|
![]() |
|||
|
||||
OverviewIn this book, you'll learn how to identify threats that can affect your network, and mitigate against them using some of the best security tools in the industry. This book will cover various security threats that are common against organization's IT infrastructures. If you are interested in the field of networking or security administrator, this book is for you. If you're in the IT sector or want to switch careers within the IT sector, this book is perfect for you to learn the security threats that you need to be aware of. While you don't need to be a computer programmer, being familiar with basic networking is highly recommended. BUY THIS BOOK NOW AND GET STARTED TODAY!This book will cover: -Software Bugs and Buffer Overflow-Weak Passwords-Path Traversal-SQL Injection-Cross Site Scripting-Cross-site forgery request-Viruses & Malware-Trojan & Ransomware-Rootkits & Worms-DoS Attacks-Man-in-the-middle attacks-Social Engineering and Phishing Attacks-Cloud Services Attacks-ARP Poisoning-Rogue Access Points-Man in the Middle on Wireless Networks-De-Authentication Attack-Wireless Collision Attack-Wireless Replay Attacks and much more...BUY THIS BOOK NOW AND GET STARTED TODAY! Full Product DetailsAuthor: Hugo HoffmanPublisher: Independently Published Imprint: Independently Published Volume: 1 Dimensions: Width: 15.20cm , Height: 0.60cm , Length: 22.90cm Weight: 0.159kg ISBN: 9798609404534Pages: 102 Publication Date: 04 February 2020 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Temporarily unavailable ![]() The supplier advises that this item is temporarily unavailable. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out to you. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |