Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention

Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention

Noted as an IGI Global Core Reference Title in Security & Forensics for 2019.

Sunita Vikrant Dhavale (Defence Institute of Advanced Technology, India)
Release Date: December, 2018|Copyright: © 2019 |Pages: 281
DOI: 10.4018/978-1-5225-7628-0
ISBN13: 9781522576280|ISBN10: 1522576282|ISBN13 Softcover: 9781522586708|EISBN13: 9781522576297
Prices are adjusted by 20% current discount
Softcover:
Available
$132.00
List Price: $165.00
20% Discount:-$33.00
TOTAL SAVINGS: $33.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Available through Copyright Clearance Center (CCC)
Softcover:
Available
$132.00
List Price: $165.00
20% Discount:-$33.00
TOTAL SAVINGS: $33.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Available through Copyright Clearance Center (CCC)
E-Book:
Available
$168.00
List Price: $210.00
20% Discount:-$42.00
TOTAL SAVINGS: $42.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Available through Copyright Clearance Center (CCC)
E-Book:
Available
$168.00
List Price: $210.00
20% Discount:-$42.00
TOTAL SAVINGS: $42.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
  • Available through Copyright Clearance Center (CCC)
Hardcover:
Available
$176.00
List Price: $220.00
20% Discount:-$44.00
TOTAL SAVINGS: $44.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Available through Copyright Clearance Center (CCC)
Hardcover:
Available
$176.00
List Price: $220.00
20% Discount:-$44.00
TOTAL SAVINGS: $44.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Available through Copyright Clearance Center (CCC)
Hardcover +
E-Book:
Available
$212.00
List Price: $265.00
20% Discount:-$53.00
TOTAL SAVINGS: $53.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Available through Copyright Clearance Center (CCC)
Hardcover +
E-Book:
Available
$212.00
List Price: $265.00
20% Discount:-$53.00
TOTAL SAVINGS: $53.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Available through Copyright Clearance Center (CCC)
Article Processing Charge:
Available
$1,200.00
List Price: $1,500.00
20% Discount:-$300.00
TOTAL SAVINGS: $300.00
Benefits
  • Available through Copyright Clearance Center (CCC)
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Recommend to Your Institution's Librarian
Librarians rely on expert recommendations to expand research access, supporting innovation and knowledge growth in your field.
Description & Coverage
Description:

In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices.

Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Communication Protocols
  • Computer Networking
  • Cyber Operations
  • Cybercrime
  • Network Monitoring
  • Network Statistics
  • Operating Systems
  • Server Security
  • Shell Scripting
  • Virtual Machines
  • Wireless Hacking
Download OnDemand Chapters Banner
Table of Contents
Search this Book:
Reset
Media
Videos:
Editor/Author Biographies
Dr. Sunita Vikrant Dhavale, BE, ME, PhD(CSE), C|EH is currently working as Assistant Professor in Department of Computer Engineering, Defense Institute of Advanced Technology (DIAT), Pune. Her research area includes cyber security, artificial intelligence, image/audio/video security, bio metric, deep learning. She is EC-Council’s Certified Ethical Hacker (CEH-v9). She has authored two books and more than 30 papers in reputed international journals and conference proceedings. She is member of various professional bodies including IEEE, ACM, ISACA,IETE, IAENG. She is recipient of 1) NVIDIA Hardware Research Grant - TITAN V GPU for Jan 2019, 2) IETE-M N Saha Memorial Award -2016, 3) Outstanding Women Achiever Award for Engineering Category by VENUS International Women Awards (VIWA-2016), 4) Top performer in Four Week online FDP titled “FDP301x : Mentoring Educators in Educational Technology”, organized by Pandit Madan Mohan Malaviya National Mission for Teachers and Teaching (PMMMNMTT), MHRD, GoI, IIT Bombay, May 2018 5) Top performer in Four Week AICTE approved online FDP by IIT Bombay on - Use of ICT in Education for Online and Blended Learning, May 2016.
Archiving
All IGI Global Scientific Publishing content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global Scientific Publishing published content is available in the IGI Global Scientific Publishing InfoSci® platform.