LiveZilla Live Chat Software
Importitall
Register/Login Login Contact UsContacts BlogBlog
Cart Items : 0 | Cart Total : R0
USA Categories
Site Security
Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications > B008HSUPIY
  1. Hacking Exposed 7: Network Security Secrets and Solutions
    Image(s) provided for illustrative purposes and may differ from the actual product
  2. Hacking Exposed 7: Network Security Secrets and Solutions

    [B008HSUPIY]
    Delivery: 10-20 Working Days
    Not Available / Digital Item

    pinterest
Additional Information

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment

“Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI

Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”

  • Obstruct APTs and web-based meta-exploits
  • Defend against UNIX-based root access and buffer overflow hacks
  • Block SQL injection, spear phishing, and embedded-code attacks
  • Detect and terminate rootkits, Trojans, bots, worms, and malware
  • Lock down remote access using smartcards and hardware tokens
  • Protect 802.11 WLANs with multilayered encryption and gateways
  • Plug holes in VoIP, social networking, cloud, and Web 2.0 services
  • Learn about the latest iPhone and Android attacks and how to protect yourself

Similar Products

The Hacker Playbook 2: Practical Guide To Penetration TestingHacking Exposed Wireless, Third Edition: Wireless Security Secrets & SolutionsHacking: The Art of Exploitation, 2nd EditionThe Web Application Hacker's Handbook: Finding and Exploiting Security FlawsThe Practice of Network Security Monitoring: Understanding Incident Detection and ResponseDefensive Security Handbook: Best Practices for Securing InfrastructureBlack Hat Python: Python Programming for Hackers and PentestersGray Hat Hacking The Ethical Hacker's Handbook, Fourth EditionMetasploit: The Penetration Tester's Guide
Specifications

Country
USA
Author
Stuart McClure
Binding
Kindle Edition
Edition
7
EISBN
9780071780292
Format
Kindle eBook
Label
McGraw-Hill Education
Manufacturer
McGraw-Hill Education
NumberOfPages
768
PublicationDate
2012-07-23
Publisher
McGraw-Hill Education
ReleaseDate
2012-07-23
Studio
McGraw-Hill Education
Please Note

The authorised South African distributor of this product is under no obligation to honour the manufacture's guarantees/warranties or to provide after-sales service.

Please note that this product is based in the USA, and is designed and labelled to be used in the USA. If the unit is powered and plugs into an electrical socket, we cannot import the unit for you due to local regulations, as a permit is required for electrical goods. Please check with us if you are unsure or need any assistance!

Please also note that certain items cannot be imported, these include Alcohol, Agricultural Remedies, Animals, Batteries, Flammable Materials, Farm Feeds, Currency, Food, Furs, Chemicals, Explosives, Medications, Plants, Poisons, Seeds, Supplements, Nutrients, Pressurized Cans, Tactical Equipment, Vitamins, Weaponry and Weaponry Accessories. In these cases, information displayed above is for reference/informational purposes only and the item will not be imported. All content is generated and displayed from an automated USA product feed, and if the item cannot be imported for any reason, including carrier restrictions and/or import or sales restrictions under South African or American law, we do reserve the right to cancel and refund the order in full. If you are not sure if we are permitted to bring in an item, please send us an e-mail with a link to the item to confirm.

Please also ensure that you are ordering the correct item for your particular application as returns to the USA are costly. Product reviews are also provided for most of our items, which can give you a good idea for possible things to look out for and the quality of the item. By clicking Add to Cart, you are confirming that the item is correct and you accept the conditions listed here.