Jump to ratings and reviews
Rate this book

Guide Design and Implement Local and Wide Area Networks

Rate this book
With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. This book describes the tools and penetration testing methodologies used by ethical hackers to better understand how to protect computer networks. A thorough discussion is first established outlining what and who an ethical hacker is, and how important they are in protecting corporate and government data from cyber attacks. This title provides a structured knowledge base for preparing security professionals to understand how to protect a network using some of the skills and tools of a penetration or ethical hacker.

250 pages, Paperback

First published March 15, 1999

1 person is currently reading
3 people want to read

About the author

Michael J. Palmer

36 books5 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
2 (50%)
4 stars
1 (25%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
1 (25%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.