Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Hands-On Ethical Hacking and Network Defense 1st Edition

4.5 out of 5 stars 16 customer reviews
ISBN-13: 978-1133935612
ISBN-10: 1133935613
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Trade in your item
Get a $6.78
Gift Card.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$22.98 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$25.54 On clicking this link, a new layer will be open
More Buying Choices
20 New from $21.63 13 Used from $17.32
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


The Amazon Book Review
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
$25.54 FREE Shipping. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.
click to open popover

Frequently Bought Together

  • Hands-On Ethical Hacking and Network Defense
  • +
  • Managing Security with Snort and IDS Tools
Total price: $53.79
Buy the selected items together

Editorial Reviews

Review

?Guide to Ethical Hacking is a fantastic book. I have told all of my students that if they are seriously interested in the field of security and penetration testing, this is the book to get. Most books discuss penetration testing; this book teaches how to do it, honorably and legally. In a nutshell, I am very proud to be a part of this book.? ? Randy Weaver, Technical Editor, Everest College

'Guide to Ethical Hacking is a fantastic book. I have told all of my students that if they are seriously interested in the field of security and penetration testing, this is the book to get. Most books discuss penetration testing; this book teaches how to do it, honorably and legally. In a nutshell, I am very proud to be a part of this book.'' Randy Weaver, Technical Editor, Everest College

Guide to Ethical Hacking is a fantastic book. I have told all of my students that if they are seriously interested in the field of security and penetration testing, this is the book to get. Most books discuss penetration testing; this book teaches how to do it, honorably and legally. In a nutshell, I am very proud to be a part of this book. Randy Weaver, Technical Editor, Everest College

aGuide to Ethical Hacking is a fantastic book. I have told all of my students that if they are seriously interested in the field of security and penetration testing, this is the book to get. Most books discuss penetration testing; this book teaches how to do it, honorably and legally. In a nutshell, I am very proud to be a part of this book.a a Randy Weaver, Technical Editor, Everest College

"Guide to Ethical Hacking is a fantastic book. I have told all of my students that if they are seriously interested in the field of security and penetration testing, this is the book to get. Most books discuss penetration testing; this book teaches how to do it, honorably and legally. In a nutshell, I am very proud to be a part of this book." - Randy Weaver, Technical Editor, Everest College

About the Author

Michael T. Simpson is president/senior consultant of MTS Consulting, Inc., a firm specializing in network security and network design. His certifications include CEH, CISSP, Security+, OSSTMM Professional Security Tester (OPST), OSSTMM Professional Security Analyst (OPSA), ITIL, MCSE, MCDBA, MCSD, MCT, and OCP. He also holds an M.B.A. from M.B.A. Chaminade University and has authored or co-authored eight books. Mike has more than 30 years of industry experience, including 20 years with the U.S. Department of Defense, where he designed and configured computer networks, served as an Oracle database and UNIX administrator, and held multiple cyber security positions.

Kent Backman's expertise is in intrusion analysis, network vulnerability assessment, and opensource solution engineering. His interest and skill in ethical hacking developed while managing Web servers for Fortune 500 companies. An analyst for many security incident response teams, Kent spent several years in Baghdad as part of the advisory team to the Iraq Ministry of Defense, specializing in network security and Linux engineering. He holds RHCT, MCSA, CISSP, and CEH certifications and is a network security consultant in Honolulu.

