000 01254 a2200205 4500
003 Nust
005 20231205091303.0
010 _a 2010922642
020 _a9781435486096
040 _cNust
082 _a005.38,SIM
100 1 _aMichael, T Simpson, Kent Backman, James E. Corley
_9119455
245 1 0 _aHands-on ethical hacking and network defense /
_cMichael T Simpson, Kent Backman, James E. Corley
250 _a2nd Ed.
260 _aBoston, MA :
_bCourse Technology,
_c2010.
300 _ap. cm.
505 _aChapter 1 Ethical Hacking Overview (Page-1), Chapter 2 TCP/IP Concepts Review (Page-23), Chapter 3 Network and Computer Attacks (Page-51), Chapter 4 Footprinting and Social Engineering (Page-77), Chapter 5 Port Scanning (Page-109),Chapter 6 Enumeration (Page-131), Chapter 7 Programming for Security Professionals (Page-165), Chapter 8 Desktop and Server OS Vulnerabilities (Page-203), Chapter 9 Embedded Operating Systems: The Hidden Threat (Page-239), Chapter 10 Hacking Web Servers (Page-263), Chapter 11 Hacking Wireless Networks (Page-303), Chapter 12 Cryptography (Page-333), Chapter 13 Network Protection Systems (Page-371), Legal Resources (Page-401).
651 _a(Include CD)
_98953
942 _2ddc
_cBK
_k005.38,SIM
999 _c188908
_d188908