Skip to main content

Humanities, Social Science and Language


Digital Products


Connect®
Course management and student learning tools backed by great support.

McGraw Hill GO
Greenlight learning with the new eBook+

ALEKS®
Personalize learning and assessment

ALEKS® Placement, Preparation, and Learning
Achieve accurate math placement

SIMnet
Ignite mastery of MS Office and IT skills

McGraw Hill eBook & ReadAnywhere App
Get learning that fits anytime, anywhere

Sharpen: Study App
A reliable study app for students

Virtual Labs
Flexible, realistic science simulations

AI Reader
Encourage Discovery, Boost Understanding

Services


Affordable Access
Reduce costs and increase success

Learning Management System Integration
Log in and sync up

Content Collections powered by Create®
Curate and deliver your ideal content

Custom Courseware Solutions
Teach your course your way

Education for All
Let’s build a future where every student has a chance to succeed

Business Program
Explore business learning solutions & resources

Professional Services
Collaborate to optimize outcomes

Remote Proctoring
Validate online exams even offsite

Institutional Solutions
Increase engagement, lower costs, and improve access for your students

Evergreen
Updated, relevant materials—without the hassle.

Support


General Help & Support Info
Customer Service & Tech Support contact information

Online Technical Support Center
FAQs, articles, chat, email or phone support

Support At Every Step
Instructor tools, training and resources for ALEKS, Connect & SIMnet

Instructor Sample Requests
Get step by step instructions for requesting an evaluation, exam, or desk copy

Platform System Check
System status in real time

Hacker's Challenge 3

ISBN10: 0072263040 | ISBN13: 9780072263046

Hacker's Challenge 3
ISBN10: 0072263040
ISBN13: 9780072263046
By David Pollino, Bill Pennington, Tony Bradley and Himanshu Dwivedi

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.

Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.

Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you’ll get a detailed analysis of how the experts solved each incident.

FOREWORD

ACKNOWLEDGMENTS

INTRODUCTION

Part I: Challenges

Chapter 1: To Catch a Phish

Chapter 2: Owning the Pharm

Chapter 3: Big Bait, Big Phish

Chapter 4: Shooting Phish in a Barrel

Chapter 5: Too Few Secrets

Chapter 6: Upgraded or "Owned?"

Chapter 7: Pale Blue Glow

Chapter 8: Crossing the Line

Chapter 9: The Root of the Problem

Chapter 10: Firewall Insights

Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"

Chapter 12: Share and Share Alike

Chapter 13: The Holy Grail

Chapter 14: Open Source

Chapter 15: Cup of Chai

Chapter 16: Love Plus One

Chapter 17: Bullet in the Blue Sky

Chapter 18: The Insider III

Chapter 19: Jumping Someone Else's Train

Chapter 20: The Not-So-Usual Suspects

Part II: Solutions

Chapter 1: To Catch a Phish

Chapter 2: Owning the Pharm

Chapter 3: Big Bait, Big Phish

Chapter 4: Shooting Phish in a Barrel

Chapter 5: Too Few Secrets

Chapter 6: Upgraded or "Owned?"

Chapter 7: Pale Blue Glow

Chapter 8: Crossing the Line

Chapter 9: The Root of the Problem

Chapter 10: Firewall Insights

Chapter 11: Peter LemonJello's "A Series of Unfortunate Events"

Chapter 12: Share and Share Alike

Chapter 13: The Holy Grail

Chapter 14: Open Source

Chapter 15: Cup of Chai

Chapter 16: Love Plus One

Chapter 17: Bullet in the Blue Sky

Chapter 18: The Insider III

Chapter 19: Jumping Someone Else's Train

Chapter 20: The Not-So-Usual Suspects

INDEX

Need support?   We're here to help - Get real-world support and resources every step of the way.

Top