£57.56

CRC Press Conducting Network Penetration and Espionage in a Global Environment

Price data last checked 18 day(s) ago - will refresh soon

View at Amazon

Price History & Forecast

Last 73 days • 73 data points (No recent data available)

Historical
Generating forecast...
£57.56 £56.80 £56.97 £57.13 £57.30 £57.46 £57.63 23 January 2026 10 February 2026 28 February 2026 18 March 2026 05 April 2026

Price Distribution

Price distribution over 73 days • 2 price levels

Days at Price
Current Price
31 days 42 days · current 0 11 21 32 42 £57 £58 Days at Price

Price Analysis

Most common price: £58 (42 days, 57.5%)

Price range: £57 - £58

Price levels: 2 different prices over 73 days

Description

Product Description When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton’s decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you’ve learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today’s networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks. About the Author Bruce Middleton is a graduate of the University of Houston and has been involved with the security of electronic communications systems since 1972, when he enlisted in the military (U.S. Army Security Agency) during the Vietnam conflict and worked overseas in the field for NSA. Since that time he has worked with various government, military, and commercial entities such as NASA (Space Station Freedom communications systems design team), CIA, NAVSEA, and Boeing (ground station-to-aircraft communications systems). Mr. Middleton has been the keynote speaker at select national and international industry events and a trusted advisor in both the government and commercial sectors. He has written multiple books, e-books, and magazine articles in the fields of communications security, cybercrime, and computer network penetration.

Product Specifications

Format
paperback
Domain
Amazon UK
Release Date
18 September 2018
Listed Since
25 November 2018

Barcode

No barcode data available

Similar Products You Might Like

Machine Intelligence and Big Data Analytics for Cybersecurity Applications: 919 (Studies in Computational Intelligence, 919)
98% match

Machine Intelligence and Big Data Analytics for Cybersecurity Applications: 919 (Studies in Computational Intelligence, 919)

Springer

£147.91 04 Apr 2026
Defensive Security Handbook: Best Practices for Securing Infrastructure
98% match

Defensive Security Handbook: Best Practices for Securing Infrastructure

O'Reilly

£37.76 13 Apr 2026
Security on the Web: 83 (Advances in Computers): Volume 83
98% match

Security on the Web: 83 (Advances in Computers): Volume 83

Academic Press

£102.12 11 Apr 2026
Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7
98% match

Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7

Packt Publishing

£41.99 11 Apr 2026
National Cyber Summit (NCS) Research Track: 1055 (Advances in Intelligent Systems and Computing, 1055)
98% match

National Cyber Summit (NCS) Research Track: 1055 (Advances in Intelligent Systems and Computing, 1055)

Springer

£77.73 18 Apr 2026
Building an Effective Security Program
98% match

Building an Effective Security Program

De Gruyter

£41.50 01 Apr 2026
Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System: 334 (Studies in Computational Intelligence, 334)
98% match

Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System: 334 (Studies in Computational Intelligence, 334)

Springer

£76.14 12 Apr 2026
Cybersecurity Essentials: Practical Tools for Today's Digital Defenders
98% match

Cybersecurity Essentials: Practical Tools for Today's Digital Defenders

Apress

£38.87 19 Apr 2026
Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
98% match

Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Packt Publishing

£41.50 13 Apr 2026
Real-Time and Retrospective Analyses of Cyber Security
98% match

Real-Time and Retrospective Analyses of Cyber Security

Information Science Reference

£158.97 14 Apr 2026
Malware Analysis Techniques: Tricks for the triage of adversarial software
98% match

Malware Analysis Techniques: Tricks for the triage of adversarial software

Packt Publishing

£39.99 09 Apr 2026
Responsive Security: Be Ready to Be Secure
98% match

Responsive Security: Be Ready to Be Secure

CRC Press

£157.32 06 Apr 2026
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021: 378 (Lecture Notes in Networks and Systems, 378)
98% match

Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021: 378 (Lecture Notes in Networks and Systems, 378)

Springer

£111.36 01 Apr 2026
Cyber Security: Critical Infrastructure Protection: 56 (Computational Methods in Applied Sciences, 56)
98% match

Cyber Security: Critical Infrastructure Protection: 56 (Computational Methods in Applied Sciences, 56)

Springer

£120.83 14 Apr 2026
Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management (Chapman & Hall/CRC Computational Intelligence and Its Applications)
98% match

Intelligent Cyber-Physical Systems Security for Industry 4.0: Applications, Challenges and Management (Chapman & Hall/CRC Computational Intelligence and Its Applications)

CRC Press

£69.62 17 Apr 2026
Intelligent Methods for Cyber Warfare: 563 (Studies in Computational Intelligence, 563)
98% match

Intelligent Methods for Cyber Warfare: 563 (Studies in Computational Intelligence, 563)

Springer

£71.18 05 Apr 2026
Great Power Cyber Competition: Competing and Winning in the Information Environment (Routledge Advances in Defence Studies)
98% match

Great Power Cyber Competition: Competing and Winning in the Information Environment (Routledge Advances in Defence Studies)

Routledge

£40.99 12 Mar 2026
Auf der Spur der Hacker: Wie man die Täter hinter der Computer-Spionage enttarnt
98% match

Auf der Spur der Hacker: Wie man die Täter hinter der Computer-Spionage enttarnt

Springer

£46.83 05 Apr 2026
Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls
98% match

Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls

Apress

£49.99 18 Apr 2026
Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition
98% match

Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition

Wiley

£32.00 06 Apr 2026
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
98% match

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Syngress

£35.13 16 Apr 2026
OSINT 101: The Ultimate Open Source intelligence Handbook
98% match

OSINT 101: The Ultimate Open Source intelligence Handbook

£40.14 12 Mar 2026
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? (Security, Audit and Leadership Series)
98% match

Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? (Security, Audit and Leadership Series)

CRC Press

£40.48 30 Mar 2026
The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Security, Audit and Leadership Series)
98% match

The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Security, Audit and Leadership Series)

CRC Press

£45.85 11 Apr 2026