Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. Spotlighting the latest threats and vulnerabilities, this cutting-edge text is packed with real-world examples that showcase todayas most important and relevant security topics. It addresses how and why people attack computers and networks--equipping readers with the knowledge and techniques to successfully combat hackers. This edition also includes new emphasis on ethics and legal issues. The world of information security is changing every day - readers are provided with a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this comprehensive resource teaches the skills needed to go from hoping a system is secure to knowing that it is. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.It is often part of the operating system of a server that per- forms file storage, WWW services, or mail services; and it does not require separate hardware to function. A proxy server is also simple to use and is often included in router and firewallanbsp;...
Title | : | Computer Security and Penetration Testing |
Author | : | Alfred Basta, Nadine Basta, Mary Brown, PhD, CISSP, CISA |
Publisher | : | Cengage Learning - 2013-08-08 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: