Conducting Network Penetration and Espionage in a Global Environment | Agenda Bookshop Skip to content
Online orders placed from 19/12 onward will not arrive in time for Christmas.
Online orders placed from 19/12 onward will not arrive in time for Christmas.
A01=Bruce Middleton
Age Group_Uncategorized
Age Group_Uncategorized
Author_Bruce Middleton
automatic-update
Category1=Non-Fiction
Category=GTJ
Category=JKVF1
Category=UR
COP=United Kingdom
Delivery_Pre-order
Language_English
PA=Temporarily unavailable
Price_€50 to €100
PS=Active
softlaunch

Conducting Network Penetration and Espionage in a Global Environment

English

By (author): Bruce Middleton

When its all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksusing free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.

The book taps into Bruce Middletons decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack.

Next, the book explains how to research a target without directly touching that target. Once youve learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks.

Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in todays networks.

After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

See more
Current price €61.19
Original price €67.99
Save 10%
A01=Bruce MiddletonAge Group_UncategorizedAuthor_Bruce Middletonautomatic-updateCategory1=Non-FictionCategory=GTJCategory=JKVF1Category=URCOP=United KingdomDelivery_Pre-orderLanguage_EnglishPA=Temporarily unavailablePrice_€50 to €100PS=Activesoftlaunch

Will deliver when available.

Product Details
  • Weight: 1110g
  • Dimensions: 156 x 234mm
  • Publication Date: 18 Sep 2018
  • Publisher: Taylor & Francis Ltd
  • Publication City/Country: United Kingdom
  • Language: English
  • ISBN13: 9781138374911

About Bruce Middleton

Bruce Middleton is a graduate of the University of Houston and has been involved with the security of electronic communications systems since 1972 when he enlisted in the military (U.S. Army Security Agency) during the Vietnam conflict and worked overseas in the field for NSA. Since that time he has worked with various government military and commercial entities such as NASA (Space Station Freedom communications systems design team) CIA NAVSEA and Boeing (ground station-to-aircraft communications systems). Mr. Middleton has been the keynote speaker at select national and international industry events and a trusted advisor in both the government and commercial sectors. He has written multiple books e-books and magazine articles in the fields of communications security cybercrime and computer network penetration.

Customer Reviews

Be the first to write a review
0%
(0)
0%
(0)
0%
(0)
0%
(0)
0%
(0)
We use cookies to ensure that we give you the best experience on our website. If you continue we'll assume that you are understand this. Learn more
Accept