Counter Hack Reloaded Counter Hack Reloaded

Counter Hack Reloaded

A Step-by-Step Guide to Computer Attacks and Effective Defenses

    • $94.99
    • $94.99

Publisher Description

For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today’s newest, most sophisticated, and most destructive attacks.

For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You’ll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.

Important features of this new edition include All-new “anatomy-of-an-attack” scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and “Google hacking” New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits

GENRE
Computers & Internet
RELEASED
2005
December 23
LANGUAGE
EN
English
LENGTH
784
Pages
PUBLISHER
Pearson Education
SELLER
Pearson Education Inc.
SIZE
18.3
MB
Hacking Exposed 7 Hacking Exposed 7
2012
The Network Security Test Lab The Network Security Test Lab
2015
CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions
2023
How Cybersecurity Really Works How Cybersecurity Really Works
2021
A First Course In Ethical Hacking A First Course In Ethical Hacking
2013
Network Security Bible Network Security Bible
2011