CART

(0) items

Hands-On Ethical Hacking and Network Defense,9781435486096
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Hands-On Ethical Hacking and Network Defense

by ; ;
Edition:
2nd
ISBN13:

9781435486096

ISBN10:
1435486099
Format:
Paperback
Pub. Date:
3/17/2010
Publisher(s):
Cengage Learning
List Price: $180.95

Rent Textbook

(Recommended)
 
Term
Due
Price
$63.33

Hurry!

Only one copy
in stock at this price.

Buy Used Textbook

In Stock Usually Ships in 24 Hours.
U9781435486096
$126.67

Buy New Textbook

Currently Available, Usually Ships in 24-48 Hours
N9781435486096
$162.86

eTextbook

Downloadable Offline Access
  • Apple Devices
  • Android Devices
  • Windows Devices
  • Mac Devices

 
Duration
Price
$35.99
More New and Used
from Private Sellers
Starting at $72.39
See Prices

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 2nd edition with a publication date of 3/17/2010.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Used copy of this book is not guaranteed to inclue any supplemental materials. Typically, only the book itself is included.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.

Customer Reviews

So Helpful  July 31, 2011
by


There is nothing to regret from purchasing this textbook. I am 100% satisfactory because I bought this book as used textbook but only to receive a new textbook. I am 100% satisfactory. Thanks ecampus.






Hands-On Ethical Hacking and Network Defense: 4 out of 5 stars based on 1 user reviews.

Summary

Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks.

This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Readers are provided with updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also included is a thorough update of the federal and state computer crime laws, as well as changes in penalties for illegal computer hacking.

With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker.

Table of Contents

Ethical Hacking Overview
TCP/IP Concepts Review
Network and Computer Attacks
Footprinting and Social Engineering
Port Scanning
Enumeration
Programming for Security Professionals
Embedded Operating Systems
Linux Operating System Vulnerabilities
Hacking Web Servers
Hacking Wireless Networks
Cryptography
Protecting Networks with Security Devices
Legal Resources
Resources
Virtual Machine Instructions
Appendix: Documentation Forms for Penetration Tests (Will appear on DVD in the back of the book only)
Table of Contents provided by Publisher. All Rights Reserved.


Please wait while the item is added to your cart...