Join Books.org — it's free

Book cover of Network Security: A Hacker's Perspective
Terrorism - General & Miscellaneous, Computer Crime, Computer Security

Network Security: A Hacker's Perspective

by
Write a review

Overview

Learn how to protect your network system from a hacker's perspective. Virtually every organization is reliant on their computer system and when hackers infiltrate, productivity often halts completely. "Network Security: A Hacker's Perspective" provides comprehensive analysis of the most dangerous network-related security threats, vulnerabilities, and loopholes. Using a hands-on approach and numerous real-life case studies, the book identifies the tools, techniques, and methods used by criminals to break into networks for espionage and malicious purposes. Written for anyone with some networking experience, the book covers security issues related to most major platforms including Windows, Unix, and Novell, and features graphics, appendices, tips, and tricks to make new concepts easy to understand. A companion web site will contain source code, network security discussion, tutorials, and more.

Synopsis

Network Security: A Hacker s Perspective will help you step into the minds of computer criminals so you can predict their moves and stop them before they can strike. You ll become a real hacker profiler as you find out the ways in which these attackers can infiltrate your system, including stealing your identity by obtaining your IP address; gathering information through port scanning, fingerprinting, and sniffing; and attacking password files. Whether you are a network administrator or recreational user of the Internet, you will learn the right countermeasures to protect sensitive information and ensure that neither you nor your company ever become a defenseless target.

Learn how to counteract some of the most common hacker attacks:
  • Obtaining IP addresses through messaging software and email headers
  • Breaking through firewalls
  • Scanning TCP and UDP ports
  • Detecting a remote OS with ICMP messages
  • Performing Trojan attacks

Companion web site with downloadable source code.

About the Author, Ankit Fadia

Ankit Fadia is an independent computer security consultant based in Silicon Valley. He has authored several internationally best-selling books on numerous topics related to computer security, and he is a widely recognized computer security guru and cyberterrorism expert. Fadia provides customized cybersecurity training and consulting solutions to major clients all across North America, Asia, Australia, and the Middle East. He is also regularly invited by BBC Radio World News to share the latest updates on virus outbreaks, loopholes, and cybercrime trends. Recently, Fadia started his own computer security consulting and mobile phone solutions company based in Malaysia, with operations all across the Asian Pacific region.

Reviews

Log in to write a review.

There are no reviews yet.

Book Details

Published
Publisher
Cengage Learning
Pages
500
Format
Paperback
ISBN
9781598631630