Buy Used
+ £2.80 UK delivery
Used: Very Good | Details
Sold by rbmbooks
Condition: Used: Very Good
Comment: Ships from USA. Delivered in 10-12 business days. Money back guarantee!
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hacking Exposed (Network Security Secrets and Solutions) (5th Edition)(Chinese Edition) Paperback – 1991

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Paperback, 1991
click to open popover

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.

All Amazon Original Books on Sale
Browse a selection of over 160+ Kindle Books currently on sale. Learn more

Product details

  • Paperback
  • Publisher: Tsinghua University Press (1991)
  • ISBN-10: 7302122598
  • ISBN-13: 978-7302122593
  • Average Customer Review: Be the first to review this item
  • Would you like to tell us about a lower price?
    If you are a seller for this product, would you like to suggest updates through seller support?

Product description

Paperback. Pub Date: 2006 Pages: 672 in Publisher: Tsinghua University Press Hacking Exposed nationally recognized information security community regarded the Bible. known as the first book of the Information Security. Of the original Hacking Exposed methodology. elaborated the most common means of hacking and defense strategy from both attack and defense systems. Consistent writing style of adhering to the former version 4. the opening that in order to check out the location. Scan enumeration trilogy. opened the prelude to hacking. After of taking the time to go to Fan. the usual means to analyze the hacker attacks from the three aspects of the system. network. software: system attacks articles incisive analysis is given for the Windows. UNIX system attack. and cover the latest Hot Topic remote connection and VoIP attacks ; cyber attacks wireless attack techniques and tools...

Customer reviews

There are no customer reviews yet.
Share your thoughts with other customers

Where's My Stuff?

Delivery and Returns

Need Help?