Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis

Par : Tom Lesley
Offrir maintenant
Ou planifier dans votre panier
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
  • Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
  • Compatible avec une lecture sur liseuses Vivlio
  • Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
Logo Vivlio, qui est-ce ?

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement

Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
C'est si simple ! Lisez votre ebook avec l'app Vivlio sur votre tablette, mobile ou ordinateur :
Google PlayApp Store
  • FormatePub
  • ISBN8224511259
  • EAN9798224511259
  • Date de parution20/04/2024
  • Protection num.pas de protection
  • Infos supplémentairesepub
  • ÉditeurVirtued Press

Résumé

Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis" is a comprehensive guide to understanding the vulnerabilities and defenses of network protocols. In today's interconnected world, networks are essential for communication and collaboration, making them a prime target for hackers seeking to exploit vulnerabilities in the protocols that underpin them. This book provides a detailed overview of network protocols, including commonly used protocols such as TCP/IP, HTTP, DNS, SMTP, and FTP.
It covers network protocol analysis techniques, such as sniffing, traffic analysis, and packet inspection, as well as Wireshark and other popular network protocol analysis tools."Hacking Network Protocols" also delves into the world of network protocol hacking and exploitation techniques, exploring common attack vectors such as TCP/IP hijacking, DNS spoofing, and ARP poisoning. The book also covers network protocol defense techniques, such as firewalls, intrusion detection systems, and encryption, and provides techniques for detecting and mitigating network protocol attacks. Written in a clear and concise style, "Hacking Network Protocols" is suitable for both novice and experienced readers.
It is an essential guide for network administrators, security professionals, and anyone interested in network security and hacking. With this book as a guide, readers will gain a deeper understanding of network protocols and the security challenges they present, allowing them to defend against attacks and protect their networks from intrusion.