Hacking Exposed 7: Network Security Secrets and Solutions covers all-new attacks and countermeasures for advanced persistent threats, infrastructure hacks, industrial automation and embedded devices, wireless security, the new SCADA protocol hacks, Microsoft Windows Server 2010, Web 2.0, Ubuntu Linux, hardware, Cisco, RFID, malware, and more! The 7th Edition also features a new 5 Deployments approach for the first time that provides five key actions for every countermeasurefocused on five areas of expertise:
1. Network Security
2. Server Security
3. Mobile Security
4. Endpoint Security
5. Web Security
Hacking Exposed has led the market as the Bible for IT security professionals for more than a decade. The authors have a cult following due to an ability to cut to the chase in their book, which details all the best-kept anti-hacker secrets. Threats to network security are more virulent today than ever beforeand our author team has lived it. The 7th Edition is an essential read for existing and new customers alike in order to successfully troubleshoot the newest, toughest hacks ever seen.
Hacking Exposed 7 applies the authors internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.
Table of Contents
1: Footprinting
2: Scanning
3: Enumeration
4. Hacking Windows
5. Hacking UNIX
6: Remote Connectivity and VoIP Hacking
7. Network Devices (Expanded)
8: Wireless Devices (Expanded)
9: Embedded Systems (NEW)
10: Web Hacking
11. Countermeasures Map (NEW)
Appendix A: Ports
Appendix B: Top 14 Security Vulnerabilities
Appendix C: Denial of Service (DoS) Attacks
Table of Contents:
Table of Contents
1: Footprinting
2: Scanning
3: Enumeration
4. Hacking Windows
5. Hacking UNIX
6: Remote Connectivity and VoIP Hacking
7. Network Devices (Expanded)
8: Wireless Devices (Expanded)
9: Embedded Systems (NEW)
10: Web Hacking
11. Countermeasures Map (NEW)
Appendix A: Ports
Appendix B: Top 14 Security Vulnerabilities
Appendix C: Denial of Service (DoS) Attacks