Hacking Exposed 7

Hacking Exposed 7 pdf epub mobi txt 電子書 下載2025

出版者:
作者:McClure, Stuart; Scambray, Joel; Kurtz, George
出品人:
頁數:768
译者:
出版時間:2012-7
價格:$ 56.50
裝幀:
isbn號碼:9780071780285
叢書系列:
圖書標籤:
  • 計算機
  • 編程
  • 第一梯隊
  • 安全
  • hack
  • 英文原版
  • [Security]
  • 網絡安全
  • 滲透測試
  • 漏洞分析
  • 黑客技術
  • 信息安全
  • 網絡攻擊
  • 防禦技術
  • 安全實踐
  • 計算機安全
  • 道德黑客
想要找書就要到 小美書屋
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

具體描述

This is the latest tactics for thwarting digital attacks. "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." (Brett Wahlin, CSO, Sony Network Entertainment). "Stop taking punches - let's change the game; it's time for a paradigm shift in the way we secure our networks, and "Hacking Exposed 7" is the playbook for bringing pain to our adversaries." (Shawn Henry, former Executive Assistant Director, FBI). Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. "Hacking Exposed 7: Network Security Secrets and Solutions" contains all-new visual maps and a comprehensive "countermeasures cookbook." It features: obstruct APTs and web-based meta-exploits; defend against UNIX-based root access and buffer overflow hacks; block SQL injection, spear phishing, and embedded-code attacks; detect and terminate rootkits, Trojans, bots, worms, and malware; lock down remote access; using smartcards and hardware tokens; protect 802.11 WLANs with multilayered encryption and gateways; plug holes in VoIP, social networking, cloud, and Web 2.0 services; and learn about the latest iPhone and Android attacks and how to protect yourself.

著者簡介

圖書目錄

讀後感

評分

評分

評分

評分

評分

用戶評價

评分

課本

评分

Good for script kiddies

评分

Good for script kiddies

评分

Good for script kiddies

评分

Good for script kiddies

本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

© 2025 book.quotespace.org All Rights Reserved. 小美書屋 版权所有