Skip to content

Hands-On Ethical Hacking and Network Defense

Best in textbook rentals since 2012!

ISBN-10: 1435486099

ISBN-13: 9781435486096

Edition: 2nd 2011

Authors: Michael T. Simpson, Kent Backman, James Corley

List price: $187.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $187.95
Edition: 2nd
Copyright year: 2011
Publisher: Delmar Cengage Learning
Publication date: 3/17/2010
Binding: Paperback
Pages: 480
Size: 7.25" wide x 9.00" long x 1.00" tall
Weight: 1.870
Language: English

Michael T. Simpson has 20 years of experience in IT as a software engineer, network engineer, database administrator, and security professional. He worked for the Department of Defense for 12 years, serving as Information Systems Security Officer for three years. Michael is also the president of MTS Consulting, Inc., an IT consulting company. He holds the following certifications: OPST, OPSA (OSSTMM Professional Security Tester/Analyst), CEH (Certified Ethical Hacker, EC-Council), CompTIA Security + and Network+, MCSE, MCDBA, MCSD, MCDST, and OCP (Oracle Certified Professional). Michael has co-authored Guide to Novell NetWare 6.0 Administration (2003) and Guide to Novell NetWare 6.0/6.5…    

Kent Backman's expertise is in intrusion analysis, network vulnerability assessment, and open-source solution engineering. His interest and skill in ethical hacking developed while managing Web servers for Fortune 500 companies. An analyst for several security incident response teams, Kent also spent several years in Baghdad as part of the advisory team to the Iraq Ministry of Defense, specializing in network security and Linux engineering. He holds RHCT, MCSA, CISSP, and CEH certifications and is a network security consultant in Honolulu.

James (Jim) Corley has more than 25 years of experience in IT as a systems analyst, network engineer, and security professional. He worked for the Department of Defense (DoD) for nine years as a database administrator and information systems security officer. For the past 16 years, Jim has been a consultant to the DoD on dozens of IT programs supporting both classified and unclassified voice, video, and data systems. He has been a Certified Information Systems Security Professional (CISSP) since 2002.

Ethical Hacking Overview
TCP/IP Concepts Review
Network and Computer Attacks
Footprinting and Social Engineering
Port Scanning
Enumeration
Programming for Security Professionals
Embedded Operating Systems
Linux Operating System Vulnerabilities
Hacking Web Servers
Hacking Wireless Networks
Cryptography
Protecting Networks with Security Devices
Legal Resources
Resources
Virtual Machine Instructions
Appendix: Documentation Forms for Penetration Tests (Will appear on DVD in the back of the book only)