『Hacking: Hacking Firewalls & Bypassing Honeypots』のカバーアート

Hacking: Hacking Firewalls & Bypassing Honeypots

プレビューの再生

聴き放題対象外タイトルです。Audible会員登録で、非会員価格の30%OFFで購入できます。

¥1,330で会員登録し購入
無料体験で、20万以上の対象作品が聴き放題に
アプリならオフライン再生可能
プロの声優や俳優の朗読も楽しめる
Audibleでしか聴けない本やポッドキャストも多数
無料体験終了後は月額¥1,500。いつでも退会できます。

Hacking: Hacking Firewalls & Bypassing Honeypots

著者: Alex Wagner
ナレーター: Jack Bellows
¥1,330で会員登録し購入

無料体験終了後は月額¥1,500。いつでも退会できます。

¥1,900 で購入

¥1,900 で購入

注文を確定する
下4桁がのクレジットカードで支払う
ボタンを押すと、Audibleの利用規約およびAmazonのプライバシー規約同意したものとみなされます。支払方法および返品等についてはこちら
キャンセル

このコンテンツについて

In order to understand hackers and protect the network infrastructure you must think like a hacker in today’s expansive and eclectic internet and you must understand that nothing is fully secured.

Considering that you are preparing to became an Ethical Hacker, IT Security Analyst, IT Security Engineer, or a Cybersecurity Specialist, yet still in doubt and want to know about Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems or Honeypots, you will find this audiobook extremely useful.

If you attempt to use any of the tools or techniques discussed in this audiobook on a network without being authorized and you disturb or damage any systems, that would be considered illegal black hat hacking. So, I would like to encourage all readers to deploy any tool and method described in this audiobook for white hat use only.

The main focus of this audiobook is to help you understand how Firewalls, Intrusion Detection Systems, Intrusion Prevention Systems, or Honeypots work.

Your listening of this audiobook will boost your knowledge on what is possible in today’s hacking world and help you to become an Ethical Hacker aka Penetration Tester.

Buy this audiobook now and get started today!

In this audiobook you will learn about:

  • What is The OSI Model
  • What are Zone Based Firewalls
  • Firewall Behavior and TCP State Table
  • Network Address Translation
  • Port Address Translation
  • Demilitarized Zone
  • TCP and UDP Traffic on Firewalls
  • Client Connection Process
  • System Intrusion Indicators
  • Indicators of Network Intrusion
  • Anomalous Behaviour
  • Firewall Implementations and Architectures
  • Packet Filtering Firewalls
  • Circuit-level Gateway
  • Application Firewalls
  • Stateful Firewalls
  • Next-Gen Firewalls
  • Detecting Firewalls
  • IP address spoofing
  • Source Routing
  • Tiny fragment attack
  • Tunneling
  • Evasion Tools
  • Intrusion Detection Systems
  • Signature-based IDS
  • Statistical Anomaly-based IDS
  • Network-Based IDS
  • Host Intrusion Detection System
  • Evasion by Confusion
  • Fragmentation attack
  • Overlapping Fragments Attack
  • Time-to-Live attack
  • DoS Attack and Flooding Attack
  • IDS weakness Detection
  • Honeypot Types and Honeypot Detection

Buy this audiobook now and get started today!

©2019 Alex Wagner (P)2020 Alex Wagner
インターネットセキュリティ・プライバシー

Hacking: Hacking Firewalls & Bypassing Honeypotsに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。