
Hacking Exposed 7: Network Security Secrets and Solutions 0783324855487
US $15.00US $15.00
Tue, 23 Sep, 15:09Tue, 23 Sep, 15:09
Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Hacking Exposed 7: Network Security Secrets and Solutions 0783324855487
US $15.00
ApproximatelyEUR 12.79
Condition:
“Used - Like New”
Like New
A book that has been read, but looks new. The book cover has no visible wear, and the dust jacket (if applicable) is included for hard covers. No missing or damaged pages, no creases or tears, no underlining or highlighting of text, and no writing in the margins. May have no identifying marks on the inside cover. No wear and tear. See the seller’s listing for full details and description of any imperfections.
Last one1 sold
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
US $3.99 (approx EUR 3.40) USPS Media MailTM.
Located in: Medford, New York, United States
Delivery:
Estimated between Sat, 4 Oct and Sat, 11 Oct
Returns:
30 days return. Buyer pays for return postage. If you use an eBay delivery label, it will be deducted from your refund amount.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:388103689187
Item specifics
- Condition
- Like New
- Seller notes
- “Used - Like New”
- Book Title
- Hacking Exposed 7: Network Security Secrets and Solutions
- ISBN
- 9780071780285
About this product
Product Identifiers
Publisher
Mcgraw-Hill Education
ISBN-10
0071780289
ISBN-13
9780071780285
eBay Product ID (ePID)
112775853
Product Key Features
Number of Pages
768 Pages
Publication Name
Hacking Exposed 7 : Network Security Secrets and Solutions
Language
English
Subject
Networking / General, Security / General, Security / Networking
Publication Year
2012
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1.5 in
Item Weight
45.9 Oz
Item Length
9.1 in
Item Width
7.4 in
Additional Product Features
Edition Number
7
Intended Audience
Trade
LCCN
2012-028820
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
1: Footprinting 2: Scanning 3: Enumeration 4. Hacking Windows 5. Hacking UNIX 6: Remote Connectivity and VoIP Hacking 7. Network Devices (Expanded) 8: Wireless Devices (Expanded) 9: Embedded Systems (NEW) 10: Web Hacking 11. Countermeasures Map (NEW) Appendix A: Ports Appendix B: Top 14 Security Vulnerabilities Appendix C: Denial of Service (DoS) Attacks
Synopsis
This fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new "5 Deployments" approach, Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries." --Shawn Henry, former Executive Assistant Director, FBI Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive "countermeasures cookbook." Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself
LC Classification Number
TK5105.59
Item description from the seller
Seller business information
About this seller
Sensational Buys
99.8% positive Feedback•61K items sold
Registered as a business seller
Seller Feedback (19,235)
This item (1)
All items (19,235)
- 6***6 (71)- Feedback left by buyer.Past monthVerified purchaseQuick to ship. Packed well with item arriving just as described. Delivered faster than expected & just in time to be gifted for a birthday party. Great! Thank you much!
- e***l (207)- Feedback left by buyer.Past monthVerified purchaseThis book was in great shape as promised in the listing.
- eBay automated feedback- Feedback left by buyer.Past monthOrder completed successfully—tracked and on time
- eBay automated feedback- Feedback left by buyer.Past monthOrder completed successfully—tracked and on time
More to explore:
- Non-Fiction Fiction Books & Security,
- Non-Fiction Security Hardcover Books,
- Non-Fiction Paperback Fiction & Security Books,
- Networks Adult Learning & University Books,
- Law Non-Fiction Fiction Books & Security,
- Non-Fiction Computer Security Fiction & Non-Fiction Books,
- Non-Fiction McGraw-Hill Security Fiction & Books,
- Non-Fiction Network Fiction & Non-Fiction Books,
- Non-Fiction Networking Fiction & Non-Fiction Books,
- Non-Fiction Security Fiction Books & 1950-1999 Publication Year