Jump to ratings and reviews
Rate this book

Hands-On Ethical Hacking and Network Defense, 3rd Edition, Book Only

Rate this book
Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This timely text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today’s cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking.Important Media content referenced within the product description or the product text may not be available in the ebook version.

512 pages, Kindle Edition

First published October 19, 2005

17 people are currently reading
103 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
16 (23%)
4 stars
19 (28%)
3 stars
25 (37%)
2 stars
4 (5%)
1 star
3 (4%)
Displaying 1 - 3 of 3 reviews
Profile Image for Shanni.
159 reviews
December 8, 2019
Given the content of the text, I would expect this to be an introductory book, not a "hands-on" guide. Over half of the so-called hands-on activities are simply reading and summarizing articles. There are better free resources online than this book that costs nearly $100.
Profile Image for Josh.
30 reviews4 followers
March 30, 2008
Out of date and pretty much useless. You would learn more network security by studying network protocols and generic 'best practices'. The only redeeming fact about the book is that it mentions, albeit briefly, how to port scan and enumerate hosts.
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.