Conducting Network Penetration and Espionage in A Global Environment

Conducting Network Penetration and Espionage in A Global Environment

eBook - 2014
Rate this:
This book provides detailed guidance on how to perform effective penetration testing of computer networks--using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. Coverage includes: defensive measures/privacy issues; researching a target without directly "touching" that target; gathering more information using a more direct approach; mathematical analysis; target exploitation; and Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. It includes basic and advanced tools and procedures to help identify security vulnerabilities in today's networks; techniques used to bypass anti-virus software and capture keystrokes of remote systems; and utilizing various iPhone apps to perform reconnaissance activities on wireless networks. --
Publisher: Boca Raton, FL : CRC Press, c2014 (Norwood, Mass. : Books24x7.com [generator])
ISBN: 9781482206470
Additional Contributors: Books24x7, Inc

Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age Suitability

Add Age Suitability

There are no age suitabilities for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Subject Headings

  Loading...

Find it at VPL

  Loading...
[]
[]
To Top