Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems
ISBN-10
1111787018
ISBN-13
9781111787011
Series
Ethical Hacking and Countermeasures
Category
Computers
Pages
192
Language
English
Published
2009-09-24
Publisher
Cengage Learning
Author
EC-Council

Description

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Similar books

  • Ethical Hacking and Countermeasures: Web Applications and Data Servers
    By EC-Council

    The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems.

  • Ethical Hacking and Countermeasures: Attack Phases
    By EC-Council

    The EC-Council l Press Ethical Hacking and Countermeasures series is intended for those studying to become security ... Data Servers/1435483626 ' Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems/1435483642 ...

  • CYBERWARFARE SOURCEBOOK
    By A. Kiyuna, L. Conyers

    This hacker ethic was publicized and perhaps originated in Steven Levy's Hackers: Heroes of the Computer Revolution (1984). It contains a codification of its principles. The programmer subculture of hackers disassociates from the mass ...

  • Certified Ethical Hacker (CEH) Version 9 Cert Guide
    By Michael Gregg

    Consequently, most WLANs use a single shared key on all stations, which makes it easier for a hacker to recover the key. Now, let's take a closer look at WEP and discuss the way it operates. To better understand the WEP process, ...

  • CEH Certified Ethical Hacker Study Guide
    By Kimberly Graves

    Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide.

  • Certified Ethical Hacker (CEH) Cert Guide: Cert Ethi Hack (CEH Cert Guid
    By Michael Gregg

    This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book.

  • Hacking For Dummies
    By Kevin Beaver, Richard Stiennon

    Certainly not! If security assessments are on your to-do list, this book helps you identify vulnerabilities in your system and stay on top of the security game.

  • CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition
    By Matt Walker

    According to a recent study by Harvard Business Review, consumers of smartphones spend only a fraction of their time either planning for, or accomplishing, work activities on their smart devices. An incredible 77 percent of their time, ...

  • CEH v9: Certified Ethical Hacker Version 9 Study Guide
    By Sean-Philip Oriyano

    This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material.

  • CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
    By Kimberly Graves

    Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers.