Descripción
El objetivo de este libro es introducir al lector en el mundo de la seguridad y el hackeo, centrándose en la seguridad de las redes y los datos (Description in English below).
El libro que busca al lector inicia desde cero en el pirateo de redes, comenzando por conocimientos sobre el espionaje de redes a través de herramientas de monitorización de tráfico de red, técnicas de intercepción de información, interpretación de la información obtenida y métodos de protección contra intrusos .
Además, el lector aprenderá a configurar y atacar distintos sistemas, así como las herramientas que ayudarán a mantener más seguras las redes.
Visite Amazon para comprar su ejemplar.
Description in English: The objective of this book is to introduce readers to the world of security and hacking, focusing on the security of networks and the data that circulates through them. It explains in detail how to secure and intercept communications, from the point of view of the attacker and the victim.
It is an eminently practical content, which will allow the reader to start from scratch in this exciting world of network hacking, starting with some notions of essential knowledge about network espionage and intrusion into them, through monitoring tools, network traffic, information interception techniques, interpretation of the information obtained and methods of protection against intruders.
Continuing with the perimeter scope, the reader will learn how to configure and attack different systems, as well as the tools that help keep networks more secure, such as firewalls, Honey pots, Iptables and more. In this way, you will no longer only know how to intercept information, but will also be able to secure a network, detect intruders and carry out pentesting tests.
Finally, this book focuses on the confidentiality and integrity of the data, analyzing cryptographic systems, dealing with aspects of digital certificates and analyzing the different uses of data encryption, such as SSH, IPSec, VPN-SSL and others. Within this scope, the reader will know how to avoid that the security of their information can be compromised from different points of view: Emails, files on disks and information sent through web environments, among others. In this way, you will know the strengths and weaknesses of the different methods of information protection.
#coleccionesabg #it # computación #SeguridadPerimetral