skip to content
Practical hacking techniques and countermeasures Preview this item
ClosePreview this item
Checking...

Practical hacking techniques and countermeasures

Author: Mark D Spivey
Publisher: Boca Raton, FL : Auerbach Publications, ©2007.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a computer system can be successfully attacked and compromised. This book shows how an attack is conceptualized, formulated and performed. With the VMware® Workstation software package available on the accompanying CD, it uses virtual computers to illustrate how an attack is executed,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Spivey, Mark D.
Practical hacking techniques and countermeasures.
Boca Raton, FL : Auerbach Publications, ©2007
(DLC) 2006013484
(OCoLC)67728222
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Mark D Spivey
ISBN: 9781420013382 1420013386
OCLC Number: 85589123
Description: 1 online resource (xii, 737 pages) : illustrations
Contents: Front cover; Preface; Contents; Chapter 1. Preparation; Chapter 2. Banner Identification; Chapter 3. Target Enumeration; Chapter 4. Scanning; Chapter 5. Sniffing Traffic; Chapter 6. Spoofing; Chapter 7. Brute Force; Chapter 8. Vulnerability Scanning; Chapter 9. Wireless; Chapter 10. Redirection; Chapter 11. Denial-of-Service (DoS); Appendix A. References; Appendix B. Tool Syntax; Index; Back cover.
Responsibility: Mark D. Spivey.

Abstract:

Examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack. This book shows how an attack is conceptualized,  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/85589123> # Practical hacking techniques and countermeasures
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
   library:oclcnum "85589123" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/51173076#Place/boca_raton_fl> ; # Boca Raton, FL
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/51173076#CreativeWork/vmware> ; # VMware.
   schema:about <http://experiment.worldcat.org/entity/work/data/51173076#Topic/computers_system_administration_linux_&_unix_administration> ; # COMPUTERS--System Administration--Linux & UNIX Administration
   schema:about <http://experiment.worldcat.org/entity/work/data/51173076#Topic/computers_operating_systems_linux> ; # COMPUTERS--Operating Systems--Linux
   schema:about <http://dewey.info/class/005.432/e22/> ;
   schema:about <http://id.worldcat.org/fast/1167683> ; # Virtual computer systems
   schema:about <http://experiment.worldcat.org/entity/work/data/51173076#Topic/computers_operating_systems_unix> ; # COMPUTERS--Operating Systems--UNIX
   schema:about <http://id.worldcat.org/fast/1046280> ; # Operating systems (Computers)
   schema:about <http://id.worldcat.org/fast/1395413> ; # VMware.
   schema:bookFormat schema:EBook ;
   schema:copyrightYear "2007" ;
   schema:creator <http://viaf.org/viaf/73279017> ; # Mark D. Spivey
   schema:datePublished "2007" ;
   schema:description "Front cover; Preface; Contents; Chapter 1. Preparation; Chapter 2. Banner Identification; Chapter 3. Target Enumeration; Chapter 4. Scanning; Chapter 5. Sniffing Traffic; Chapter 6. Spoofing; Chapter 7. Brute Force; Chapter 8. Vulnerability Scanning; Chapter 9. Wireless; Chapter 10. Redirection; Chapter 11. Denial-of-Service (DoS); Appendix A. References; Appendix B. Tool Syntax; Index; Back cover."@en ;
   schema:description "Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a computer system can be successfully attacked and compromised. This book shows how an attack is conceptualized, formulated and performed. With the VMware® Workstation software package available on the accompanying CD, it uses virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It offers examples of attacks on Windows and Linux. It also covers such topics as footprinting, scanning, sniffing, passwords, and other atta."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/51173076> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/67728222> ;
   schema:name "Practical hacking techniques and countermeasures"@en ;
   schema:productID "85589123" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/85589123#PublicationEvent/boca_raton_fl_auerbach_publications_2007> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/51173076#Agent/auerbach_publications> ; # Auerbach Publications
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=184621> ;
   schema:url <http://www.crcnetbase.com/isbn/9781420013382> ;
   schema:url <http://www.crcnetbase.com/isbn/9780849370571> ;
   schema:workExample <http://worldcat.org/isbn/9781420013382> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/85589123> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/51173076#Agent/auerbach_publications> # Auerbach Publications
    a bgn:Agent ;
   schema:name "Auerbach Publications" ;
    .

<http://experiment.worldcat.org/entity/work/data/51173076#Topic/computers_operating_systems_linux> # COMPUTERS--Operating Systems--Linux
    a schema:Intangible ;
   schema:name "COMPUTERS--Operating Systems--Linux"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/51173076#Topic/computers_operating_systems_unix> # COMPUTERS--Operating Systems--UNIX
    a schema:Intangible ;
   schema:name "COMPUTERS--Operating Systems--UNIX"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/51173076#Topic/computers_system_administration_linux_&_unix_administration> # COMPUTERS--System Administration--Linux & UNIX Administration
    a schema:Intangible ;
   schema:name "COMPUTERS--System Administration--Linux & UNIX Administration"@en ;
    .

<http://id.worldcat.org/fast/1046280> # Operating systems (Computers)
    a schema:Intangible ;
   schema:name "Operating systems (Computers)"@en ;
    .

<http://id.worldcat.org/fast/1167683> # Virtual computer systems
    a schema:Intangible ;
   schema:name "Virtual computer systems"@en ;
    .

<http://id.worldcat.org/fast/1395413> # VMware.
    a schema:CreativeWork ;
   schema:name "VMware." ;
    .

<http://viaf.org/viaf/73279017> # Mark D. Spivey
    a schema:Person ;
   schema:familyName "Spivey" ;
   schema:givenName "Mark D." ;
   schema:name "Mark D. Spivey" ;
    .

<http://worldcat.org/isbn/9781420013382>
    a schema:ProductModel ;
   schema:isbn "1420013386" ;
   schema:isbn "9781420013382" ;
    .

<http://www.worldcat.org/oclc/67728222>
    a schema:CreativeWork ;
   rdfs:label "Practical hacking techniques and countermeasures." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/85589123> ; # Practical hacking techniques and countermeasures
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.