did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

Hands-On Ethical Hacking and Network Defense

9781133935612

Hands-On Ethical Hacking and Network Defense

  • ISBN 13:

    9781133935612

  • ISBN 10:

    1133935613

  • Edition: 1st
  • Format: Paperback
  • Copyright: 04/17/2012
  • Publisher: Cengage Learning PTR

List Price $39.33 Save

Rent $28.03
TERM PRICE DUE
Added Benefits of Renting

Free Shipping Both Ways Free Shipping Both Ways
Highlight/Take Notes Like You Own It Highlight/Take Notes Like You Own It
Purchase/Extend Before Due Date Purchase/Extend Before Due Date

List Price $39.33 Save $0.40

New $38.93

Usually Ships in 24-48 Hours

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

Learn the art of ethical hacking and security testing with HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE. Covering the tools and techniques ethical hackers and security testers use to assess and protect computer networks, this book will help you develop the critical thinking skills and creativity essential to becoming a knowledgeable, efficient computer security professional. It provides practical knowledge in computer programming, documentation of security tests, and ethical and legal ramifications. It also covers the basics of programming with C, HTML and Perl as they relate to network and computer security--and Web applications, wireless networks, and TCP/IP as well. With the continued rise in credit card and identification theft as well as cyber terrorism and corporate espionage, trained network security professionals are more important than ever. Let the step-by-step approach of HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE teach you the techniques and methodologies of security testing.

Author Biography

Read more