000 01273nam a2200229Ia 4500
003 NULRC
005 20250520102804.0
008 250520s9999 xx 000 0 und d
020 _a9781305883468
040 _cNULRC
050 _aQA 76.9 .E84 2017
245 0 _aEthical hacking and countermeasures :
_bsecure network operating systems and infrastructures.
250 _aSecond Edition
260 _aBoston, Massachusetts :
_bCengage Learning Asia Pte Ltd,
_cc2017
300 _axviii, 300 pages :
_billustrations ;
_c23 cm
365 _bUSD59.53
504 _aIncludes index.
505 _aChapter 1. Hacking wireless networks -- Chapter 2. Physical security -- Chapter 3. Evading IDs, firewalls and detecting honeypots -- Chapter 4. Hacking routers and cable modems -- Chapter 5. Linux hacking -- Chapter 6. Mac OS X hacking -- Chapter 7. Hacking mobile phones, PDAs and handheld devices -- Chapter 8. Hacking portable devices -- Chapter 9. Cryptography
520 _aHacking and electronic crimes sophistication is consistently growing at an exponential rate. Recent reports hace indicated that cybercrime already surpasses the illegal drug trade!
650 _aINTERNATIONAL COUNCIL OF E-COMMERCE CONSULTANTS -- EXAMINATION -- STUDY GUIDES
942 _2lcc
_cBK
999 _c15358
_d15358