Jump to ratings and reviews
Rate this book

Hands-On Ethical Hacking and Network Defense

Rate this book
Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Readers are provided with updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also included is a thorough update of federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker.Important Media content referenced within the product description or the product text may not be available in the ebook version.

480 pages, Kindle Edition

First published October 19, 2005

17 people are currently reading
103 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
16 (23%)
4 stars
19 (28%)
3 stars
25 (37%)
2 stars
4 (5%)
1 star
3 (4%)
Displaying 1 - 3 of 3 reviews
Profile Image for Shanni.
159 reviews
December 8, 2019
Given the content of the text, I would expect this to be an introductory book, not a "hands-on" guide. Over half of the so-called hands-on activities are simply reading and summarizing articles. There are better free resources online than this book that costs nearly $100.
Profile Image for Josh.
30 reviews4 followers
March 30, 2008
Out of date and pretty much useless. You would learn more network security by studying network protocols and generic 'best practices'. The only redeeming fact about the book is that it mentions, albeit briefly, how to port scan and enumerate hosts.
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.