What is included with this book?
Stuart McClure, CISSP, CNE, CCSE,
was founder, president, and CTO of Foundstone, and ran the worldwide AVERT team at McAfee.Joel Scambray, CISSP, is chief strategy officer for Leviathan Security Group and was a senior director at Microsoft Corporation focusing on security.
George Kurtz, CISSP, former CEO of Foundstone, is senior vice president and general manager of McAfee's Risk And Compliance Business Unit. All three are the coauthors of the previous editions of Hacking Exposed.
.Casing the Establishment | |
Footprinting | |
Scanning | |
Enumeration | |
System Hacking | |
Hacking Windows | |
Hacking Unix | |
Infrastructure Hacking | |
Remote Connectivity and VoIP Hacking | |
Network Devices | |
Wireless Hacking | |
Hacking Hardware | |
Application and Data Hacking | |
Hacking Code | |
Web Hacking | |
Hacking the Internet User | |
Appendixes | |
Ports | |
Top 14 Security Vulnerabilities | |
Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.