
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
3rd EditionISBN10: 007149426X
ISBN13: 9780071494267
Copyright: 2008
Instructors: choose ebook for fast access or receive a print copy.
Still Have Questions? Contact your Rep s
With the McGraw-Hill eBook, students can access their digital textbook on the web or go offline via the ReadAnywhere app for phones or tablets.
McGraw-Hill eBook Courses Include:
- Offline reading – study anytime, anywhere
- One interface for all McGraw-Hill eBooks
- Highlighting and note-taking
- Syncs across platforms, always up-to-date
- Available for Android and iOS
Rent Monthly
Purchase Options
Students, we’re committed to providing you with high-value course solutions backed by great service and a team that cares about your success. See tabs below to explore options and pricing. Don't forget, we accept financial aid and scholarship funds in the form of credit or debit cards.
The estimated amount of time this product will be on the market is based on a number of factors, including faculty input to instructional design and the prior revision cycle and updates to academic research-which typically results in a revision cycle ranging from every two to four years for this product. Pricing subject to change at any time.
The estimated amount of time this product will be on the market is based on a number of factors, including faculty input to instructional design and the prior revision cycle and updates to academic research-which typically results in a revision cycle ranging from every two to four years for this product. Pricing subject to change at any time.
Program Details
Chapter 2. The Windows Security Architecture from the Hacker's Perspective
Chapter 3. Footprinting and Scanning
Chapter 4. Enumeration
Chapter 5. Hacking Windows-Specific Services
Chapter 6. Discovering and Exploiting Windows Vulnerabilities
Chapter 7. Post-Exploit Pillaging
Chapter 8. Achieving Stealth and Maintaining Presence
Chapter 9. Hacking SQL Server
Chapter 10. Hacking Microsoft Client Apps
Chapter 11. Physical Attacks
Chapter 12. Windows Security Features and Tools
Appendix A. Windows Security Checklist
Appendix B. About the Companion Website
Index
Chapter 2. The Windows Security Architecture from the Hacker's Perspective
Chapter 3. Footprinting and Scanning
Chapter 4. Enumeration
Chapter 5. Hacking Windows-Specific Services
Chapter 6. Discovering and Exploiting Windows Vulnerabilities
Chapter 7. Post-Exploit Pillaging
Chapter 8. Achieving Stealth and Maintaining Presence
Chapter 9. Hacking SQL Server
Chapter 10. Hacking Microsoft Client Apps
Chapter 11. Physical Attacks
Chapter 12. Windows Security Features and Tools
Appendix A. Windows Security Checklist
Appendix B. About the Companion Website
Index
Shipping Options
- Standard
- Next day air
- 2nd day air
- 3rd day air
Rent Now
You will be taken to our partner Chegg.com to complete your transaction.
After completing your transaction, you can access your course using the section url supplied by your instructor.