12. Hacking Exposed 7

    Author: Myanmar Ebook Store Genre: »
    Rating

    Part I Casing the Establishment
    1 Footprinting
    2 Scanning
    3 Enumeration

    Part II Endpoint and Server Hacking
    4 Hacking Windows
    5 Hacking UNIX
    6 Cybercrime and Advanced Persistent Threats

    Part III Infrastructure Hacking
    7 Remote Connectivity and VoIP Hacking
    8 Wireless Hacking
    9 Hacking Hardware

    Part IV Application and Data Hacking
    10 Web and Database Hacking
    11 Mobile Hacking
    12 Countermeasures Cookbook

    Part V Appendixes
    A Ports
    B Top 10 Security Vulnerabilities
    C Denial of Service (DoS) and Distributed Denial
    of Service (DDoS) Attacks

    Index

    Leave a Reply

    Blogger templates

    Blogger news

    Blogroll