Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Readers are provided with updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also included is a thorough update of federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.... researchers developed a BIOS-level rootkit, called SubVirt, for desktop computers that can survive hard disk replacement and OS reinstallation. ... These tasks can be hugely expensive in both time and money, but at least a method for removing the malware is available. ... The LoJack BIOS agent periodically acalls homea to a central monitoring authority for instructions in case a laptop is reported stolen.
|Title||:||Hands-On Ethical Hacking and Network Defense|
|Author||:||Michael Simpson, Kent Backman, James Corley|
|Publisher||:||Cengage Learning - 2010-03-17|