More From Contributor

£19.31
Addresses the fastest-growing application for streaming media
- broadcasting live audio & video on the Internet. This book provides
...
Archived Product
£8.57
Energy healing is a non-invasive, complementary therapy that can be used to help your pet's health & behaviour. This guide provides advice on when, where & how to use hands-on healing to treat your pet. Case studies of pets who have been helped by hands-on healing are provided throughout. ...
Archived Product
£23.36
Provides a narrative review of the mushrooming field of computer-aided psychotherapy for mental health problems as a whole. This book details the many types of computer-aided psychotherapy & how each might be accessed together with the pros & cons of such help & the various functions it can serve. ...
Archived Product
£5.59
Helps you find out about the land of the pharaohs, with 15 step-by-step projects & over 400 pictures. Suitable for ages 8 to 12, this title features 15 projects that allow you to bring the past to life
- make a miniature pyramid, build a model boat suitable for sailing on the Nile, create your own water clock, & sculpt a canopic jar.
...
Archived Product

Hands-On Ethical Hacking And Network Defense

Offers an understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers, and provides a discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks.
RIP - This product is no longer available on our network. It was last seen on 01.01.2015

This page now acts as a permanent archive for this product. Add more information using the comments box below to ensure it can still be found by future generations.

Use our search facility to see if it is available from an alternative contributor.
  • Availability: Out Of Stock
  • Supplier: Pickabook
  • SKU: 9781435496651
Availability: In Stock
£40.59

Product Description

Offers an understanding of how to effectively protect computer networks. This book describes the tools & penetration testing methodologies used by ethical hackers, & provides a discussion of what & who an ethical hacker is & how important they are in protecting corporate & government data from cyber attacks.

Reviews/Comments

Add New

Intelligent Comparison

Oooops!
We couldn't find anything!
Perhaps this product's unique.... Or perhaps we are still looking for comparisons!
Click to bump this page and we'll hurry up.

Price History

Oooops!
We couldn't find any historical pricing!

Vouchers

No voucher codes found.
Do you know a voucher code for this product or supplier? Add it to Insights for others to use.

Facebook

Jargon Buster

Computer - A programmable electronic machine which stores and manipulates data.
Network - A link and communication between things. Often computers or people.

Supplier Information

Pickabook
A UK based company founded in 1998. Offering exceptional value for money on a wide range of books including leather bound books and sticker books.

Over 5 million books in stock - all new
Discounts of upto 80 percent
Excellent customer service
Fast delivery
Page Updated: 2015-03-31 20:45:45

Community Generated Product Tags

Oh No! The productWIKI community hasn't generated any tags for this product yet!
Menu