Shipping Through the Holidays β˜€οΈπŸ“¦

New Year, New You Sale β˜€οΈ- Up to 20% off 500+ books!

Network Attacks and Exploitation

A Framework
4.08 goodreads logo

Ratings/reviews counts are updated frequently.

Check link for latest rating.
( 48 ratings, 2 reviews)
Book Hero Magic crafted this summary to help describe this book. While it's new and still learning, it may not be perfect - your feedback is welcome! Summary
In Network Attacks and Exploitation by Matthew Monte, readers are guided through the complex landscape of cyber-attacks and the strategies used to protect networks. The book equips readers with an understanding of how exploits are carried out and how to defend against them, offering insights into both the technical and strategic aspects of cybersecurity.
Read More
Format: Paperback / softback
$8999
AVAILABLE WITH SUPPLIER Ships from our Auckland warehouse within 3-4 weeks

Found a better price? Request a price match

Book Hero Magic created this recommendation. While it's new and still learning, it may not be perfect - your feedback is welcome! IS THIS YOUR NEXT READ?

This book may appeal to you if you're intrigued by the strategic thinking behind network security breaches. It provides insights into how attackers exploit network vulnerabilities and offers a comprehensive understanding of the techniques used to breach systems. If you're keen on understanding the broader implications of cybersecurity or you're a professional looking to fortify your skills, this read can be both enlightening and practical.

Book Hero thinking about your next read

Network Attacks and Exploitation

Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage.

Book Hero Magic formatted this description to make it easier to read. While it's new and still learning, it may not be perfect - your feedback is welcome! Description

Incorporate offence and defence for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals.

Assaults and manipulation of computer networks are rampant around the world. One of the biggest challenges is fitting the ever-increasing amount of information into a whole plan or framework to develop the right strategies to thwart these attacks. This book clears the confusion by outlining the approaches that work, the tools that work, and resources needed to apply them.

  • Understand the fundamental concepts of computer network exploitation
  • Learn the nature and tools of systematic attacks
  • Examine offensive strategy and how attackers will seek to maintain their advantage
  • Understand defensive strategy, and how current approaches fail to change the strategic balance

Governments, criminals, companies, and individuals are all operating in a world without boundaries, where the laws, customs, and norms previously established over centuries are only beginning to take shape. Meanwhile, computer espionage continues to grow in both frequency and impact. This book will help you mount a robust offence or a strategically sound defence against attacks and exploitation. For a clear roadmap to better network security, Network Attacks and Exploitation is your complete and practical guide.

Book Details

INFORMATION

ISBN: 9781118987124

Publisher: John Wiley & Sons Inc

Format: Paperback / softback

Date Published: 11 August 2015

Country: United States

Imprint: John Wiley & Sons Inc

Audience: Professional and scholarly

DIMENSIONS

Spine width: 10.0mm

Width: 187.0mm

Height: 234.0mm

Weight: 376g

Pages: 224

About the Author

MATTHEW MONTE is a security expert with 15 years experience developing computer security tools and strategies for corporations and the U.S. government. His career includes technical and leadership positions in industry and the U.S. intelligence community. He holds a Master of Engineering in Computer Science degree from Cornell University.

More from Computing & Technology

View all

Why buy from us?

Book Hero is not a chain store or big box retailer. We're an independent 100% NZ-owned business on a mission to help more Kiwis rediscover a love of books and reading!

Service & Delivery

Service & Delivery

Our warehouse in Auckland holds over 80,000 books and puzzles in-stock so you're not waiting for your order to arrive from overseas.

Auckland Bookstore

Auckland Bookstore

We're primarily an online store, but for your convenience you can pick up your order for free from our bookstore, which is right next door to our warehouse in Hobsonville.

Our Gifting Service

Our Gifting Service

Books make wonderful thoughtful gifts and we're here to help with gift-wrapping and cards. We can even send your gift directly to your loved one.