Hacking Exposed 7 Network Security Secrets and Solutions

by ; ;
  • ISBN13:


  • ISBN10:


  • Edition: 7th
  • Format: Paperback
  • Copyright: 8/1/2012
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • We Buy This Book Back!
    In-Store Credit: $10.50
    Check/Direct Deposit: $10.00
List Price: $50.00 Save up to $45.00
  • Rent Book $5.00
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


A fully updated edition of the world's bestselling computer security book Hacking Exposed 7: Network Security Secrets and Solutionsis filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new "5 Deployments" approach for the first time that provides five key actions for every countermeasurefocused on five areas of expertise: 1. Network Security 2. Server Security 3. Mobile Security 4. Endpoint Security 5. Web Security Hacking Exposed 7applies the authors' internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues. New to This Edition Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by hackers to inject malware into networks and establish botnets, and provides countermeasures to defend against these increasingly prevalent threats NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving "one best" command that can be deployed to fight the greatest number of potential attacks Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control remote devices and provides countermeasures to defend against these hacks New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, Windows Server 2010, Cisco, RFID, data theft, and more Praise for Previous Editions "If there was an Encyclopedia Britannicaof computer security, it would be Hacking Exposed." --Marty Roesch, creator of the Snort tool "Informational gold." --Bruce Schneier, CTO, Counterpane Internet Security, Inc. "Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed" --Thomas Ptacek, Researcher at Arbor Networks "If this book doesn't scare and motivate you to take security seriously, nothing will." --AlephOne, Bugtraq Moderator "The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy." - Simple Nomad, author of The Hack FAQ and Pandora "A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Editiondelivers just that...and more." --Lance Spitzner, President and Founder of the Honeynet Project

Table of Contents

1: Footprinting
2: Scanning
3: Enumeration
4. Hacking Windows
5. Hacking UNIX
6: Remote Connectivity and VoIP Hacking
7. Network Devices (Expanded)
8: Wireless Devices (Expanded)
9: Embedded Systems (NEW)
10: Web Hacking
11. Countermeasures Map (NEW)
Appendix A: Ports
Appendix B: Top 14 Security Vulnerabilities
Appendix C: Denial of Service (DoS) Attacks

Rewards Program

Write a Review