Ethical Hacking: Techniques, Tools, and Countermeasures

Regular price €95.99
14780-3
978-1-284-14780-3
978-1-284-24899-9
9781284172607
9781284172614
9781284172638
9781284172652
9781284248999
A01=Michael G. Solomon
A01=Sean-Philip Oriyano
Age Group_Uncategorized
Age Group_Uncategorized
Author_Michael G. Solomon
Author_Sean-Philip Oriyano
automatic-update
Category1=Non-Fiction
Category=UBJ
Category=URH
CompTIA PenTest
computer
computer criminal
COP=United States
cybersecurity
Delivery_Delivery within 10-20 working days
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
hacker
hacker techniques
hacker tools
hacking
hacking countermeasures
identity theft
information technology
ISSA
Language_English
network
networking
networking and security
oriyano
PA=Available
pen testing
penetration testing
Price_€50 to €100
PS=Active
science
security
softlaunch
solomon

Product details

  • ISBN 9781284248999
  • Weight: 737g
  • Publication Date: 12 Dec 2022
  • Publisher: Jones and Bartlett Publishers, Inc
  • Publication City/Country: US
  • Product Form: Paperback
  • Language: English
Delivery/Collection within 10-20 working days

Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock

10-20 Working Days: On Backorder

Will Deliver When Available: On Pre-Order or Reprinting

We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!

Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them.

The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices.

Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series!

Michael G. Solomon, PhD, CISSP, PMP, CISM, CySA , Pentest , is an author, educator, and consultant focusing on privacy, security, blockchain, and identity management. As an IT professional and consultant since 1987, Dr. Solomon has led project teams for many Fortune 500 companies and has authored and contributed to more than 30 books and numerous training courses. Dr. Solomon is a Professor of Computer and Information Sciences at the University of the Cumberlands and holds a Ph.D. in Computer Science and Informatics from Emory University.

Sean-Philip Oriyano has been actively working in the IT field since 1990. Throughout his career, he has held positions such as support specialist to consultants and senior instructor. Currently he is an IT instructor who specializes in infrastructure and security topics for various public and private entities. Sean has instructed for the US Air Force, Navy, and Army at locations both in North America and internationally. Sean is certified as a CISSP, CHFI, CEH, CEI, CNDA, SCNP, SCPI, MCT, MCSE, and MCITP, and he is a member of EC-Council, ISSA, Elearning Guild, and Infragard.