Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them. This textbook is accompanied by a comprehensive supplements package, including all of the following: Instructor Resource Guide organized by learning objectives, with lesson plans, test questions, and Powerpoint presentation slides; lab simulations and lab manuals (labs available at additional cost), and online courseware compatible with your LMS.... was placed into a computer using Microsoft Windows, the software would install on the system and prevent copying of music. ... A rootkit can provide a way to hide spyware such as a keylogger so it is undetectable even to those looking for it.
|Title||:||Hacker Techniques, Tools, and Incident Handling|
|Author||:||Sean-Philip Oriyano, Michael Gregg|
|Publisher||:||Jones & Bartlett Publishers - 2010-08-01|