Ethical hacking and countermeasures : secure network operating systems and infrastructures.
Material type:
- 9781305883468
- QA 76.9 .E84 2017

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Graduate Studies General Circulation | Gen. Ed. - CCIT | GC QA 76.9 .E84 2017 (Browse shelf(Opens below)) | c.1 | Available | NULIB000013117 |
Includes index.
Chapter 1. Hacking wireless networks -- Chapter 2. Physical security -- Chapter 3. Evading IDs, firewalls and detecting honeypots -- Chapter 4. Hacking routers and cable modems -- Chapter 5. Linux hacking -- Chapter 6. Mac OS X hacking -- Chapter 7. Hacking mobile phones, PDAs and handheld devices -- Chapter 8. Hacking portable devices -- Chapter 9. Cryptography
Hacking and electronic crimes sophistication is consistently growing at an exponential rate. Recent reports hace indicated that cybercrime already surpasses the illegal drug trade!
There are no comments on this title.