Hacker techniques, tools, and incident handling / [Book] / Sean-Philip Oriyano.
Material type: TextSeries: Edition: Second editionDescription: xvii, 417 pages : illustrations ; 24 cmISBN:- 9781284031713 (pbk.)
- Computer security
- Computer networks -- Security measures
- Hackers
- Electrical and Computer Engineering-- -- Electrical Engineering--
- Electrical and Computer Engineering--
- Sliding mode control -- Grid connected photovoltaic system -- PBSMC
- Three phase inverter -- Environmental conditions -- Substantial robustness
- 005.8
- 005.8
Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Books | Junaid Zaidi Library, COMSATS University Islamabad Ground Floor | 005.8 ORI-H (Browse shelf(Opens below)) | Available | 51863 |
Browsing Junaid Zaidi Library, COMSATS University Islamabad shelves, Shelving location: Ground Floor Close shelf browser (Hides shelf browser)
005.8 OPP-S Secure messaging with PGP and S/MIME | 005.8 OPP-S Security technologies for the World Wide Web | 005.8 OPP-S SSL and TLS theory and practice / | 005.8 ORI-H Hacker techniques, tools, and incident handling / | 005.8 PAG-I Intranet firewalls | 005.8 PAL-P 63297 Practical Threat Intelligence and Data-Driven Threat Hunting | 005.8 PAQ-I 63396 Implementing Cisco IOS network security (IINS) : foundation learning guide / |
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.
All.
All
There are no comments on this title.