MbrlCatalogueTitleDetail

Do you wish to reserve the book?
Penetrating Computer Systems and Networks
Penetrating Computer Systems and Networks
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Penetrating Computer Systems and Networks
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Penetrating Computer Systems and Networks
Penetrating Computer Systems and Networks

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Penetrating Computer Systems and Networks
Penetrating Computer Systems and Networks
Book Chapter

Penetrating Computer Systems and Networks

2012
Request Book From Autostore and Choose the Collection Method
Overview
This chapter discusses different aspects of penetration of computer systems and networks. Both technical and nontechnical aspects come into play when people attempt to penetrate security systems. Penetration of information systems is possible by means of a wide range of methods, some of which are very hard to defend against. People responsible for securing systems have to defend against this wide range of penetration methods. The cheapest and most effective attacks are often nontechnical, exploiting human frailty rather than weaknesses in the technology. Experienced criminal hackers tend to favor the nontechnical attack over the technical; and the best defense, employee awareness, is also nontechnical. Systems can be attacked at the client, at the server, or at the connection between the two. This chapter looks at methods of tricking people into allowing unauthorized access to systems. It also examines technical measures for overcoming security barriers and specific techniques for penetration, and describes legal and political aspects of system penetration.
Publisher
John Wiley & Sons, Inc
ISBN
9781118134108, 1118134109