Computer security and penetration testing

Saved in:
Bibliographic Details
Main Author: Basta, Alfred
Other Authors: Halton, Wolf
Format: Book
Language:English
Published: Boston Thomson c2008
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Ethics of hacking and cracking
  • Reconnaissance
  • Scanning tools
  • Sniffers
  • TCP/IP vulnerabilities
  • Encryption and password cracking
  • Spoofing
  • Session hijacking
  • Hacking network devices
  • Trojan horses
  • Denial-of-service attacks
  • Buffer overflows
  • Programming exploits
  • Mail vulnerabilities
  • Web application vulnerabilities
  • Windows vulnerabilities
  • Linux vulnerabilities
  • Incident handling