Ethical hacking and countermeasures. Book 4, Secure network operating systems and infrastructures /
Book
Ethical hacking and countermeasures. Book 4, Secure network operating systems and infrastructures /
-- Secure network operating systems and infrastructures
Copies
1 Total copies, 1 Copies are in, 0 Copies are out.
"Secure Network Operating Systems and Infrastructures discusses hacking wireless networks; physical security; how to evade IDS and Firewalls; how to detect honey pots; and and introduction to cryptography. In addition, it covers techniques used in hacking Linus, Macintosh, routers, cable modems, firewalls, mobile devices, Bluetooth devices, RFID and USB devices and how to determine security policies for these devices." -- p. xv.
  • Share It:
  • Pinterest