Skip to content

Computer Security and Penetration Testing

Best in textbook rentals since 2012!

ISBN-10: 1418048267

ISBN-13: 9781418048266

Edition: 2008

Authors: Auth, Wolf Halton, Alfred Basta

List price: $117.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

This book is designed to give readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. With real-world examples that reflect today?s most important and relevant security topics, Penetration Testing will address how and why people attack computers and networks, so that readers can be armed with the knowledge and techniques to successfully combat hackers. Because the world of information security changes so quickly and is often the subject of much hype, this book also aims to provide a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this valuable resource teaches…    
Customers also bought

Book details

List price: $117.95
Copyright year: 2008
Publisher: Delmar Cengage Learning
Publication date: 8/31/2007
Binding: Paperback
Pages: 608
Size: 7.50" wide x 9.75" long x 1.00" tall
Weight: 1.584
Language: English

Wolf Halton, AB, MSc, is an Instructor in Information Security. He currently serves as the CEO of Halton Technical Services, providing security consulting, web strategy, configuration services, and project management for various clients. Mr. Halton is a professional speaker on the topics of internet security, Linux adoption, and Spam-relief strategies.

Alfred Basta, PhD, is a professor of mathematics, cryptography, and information security as well as a professional speaker on topics in Internet security, networking, and cryptography. He is a member of many associations including the Mathematical Association of America. Dr. Basta's other publications include MATHEMATICS FOR INFORMATION TECHNOLOGY, LINUX OPERATIONS AND ADMINISTRATION, and DATABASE SECURITY.

Ethics of Hacking and Cracking
Reconnaissance
Scanning Tools
Sniffers
TCP/IP Vulnerabilities
Techniques of Password Cracking
Spoofing
Session Hijacking
Hacking Network Devices
Trojan Horses
Denial of Service Attacks
Buffer Overflows
Programming Exploits
Mail Vulnerabilities
Web Application Vulnerabilities
Windows Vulnerabilities
Linux Vulnerabilities
Incident Handling Appendices (H1)
ASCII Code
IPv4 IP Packet Structure
Hunt Menus
Historic Windows Glossary References