Hands-on ethical hacking and network defense /
Michael T Simpson, Kent Backman, James E. Corley
- 2nd Ed.
- Boston, MA : Course Technology, 2010.
- p. cm.
Chapter 1 Ethical Hacking Overview (Page-1), Chapter 2 TCP/IP Concepts Review (Page-23), Chapter 3 Network and Computer Attacks (Page-51), Chapter 4 Footprinting and Social Engineering (Page-77), Chapter 5 Port Scanning (Page-109),Chapter 6 Enumeration (Page-131), Chapter 7 Programming for Security Professionals (Page-165), Chapter 8 Desktop and Server OS Vulnerabilities (Page-203), Chapter 9 Embedded Operating Systems: The Hidden Threat (Page-239), Chapter 10 Hacking Web Servers (Page-263), Chapter 11 Hacking Wireless Networks (Page-303), Chapter 12 Cryptography (Page-333), Chapter 13 Network Protection Systems (Page-371), Legal Resources (Page-401).