Nelson Higher Education

Higher Education

Hacker Techniques, Tools, and Incident Handling, 3rd Edition

  • Sean-Philip Oriyano
  • Michael G. Solomon
  • ISBN-10: 1284147800
  • ISBN-13: 9781284147803
  • 0 Pages | Paperback
  • COPYRIGHT: 2020 Published
Request a Copy for Review


About the Product

Hacker Techniques, Tools, and Incident Handling, Third Edition covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them.


  • Available with Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios

  • Includes the latest content and tactics related to hacking and its methodology

  • Provides updated and expanded content on important techniques

  • Incorporates the most current hardware, software, and protocols

  • Coverage of the Internet of Things and how it has expanded attack surfaces

  • Additional coverage of what to do if you are attacked

Table of Contents

Part One: Hacker Techniques and Tools
Chapter One: Hacking: The Next Generation
Chapter Two: TCP/IP Review
Chapter Three: Cryptographic Concepts
Chapter Four: Physical Security

Part Two: A Technical and Social Overview of Hacking
Chapter Five: Footprinting Tools and Techniques
Chapter Six: Port Scanning
Chapter Seven: Enumeration and Computer System Hacking
Chapter Eight : Wireless Vulnerabilities
Chapter Nine: Web and Database Attacks
Chapter Ten: Malware
Chapter Eleven: Sniffers, Session Hijacking, and Denial of Service Attacks
Chapter Twelve: Linux and Penetration Testing
Chapter Thirteen: Social Engineering

Part Three: Incident Response and Defensive Technologies
Chapter Fourteen: Incident Response
Chapter Fifteen: Defensive Technologies