|Listed in category:
Have one to sell?

Hacker Techniques & Incident Handling | ISSA CyberSec & Pentesting 3rd Ed PB VG

US $19.99
ApproximatelyRM 84.50
Condition:
Very Good
Light handling wear at most. Clean. No markings. No bends, tears and no missing pages. Solid spine. ... Read moreabout condition
Hurry before it's gone. 1 person is watching this item.
Breathe easy. Returns accepted.
Shipping:
Free USPS Media MailTM.
Located in: Warrenton, Oregon, United States
Delivery:
Estimated between Sat, 23 Aug and Tue, 26 Aug
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
60 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:306283044321
Last updated on Jul 04, 2025 17:01:54 MYTView all revisionsView all revisions

Item specifics

Condition
Very Good
A book that has been read but is in excellent condition. No obvious damage to the cover, with the dust jacket included for hard covers. No missing or damaged pages, no creases or tears, and no underlining/highlighting of text or writing in the margins. May be very minimal identifying marks on the inside cover. Very minimal wear and tear. See all condition definitionsopens in a new window or tab
Seller Notes
“Light handling wear at most. Clean. No markings. No bends, tears and no missing pages. Solid ...
Keywords
Cybersecurity, Information Security, IT Security, Paperback, PB
Book Title
Hacker Techniques, Tools, and Incident Handling
Educational Level
Adult & Further Education
Personalized
No
Keywords 4
Oriyano, Solomon, Textbook, Network Security, Vulnerability
Level
Intermediate, Advanced
Keywords 3
Ethical Hacking, Security Tools, ISSA Series, Jones & Bartlett
Keywords 2
Incident Response, Penetration Testing, Pen Testing, Used, VG
Country/Region of Manufacture
United States
ISBN
9781284147803

About this product

Product Identifiers

Publisher
Jones & Bartlett Learning, LLC
ISBN-10
1284147800
ISBN-13
9781284147803
eBay Product ID (ePID)
243164017

Product Key Features

Number of Pages
408 Pages
Publication Name
Hacker Techniques, Tools, and Incident Handling
Language
English
Subject
Security / General, Security / Networking
Publication Year
2018
Features
Revised
Type
Textbook
Author
Sean-Philip Oriyano
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Height
0.6 in
Item Weight
22 Oz
Item Length
9.8 in
Item Width
5.9 in

Additional Product Features

Edition Number
3
LCCN
2018-023782
Dewey Edition
23
Dewey Decimal
005.8
Edition Description
Revised edition
Table Of Content
PartOne Hacker Techniques and Tools ChapterOne Hacking: The Next Generation ChapterTwo TCP/IP Review ChapterThree Cryptographic Concepts ChapterFour Physical Security PartTwo A Technical and Social Overview of Hacking ChapterFive Footprinting Tools and Techniques ChapterSix Port Scanning ChapterSeven Enumeration and Computer System Hacking ChapterEight Wireless Vulnerabilities ChapterNine Web and Database Attacks ChapterTen Malware ChapterEleven Sniffers, Session Hijacking, and Denial of Service Attacks ChapterTwelve Linux and Penetration Testing ChapterThirteen Social Engineering PartThree Incident Response and Defensive Technologies ChapterFourteen Incident Response ChapterFifteen Defensive Technologies
Synopsis
Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them. -Includes the latest content and tactics related to hacking and pen testing basics -Provides a foundation for pen testers to learn solid techniques -Discusses hacking from both perspectives- the hacker and the defender -Coverage of the Internet of Things and how it has expanded attack surfaces -Aligned to current industry best practices -Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios, Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them.- Includes the latest content and tactics related to hacking and pen testing basics- Provides a foundation for pen testers to learn solid techniques- Discusses hacking from both perspectives- the hacker and the defender- Coverage of the Internet of Things and how it has expanded attack surfaces- Aligned to current industry best practices- Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios
LC Classification Number
TK5105.59.O786 2020

Item description from the seller

About this seller

Northwest Coast Discoveries

100% positive feedback2.1K items sold

Joined May 2002
Small family business located on the Northwest Oregon coast by Astoria . We sell a bit of everything....

Detailed Seller Ratings

Average for the last 12 months
Accurate description
5.0
Reasonable shipping cost
4.9
Shipping speed
5.0
Communication
5.0

Seller feedback (640)

All ratings
Positive
Neutral
Negative