James (Jim) Corley has more than twenty-five years of experience in IT as a systems analyst, network engineer, and security professional. He worked for the DoD for nine years as a database administrator and information systems security officer. For the past sixteen years, Jim has been a consultant to the DoD on dozens of IT programs supporting both classified and unclassified voice, video, and data systems. He has been a Certified Information Systems Security Professional (CISSP) since 2002.
If you buy a new print edition of this book (or purchased one in the past), you can buy the Kindle edition for only $2.99 (Save 89%). Print edition purchase must be sold by Amazon. Learn more.
For thousands of qualifying books, your past, present, and future print-edition purchases now lets you buy the Kindle edition for $2.99 or less. (Textbooks available for $9.99 or less.)
  • Thousands of books are eligible, including current and former best sellers.
  • Look for the Kindle MatchBook icon on print and Kindle book detail pages of qualifying books. You can also see more Kindle MatchBook titles here or look up all of your Kindle MatchBook titles here.
  • Read the Kindle edition on any Kindle device or with a free Kindle Reading App.
  • Print edition must be purchased new and sold by Amazon.com.
  • Gifting of the Kindle edition at the Kindle MatchBook price is not available.
Learn more about Kindle MatchBook.


New York Times best sellers
Browse the New York Times best sellers in popular categories like Fiction, Nonfiction, Picture Books and more. See more

Product Details

  • Paperback: 464 pages
  • Publisher: Cengage Learning PTR; 1 edition (April 17, 2012)
  • Language: English
  • ISBN-10: 1133935613
  • ISBN-13: 978-1133935612
  • Product Dimensions: 7.4 x 1 x 9.1 inches
  • Shipping Weight: 2.1 pounds (View shipping rates and policies)
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (16 customer reviews)
  • Amazon Best Sellers Rank: #197,171 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

Format: Paperback Verified Purchase
Just finishing this title, I have a few different thoughts about it. I would have to say it is a good book for beginners, or those looking to expand there current understanding of the topics. There was little practical application found in this book, moreover, I believe that the authors goal was to introduce the technologies at hand, not so much as to how to use them. But, it would be wrong to say they don't explain them self, there are several portions where they laid out nice step-by-step details.

So overall, I would have to say that this title is a recommended read for someone interested in hacking, not an all in one, but defiantly a book to include in your "Web" of security books to read.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Kindle Edition Verified Purchase
This text even though I had to take it for a class did not only help me get inside the world of ethical hacking and all the issues that went with hacking, I now see everything from a network aspect in a different way. Instead of just seeing just a new router that comes out, I'm looking now at the vulnerabilities that exist with a new router or network hardware. Not only that, it introduced me to Linux or BackTrack Linux which I have been wanting to learn for some years now. This is definitely going to be one of my reference books!

Thank you and may God bless you totally and greatly!
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This was used as the textbook for the ethical hacking class I took last fall. It was a great intro book although some of the links are outdated and the CD did not work (the CD did not work for anyone regardless of the source - including the campus bookstore)

I kept the book for reference.
Comment 4 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Overall, I think this is a good book for a beginner (I, myself, am a beginner). It made it a little easier for me because I have a computer information systems background and I took a few networking courses, which gave me the necessary foundation for reading this book. If you have no IT background at all, you can probably still get something from the text, but I would recommend gaining an understanding of computer networks or at least having a supplementary networking book handy. Overall, good book.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
I purchased this book new from Amazon. I just recentley found out that the software disk provided no longer works and that there should have been a new version disk included with the book. You must have the correct disk to complete the labs. So basicly I have a new door stop!
Buyer Beware!
1 Comment 7 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Used this for a CS Special Topics class. Plan to use it at some point to work toward my CEH certification. As with all certifications this book is just one tool to have in your library. Some of the links in the book were no longer valid but with a quick search of the site you can find a multitude of other resources.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Excellent value for my Ethical Hacking Grad class without CD other edition includes , but for some reason it doesn't work anyway ..according to other reviewers
Comment 2 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
This is a Christmas gift for another person other than me so I can't rate it solely on the basis of my knowledge on this because I have very little knowledge on this. I can say the person receiving this gift really likes it and said it is a big help in their studies to learn more about it and what to look for and how to protect themselves and to help them further their studies as to eventually be hired by company's to help them protect their systems.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

Hands-On Ethical Hacking and Network Defense
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more about Amazon Giveaway
This item: Hands-On Ethical Hacking and Network Defense