Picture 1 of 18



















Gallery
Picture 1 of 18


















Have one to sell?
Hacker Techniques & Incident Handling | ISSA CyberSec & Pentesting 3rd Ed PB VG
US $19.99
ApproximatelyRM 84.50
Condition:
“Light handling wear at most. Clean. No markings. No bends, tears and no missing pages. Solid spine. ”... Read moreabout condition
Very Good
A book that has been read but is in excellent condition. No obvious damage to the cover, with the dust jacket included for hard covers. No missing or damaged pages, no creases or tears, and no underlining/highlighting of text or writing in the margins. May be very minimal identifying marks on the inside cover. Very minimal wear and tear.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free USPS Media MailTM.
Located in: Warrenton, Oregon, United States
Delivery:
Estimated between Sat, 23 Aug and Tue, 26 Aug
Returns:
60 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:306283044321
Item specifics
- Condition
- Very Good
- Seller Notes
- Keywords
- Cybersecurity, Information Security, IT Security, Paperback, PB
- Book Title
- Hacker Techniques, Tools, and Incident Handling
- Educational Level
- Adult & Further Education
- Personalized
- No
- Keywords 4
- Oriyano, Solomon, Textbook, Network Security, Vulnerability
- Level
- Intermediate, Advanced
- Keywords 3
- Ethical Hacking, Security Tools, ISSA Series, Jones & Bartlett
- Keywords 2
- Incident Response, Penetration Testing, Pen Testing, Used, VG
- Country/Region of Manufacture
- United States
- ISBN
- 9781284147803
About this product
Product Identifiers
Publisher
Jones & Bartlett Learning, LLC
ISBN-10
1284147800
ISBN-13
9781284147803
eBay Product ID (ePID)
243164017
Product Key Features
Number of Pages
408 Pages
Publication Name
Hacker Techniques, Tools, and Incident Handling
Language
English
Subject
Security / General, Security / Networking
Publication Year
2018
Features
Revised
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
0.6 in
Item Weight
22 Oz
Item Length
9.8 in
Item Width
5.9 in
Additional Product Features
Edition Number
3
LCCN
2018-023782
Dewey Edition
23
Dewey Decimal
005.8
Edition Description
Revised edition
Table Of Content
PartOne Hacker Techniques and Tools ChapterOne Hacking: The Next Generation ChapterTwo TCP/IP Review ChapterThree Cryptographic Concepts ChapterFour Physical Security PartTwo A Technical and Social Overview of Hacking ChapterFive Footprinting Tools and Techniques ChapterSix Port Scanning ChapterSeven Enumeration and Computer System Hacking ChapterEight Wireless Vulnerabilities ChapterNine Web and Database Attacks ChapterTen Malware ChapterEleven Sniffers, Session Hijacking, and Denial of Service Attacks ChapterTwelve Linux and Penetration Testing ChapterThirteen Social Engineering PartThree Incident Response and Defensive Technologies ChapterFourteen Incident Response ChapterFifteen Defensive Technologies
Synopsis
Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them. -Includes the latest content and tactics related to hacking and pen testing basics -Provides a foundation for pen testers to learn solid techniques -Discusses hacking from both perspectives- the hacker and the defender -Coverage of the Internet of Things and how it has expanded attack surfaces -Aligned to current industry best practices -Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios, Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them.- Includes the latest content and tactics related to hacking and pen testing basics- Provides a foundation for pen testers to learn solid techniques- Discusses hacking from both perspectives- the hacker and the defender- Coverage of the Internet of Things and how it has expanded attack surfaces- Aligned to current industry best practices- Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios
LC Classification Number
TK5105.59.O786 2020
Item description from the seller
Seller feedback (640)
- i***t (939)- Feedback left by buyer.Past monthVerified purchaseBeyond impressed. The book is still sealed and brand new. This seller is a great asset to eBay. Would definitely recommend.
- e***e (2546)- Feedback left by buyer.Past monthVerified purchase:)
- l***1 (44)- Feedback left by buyer.Past monthVerified purchaseNew condition. Shipped quickly at good price. I’m delighted.
More to explore :
- Nonfiction Books Fiction & Management Techniques,
- Photography Techniques Hardcover Nonfiction Books,
- Management Techniques Hardcover Nonfiction Books,
- Nonfiction Books Fiction & Photography Techniques,
- Nonfiction Books in English Fiction & Management Techniques,
- Photography Techniques Hardcover Nonfiction Books Illustrated,
- Art & Culture Nonfiction Books Fiction & Photography Techniques,
- Fiction Books & David Eddings Fiction,
- Art & Culture Nonfiction Fiction Books & Photography Techniques 1900-1949 Publication Year,
- David Eddings Fantasy Fiction Fiction & Books