| HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted anti-hacking methods, bulletproof best practices, and code level techniques. Use the unique Reference Center in the middle of the book to access key information, including default passwords, common port numbers, system commands, reference links, the top security assessment and hacker tools, and more.
- Use information security and risk assessment principles
- Guard against common network threats and vulnerabilities
- Understand hacker tactics and methods seen on the Internet and intranet
- Protect common hacker and criminal targets
- Conduct best practice security checks and hardening steps for your systems
- Implement wireless security, Web application security, incident response, and more
- Reference operating system and security specific commands
- Access and utilize the best security and hacker tools in use today
- Focus on the techniques, results, and remediation for a wide range of exploits
- Protect networks, software code, e-commerce, and more
|
|