검색

검색

  • Home
  • 기능목록
  • 검색

상세정보

Hacker techniques, tools, and incident handling [electronic resource] / / Third edition

QR코드
도서 상세정보
자료유형 : eBook
ISBN : 9781284147810 
ISBN : 1284147819 
ISBN :
ISBN :
개인저자 : Oriyano, Sean-Philip.
서명/저자사항 : Hacker techniques, tools, and incident handling  [electronic resource] /:  Sean-Philip Oriyano, Michael G. Solomon. 
판사항 : Third edition. 
발행사항 : Burlington, MA:  Jones & Bartlett Learning,  [2020]. 
형태사항 : 1 online resource (886 p.). 
총서사항 : Information systems security & assurance series 
일반주기 : Controlling Access 
서지주기 : Includes bibliographical references and index. 
내용주기 : Cover; Title Page; Copyright Page; Contents; Preface; Acknowledgments; About the Authors; CHAPTER 1 Hacking: The Next Generation; Profiles and Motives of Different Types of Hackers; Controls; The Hacker Mindset; Motivation; A Look at the History of Computer Hacking; Ethical Hacking and Penetration Testing; The Role of Ethical Hacking; Ethical Hackers and the C-I-A Triad; Common Hacking Methodologies; Performing a Penetration Test; The Role of the Law and Ethical Standards; CHAPTER 2 TCP/IP Review; Exploring the OSI Reference Model; The Role of Protocols; Layer 1: Physical Layer 
내용주기 : Layer 2: Data Link LayerLayer 3: Network Layer; Layer 4: Transport Layer; Layer 5: Session Layer; Layer 6: Presentation Layer; Layer 7: Application Layer; Mapping the OSI Model to Functions and Protocols; TCP/IP: A Layer-by-Layer Review; Physical or Network Access Layer; Network or Internet Layer; Host-to-Host Layer; Application Layer; CHAPTER 3 Cryptographic Concepts; Cryptographic Basics; Authentication; Integrity; Nonrepudiation; Symmetric and Asymmetric Cryptography; Cryptographic History; What Is an Algorithm or Cipher?; Symmetric Encryption; Asymmetric Encryption; Digital Signatures 
내용주기 : Purpose of Public Key InfrastructureThe Role of Certificate Authorities (CAs); PKI Attacks; Hashing; Common Cryptographic Systems; Cryptanalysis; Future Forms of Cryptography; CHAPTER 4 Physical Security; Basic Equipment Controls; Hard Drive and Mobile Device Encryption; Fax Machines and Printers; Voice over IP (VoIP); Physical Area Controls; Fences; Perimeter Intrusion Detection and Assessment System (PIDAS); Gates; Bollards; Facility Controls; Doors, Mantraps, and Turnstiles; Walls, Ceilings, and Floors; Windows; Guards and Dogs; Construction; Personal Safety Controls; Lighting 
내용주기 : Alarms and Intrusion DetectionClosed-Circuit TV (CCTV)/Remote Monitoring; Physical Access Controls; Locks; Lock Picking; Tokens and Biometrics; Avoiding Common Threats to Physical Security; Natural, Human, and Technical Threats; Physical Keystroke Loggers and Sniffers; Wireless Interception and Rogue Access Points; Defense in Depth; CHAPTER 5 Footprinting Tools and Techniques; The Information-Gathering Process; The Information on a Company Website; Discovering Financial Information; Google Hacking; Exploring Domain Information Leakage; Manual Registrar Query; Automatic Registrar Query; Whois 
내용주기 : NslookupInternet Assigned Numbers Authority (IANA); Determining a Network Range; Tracking an Organization's Employees; Exploiting Insecure Applications; Using Social Networks; Using Basic Countermeasures; CHAPTER 6 Port Scanning; Determining the Network Range; Identifying Active Machines; Wardialing; Wardriving and Related Activities; Pinging; Port Scanning; Mapping Open Ports; Nmap; SuperScan; Scanrand; THC-Amap; OS Fingerprinting; Active OS Fingerprinting; Passive OS Fingerprinting; Mapping the Network; Analyzing the Results; CHAPTER 7 Enumeration and Computer System Hacking; Windows Basics 
일반주제명 : Computer security. -- 
일반주제명 : Penetration testing (Computer security) -- 
일반주제명 : Computer networks --  Security measures. -- 
일반주제명 : Hackers. -- 
일반주제명 : COMPUTERS / Internet / Security -- 
일반주제명 : COMPUTERS / Networking / Security -- 
일반주제명 : COMPUTERS / Security / General -- 
개인저자 : Solomon, Michael (Michael G.), 1963-
기타형태 저록 : Print version: Oriyano, Sean-Philip Hacker Techniques, Tools, and Incident Handling. Burlington : Jones & Bartlett Learning, LLC,c2018, 9781284147803
언어 영어
원문
URL :

예약

  1. 1. 예약현황은 홈페이지 로그인 후 예약 페이지에 확인 가능합니다.
  2. 2. 도착 통보된 예약자료 대출을 원하지 않는 경우에는 예약 현황에서 취소할 수 있습니다.
  3. 3. 기타 문의사항은 도서관에 문의 바랍니다.
닫기

무인예약대출

  1. 1. 무인예약대출 현황은 홈페이지 로그인 후 무인예약대출 페이지에 확인 가능합니다.
  2. 2. 무인예약대출자료 대출을 원하지 않는 경우에는 무인예약대출 페이지에서 신청 또는 접수상태인 경우만 취소할 수 있습니다.
  3. 3. 희망대출일은 신청일로부터 최대 1주일 까지 가능합니다.
  4. 4. 희망대출일을 선택하지 않은 경우 대출대기 통보 후 1주일까지 기기에서 대출가능합니다.
  5. 5. 기타 문의사항은 도서관에 문의 바랍니다.
닫기
서평쓰기

서평쓰기

서평쓰기
닫기
태그추가

태그추가

닫기

QR코드

닫기
챗봇
  • 도서관 대화형 검색봇 서비스 앤디입니다.