
Hacking Exposed 7: Network Security Secrets and Solutions 0783324855487
US $15.00US $15.00
Sep 23, 22:09Sep 23, 22:09
Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Hacking Exposed 7: Network Security Secrets and Solutions 0783324855487
US $15.00
ApproximatelyS$ 19.35
Condition:
“Used - Like New”
Like New
A book in excellent condition. Cover is shiny and undamaged, and the dust jacket is included for hard covers. No missing or damaged pages, no creases or tears, and no underlining/highlighting of text or writing in the margins. May be very minimal identifying marks on the inside cover. Very minimal wear and tear.
Last one1 sold
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
US $3.99 (approx S$ 5.15) USPS Media MailTM.
Located in: Medford, New York, United States
Delivery:
Estimated between Sat, 4 Oct and Sat, 11 Oct to 94104
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:388103689187
Item specifics
- Condition
- Like New
- Seller Notes
- “Used - Like New”
- Book Title
- Hacking Exposed 7: Network Security Secrets and Solutions
- ISBN
- 9780071780285
About this product
Product Identifiers
Publisher
Mcgraw-Hill Education
ISBN-10
0071780289
ISBN-13
9780071780285
eBay Product ID (ePID)
112775853
Product Key Features
Number of Pages
768 Pages
Publication Name
Hacking Exposed 7 : Network Security Secrets and Solutions
Language
English
Subject
Networking / General, Security / General, Security / Networking
Publication Year
2012
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1.5 in
Item Weight
45.9 Oz
Item Length
9.1 in
Item Width
7.4 in
Additional Product Features
Edition Number
7
Intended Audience
Trade
LCCN
2012-028820
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
1: Footprinting 2: Scanning 3: Enumeration 4. Hacking Windows 5. Hacking UNIX 6: Remote Connectivity and VoIP Hacking 7. Network Devices (Expanded) 8: Wireless Devices (Expanded) 9: Embedded Systems (NEW) 10: Web Hacking 11. Countermeasures Map (NEW) Appendix A: Ports Appendix B: Top 14 Security Vulnerabilities Appendix C: Denial of Service (DoS) Attacks
Synopsis
This fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new "5 Deployments" approach, Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries." --Shawn Henry, former Executive Assistant Director, FBI Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive "countermeasures cookbook." Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself
LC Classification Number
TK5105.59
Item description from the seller
Seller feedback (19,236)
This item (1)
All items (19,236)
- 6***6 (71)- Feedback left by buyer.Past monthVerified purchaseQuick to ship. Packed well with item arriving just as described. Delivered faster than expected & just in time to be gifted for a birthday party. Great! Thank you much!
- Automatyczna opinia eBay- Feedback left by buyer.Past monthZamówienie zostało zrealizowane – ze śledzeniem i na czas
- e***l (207)- Feedback left by buyer.Past monthVerified purchaseThis book was in great shape as promised in the listing.
- Automatyczna opinia eBay- Feedback left by buyer.Past monthZamówienie zostało zrealizowane – ze śledzeniem i na czas