• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • Practical Hacking Techniques and Countermeasures

    Practical Hacking Techniques and Countermeasures by Spivey, Mark D.;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 97.99
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        49 592 Ft (47 231 Ft + 5% VAT)
      • Discount 20% (cc. 9 918 Ft off)
      • Discounted price 39 674 Ft (37 785 Ft + 5% VAT)

    49 592 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Short description:

    This insider?s guide examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack. It shows how an attack is conceptualized, formulated, and performed. With the VMware? Workstation software package available on the downloadable resources, it uses virtua

    More

    Long description:

    Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws.

    Written in a lab manual style, the book begins with the installation of the VMware? Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks.

    Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures

    By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

    More

    Table of Contents:

    Preparation. Social Engineering. Footprinting. Scanning. Sniffing. Spoofing. Passwords. Exploit and Attacks. Wireless, Trojans, MTM, Hiding Data. Port Redirection. Denial of Service.

    More