Skip to content

Hacking Exposed, Sixth Edition Network Security Secrets& Solutions

Best in textbook rentals since 2012!

ISBN-10: 0071613749

ISBN-13: 9780071613743

Edition: 6th 2009 (Anniversary)

Authors: Stuart McClure, Joel Scambray, George Kurtz

List price: $49.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The tenth anniversary edition of the world's bestselling computer security book! The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more. Hacking Exposed 6 applies the authors' internationally renowned computer security methodologies, technical rigor, and "from-the-trenches" experience to make computer…    
Customers also bought

Book details

List price: $49.99
Edition: 6th
Copyright year: 2009
Publisher: McGraw-Hill Osborne
Publication date: 1/5/2009
Binding: Paperback
Pages: 720
Size: 7.25" wide x 9.00" long x 1.50" tall
Weight: 2.640
Language: English

Joel Scambray, CISSP , is Chief Strategy Officer at Leviathan Security Group (leviathansecurity.com). His nearly 15 years of information security experience encompasses roles as a corporate leader (senior management positions at Microsoft and Ernst & Young), entrepreneur (co-founder of Foundstone), successful technical consultant for Fortune 500 firms, and internationally recognized speaker and author of multiple security books, including all five editions of Hacking Exposed: Network Security Secrets & Solutions . Stuart McClure, CISSP , an independent computer security consultant, is one of today's leading authorities on information security. He was SVP of Global Threats and Research for…    

Casing the Establishment
Footprinting
Scanning
Enumeration
System Hacking
Hacking Windows
Hacking Unix
Infrastructure Hacking
Remote Connectivity and VoIP Hacking
Network Devices
Wireless Hacking
Hacking Hardware
Application and Data Hacking
Hacking Code
Web Hacking
Hacking the Internet User
Appendixes
Ports
Top 14 Security Vulnerabilities
Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
Index