Artboard 33 Artboard 16 Artboard 18 Artboard 15 Artboard 21 Artboard 1 Artboard 2 Artboard 5 Artboard 45 Artboard 45 Artboard 22 Artboard 9 Artboard 23 Artboard 17? Artboard 28 Artboard 43 Artboard 49 Artboard 47 Artboard 38 Artboard 32 Artboard 8 Artboard 22 Artboard 5 Artboard 25 Artboard 1 Artboard 42 Artboard 11 Artboard 41 Artboard 13 Artboard 23 Artboard 10 Artboard 4 Artboard 9 Artboard 20 Artboard 6 Artboard 11 Artboard 7 Artboard 3 Artboard 3 Artboard 12 Artboard 25 Artboard 34 Artboard 39 Artboard 24 Artboard 13 Artboard 19 Artboard 7 Artboard 24 Artboard 31 Artboard 4 Artboard 14 Artboard 27 Artboard 30 Artboard 36 Artboard 44 Artboard 12 Artboard 17 Artboard 17 Artboard 6 Artboard 27 Artboard 19 Artboard 30 Artboard 29 Artboard 29 Artboard 26 Artboard 18 Artboard 2 Artboard 20 Artboard 35 Artboard 15 Artboard 14 Artboard 48 Artboard 50 Artboard 26 Artboard 16 Artboard 40 Artboard 21 Artboard 29 Artboard 10 Artboard 37 Artboard 3 Artboard 3 Artboard 46 Artboard 8

Network Attacks And Exploitation - A Framework (Cód: 9238986)

Monte,Matt; Monte,Matthew

John Wiley & Sons

Ooops! Este produto não está mais a venda.
Mas não se preocupe, temos uma versão atualizada para você.

Ooopss! Este produto está fora de linha, mas temos outras opções para você.
Veja nossas sugestões abaixo!

R$ 251,80 em até 8x de R$ 31,48 sem juros
Cartão Saraiva R$ 239,21 (-5%) em até 1x no cartão ou em até 12x de R$ 20,98 sem juros

Crédito:
Boleto:
Cartão Saraiva:

Total: R$0,00

Em até 8x sem juros de R$ 0,00


Network Attacks And Exploitation - A Framework

R$251,80

Quer comprar em uma loja física? Veja a disponibilidade deste produto

Entregas internacionais: Consulte prazos e valores de entrega para regiões fora do Brasil na página do Carrinho.

ou receba na loja com frete grátis

X
Formas de envio Custo Entrega estimada

* Válido para compras efetuadas em dias úteis até às 15:00, horário de Brasília, com cartão de crédito e aprovadas na primeira tentativa.

X Consulte as lojas participantes

Saraiva MegaStore Shopping Eldorado Av. Rebouças, 3970 - 1º piso - Pinheiros CEP: 05402-600 - São Paulo - SP

Descrição

Incorporate offense and defense for a more effective network security strategy 'Network Attacks and Exploitation' provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. Assaults and manipulation of computer networks are rampant around the world. One of the biggest challenges is fitting the ever-increasing amount of information into a whole plan or framework to develop the right strategies to thwart these attacks. This book clears the confusion by outlining the approaches that work, the tools that work, and resources needed to apply them. Understand the fundamental concepts of computer network exploitation Learn the nature and tools of systematic attacks Examine offensive strategy and how attackers will seek to maintain their advantage Understand defensive strategy, and how current approaches fail to change the strategic balance Governments, criminals, companies, and individuals are all operating in a world without boundaries, where the laws, customs, and norms previously established over centuries are only beginning to take shape. Meanwhile computer espionage continues to grow in both frequency and impact. This book will help you mount a robust offense or a strategically sound defense against attacks and exploitation. For a clear roadmap to better network security, 'Network Attacks and Exploitation' is your complete and practical guide. Enhance network security with both offensive and defensive strategies It's not enough just to defend your network against attack. For truly effective security, you need both defensive and offensive strategies in a unified framework. This book provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide takes you beyond the individual technologies to help you develop durable, far-reaching solutions. More than introducing tools and how to use them, it provides an essential understanding of the inherent properties of computer operations and the principles of network attack and exploitation. Supported by real-world examples, this book outlines the approaches that work, the tools that work, and the resources needed to apply them. You will: Understand the fundamental concepts of computer exploitation Learn the nature of systematic attacks and the tools that are used Examine offensive strategies and how hackers will attempt to maintain their advantage Gain a better understanding of defensive strategy See how current approaches fail to change the strategic balance Be able to mount a robust offense or a strategically sound defense against attacks and exploitation Where network security is concerned, we operate in a world where laws and customs are still evolving. In this book, you will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information.

Características

Produto sob encomenda Sim
Marca John Wiley & Sons
Cód. Barras 9781118987124
Altura 23.37 cm
I.S.B.N. 9781118987124
Profundidade 1.02 cm
Referência 032120300
Acabamento Brochura
Ano da edição 2015
Idioma Inglês
Número de Páginas 216
Peso 0.36 Kg
Largura 18.80 cm
AutorMonte,Matt; Monte,Matthew