자료유형 | E-Book |
---|---|
개인저자 | Oriyano, Sean-Philip. Solomon, Michael (Michael G.), 1963- |
서명/저자사항 | Hacker techniques, tools, and incident handling[electronic resource] /Sean-Philip Oriyano, Michael G. Solomon. |
판사항 | Third edition. |
발행사항 | Burlington, MA : Jones & Bartlett Learning, [2020] |
형태사항 | 1 online resource (886 p.) |
총서사항 | Information systems security & assurance series |
소장본 주기 | Master record variable field(s) change: 050, 072, 082, 650 |
ISBN | 9781284147810 1284147819 |
일반주기 |
Controlling Access
|
서지주기 | Includes bibliographical references and index. |
내용주기 | Cover; Title Page; Copyright Page; Contents; Preface; Acknowledgments; About the Authors; CHAPTER 1 Hacking: The Next Generation; Profiles and Motives of Different Types of Hackers; Controls; The Hacker Mindset; Motivation; A Look at the History of Computer Hacking; Ethical Hacking and Penetration Testing; The Role of Ethical Hacking; Ethical Hackers and the C-I-A Triad; Common Hacking Methodologies; Performing a Penetration Test; The Role of the Law and Ethical Standards; CHAPTER 2 TCP/IP Review; Exploring the OSI Reference Model; The Role of Protocols; Layer 1: Physical Layer Layer 2: Data Link LayerLayer 3: Network Layer; Layer 4: Transport Layer; Layer 5: Session Layer; Layer 6: Presentation Layer; Layer 7: Application Layer; Mapping the OSI Model to Functions and Protocols; TCP/IP: A Layer-by-Layer Review; Physical or Network Access Layer; Network or Internet Layer; Host-to-Host Layer; Application Layer; CHAPTER 3 Cryptographic Concepts; Cryptographic Basics; Authentication; Integrity; Nonrepudiation; Symmetric and Asymmetric Cryptography; Cryptographic History; What Is an Algorithm or Cipher?; Symmetric Encryption; Asymmetric Encryption; Digital Signatures Purpose of Public Key InfrastructureThe Role of Certificate Authorities (CAs); PKI Attacks; Hashing; Common Cryptographic Systems; Cryptanalysis; Future Forms of Cryptography; CHAPTER 4 Physical Security; Basic Equipment Controls; Hard Drive and Mobile Device Encryption; Fax Machines and Printers; Voice over IP (VoIP); Physical Area Controls; Fences; Perimeter Intrusion Detection and Assessment System (PIDAS); Gates; Bollards; Facility Controls; Doors, Mantraps, and Turnstiles; Walls, Ceilings, and Floors; Windows; Guards and Dogs; Construction; Personal Safety Controls; Lighting Alarms and Intrusion DetectionClosed-Circuit TV (CCTV)/Remote Monitoring; Physical Access Controls; Locks; Lock Picking; Tokens and Biometrics; Avoiding Common Threats to Physical Security; Natural, Human, and Technical Threats; Physical Keystroke Loggers and Sniffers; Wireless Interception and Rogue Access Points; Defense in Depth; CHAPTER 5 Footprinting Tools and Techniques; The Information-Gathering Process; The Information on a Company Website; Discovering Financial Information; Google Hacking; Exploring Domain Information Leakage; Manual Registrar Query; Automatic Registrar Query; Whois NslookupInternet Assigned Numbers Authority (IANA); Determining a Network Range; Tracking an Organization's Employees; Exploiting Insecure Applications; Using Social Networks; Using Basic Countermeasures; CHAPTER 6 Port Scanning; Determining the Network Range; Identifying Active Machines; Wardialing; Wardriving and Related Activities; Pinging; Port Scanning; Mapping Open Ports; Nmap; SuperScan; Scanrand; THC-Amap; OS Fingerprinting; Active OS Fingerprinting; Passive OS Fingerprinting; Mapping the Network; Analyzing the Results; CHAPTER 7 Enumeration and Computer System Hacking; Windows Basics |
일반주제명 | Computer security. Penetration testing (Computer security) Computer networks -- Security measures. Hackers. COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General |
언어 | 영어 |
기타형태 저록 | Print version:Oriyano, Sean-PhilipHacker Techniques, Tools, and Incident HandlingBurlington : Jones & Bartlett Learning, LLC,c20189781284147803 |
대출바로가기 | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1874525 |
인쇄
No. | 등록번호 | 청구기호 | 소장처 | 도서상태 | 반납예정일 | 예약 | 서비스 | 매체정보 |
---|---|---|---|---|---|---|---|---|
1 | WE00018021 | 005.8 | 가야대학교/전자책서버(컴퓨터서버)/ | 대출가능 |