend against these increasingly prevalent threats NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving "one best" command that can be deployed to fight the greatest number of potential attacks Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control remote devices and provides countermeasures to defend against these hacks New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, Windows Server 2010, Cisco, RFID, data theft, and more
Praise for Previous Editions "If there was an "Encyclopedia Britannica" of computer security, it would be "Hacking Exposed."" --Marty Roesch, creator of the Snort tool
"Informational gold." --Bruce Schneier, CTO, Counterpane Internet Security, Inc.
"Real security is proven by trying to break it, and few sources will show you how to do that better than "Hacking Exposed"" --Thomas Ptacek, Researcher at Arbor Networks
"If this book doesn't scare and motivate you to take security seriously, nothing will." --AlephOne, Bugtraq Moderator
"The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy." - Simple Nomad, author of The Hack FAQ and Pandora
"A critical step to knowing your enemy is first understanding their tools. "Hacking Exposed, Fifth Edition" delivers just that...and more." --Lance Spitzner, President and Founder of the Honeynet Project
Our best deal on used books 3 for $10 and just $3 each additional book. Shop and Save
We match every book you purchase with a book donation. Learn more »
Gift Certificate = Happy Friend + Books donated to families in need. Make Someone Happy »
Come save on used books in the Clearance Aisle. Learn more »
All used inventory that ships from Better World Books may come from separate Better World Books distribution centers.
Sign up now to get news, sales and special promotions!
© Better World Books (BetterWorldBooks.com)