Hands-On Ethical Hacking and Network Defense
Buy it from:
Rent it from:
List Price: $176.95
Publisher: Delmar Cengage Learning
Size: 7.25" wide x 9.00" long x 1.00" tall
Michael T. Simpson has 20 years of experience in IT as a software engineer, network engineer, database administrator, and security professional. He worked for the Department of Defense for 12 years, serving as Information Systems Security Officer for three years. Michael is also the president of MTS Consulting, Inc., an IT consulting company. He holds the following certifications: OPST, OPSA (OSSTMM Professional Security Tester/Analyst), CEH (Certified Ethical Hacker, EC-Council), CompTIA Security + and Network+, MCSE, MCDBA, MCSD, MCDST, and OCP (Oracle Certified Professional). Michael has co-authored Guide to Novell NetWare 6.0 Administration (2003) and Guide to Novell NetWare 6.0/6.5 Administration (2004) for Course Technology, as well as several books on MCDST, MCSE, and MCSA certification topics.
Kent Backman's expertise is in intrusion analysis, network vulnerability assessment, and open-source solution engineering. His interest and skill in ethical hacking developed while managing Web servers for Fortune 500 companies. An analyst for several security incident response teams, Kent also spent several years in Baghdad as part of the advisory team to the Iraq Ministry of Defense, specializing in network security and Linux engineering. He holds RHCT, MCSA, CISSP, and CEH certifications and is a network security consultant in Honolulu.
James (Jim) Corley has more than 25 years of experience in IT as a systems analyst, network engineer, and security professional. He worked for the Department of Defense (DoD) for nine years as a database administrator and information systems security officer. For the past 16 years, Jim has been a consultant to the DoD on dozens of IT programs supporting both classified and unclassified voice, video, and data systems. He has been a Certified Information Systems Security Professional (CISSP) since 2002.
|Ethical Hacking Overview|
|TCP/IP Concepts Review|
|Network and Computer Attacks|
|Footprinting and Social Engineering|
|Programming for Security Professionals|
|Embedded Operating Systems|
|Linux Operating System Vulnerabilities|
|Hacking Web Servers|
|Hacking Wireless Networks|
|Protecting Networks with Security Devices|
|Virtual Machine Instructions|
|Appendix: Documentation Forms for Penetration Tests (Will appear on DVD in the back of the book only)|