Part I Casing the Establishment
1 Footprinting
2 Scanning
3 Enumeration
Part II Endpoint and Server Hacking
4 Hacking Windows
5 Hacking UNIX
6 Cybercrime and Advanced Persistent Threats
Part III Infrastructure Hacking
7 Remote Connectivity and VoIP Hacking
8 Wireless Hacking
9 Hacking Hardware
Part IV Application and Data Hacking
10 Web and Database Hacking
11 Mobile Hacking
12 Countermeasures Cookbook
Part V Appendixes
A Ports
B Top 10 Security Vulnerabilities
C Denial of Service (DoS) and Distributed Denial
of Service (DDoS) Attacks
Index
12. Hacking Exposed 7
Author:
Myanmar Ebook Store
Genre:
»
Hacking
Rating
Posted by Myanmar Ebook Store
Posted on
