Hackers Beware

Voorkant
Sams Publishing, 2002 - 778 pagina's
3 Recensies
Reviews worden niet geverifieerd, maar Google checkt wel op nepcontent en verwijdert zulke content als die wordt gevonden.

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.

 

Wat mensen zeggen - Een review schrijven

We hebben geen reviews gevonden op de gebruikelijke plaatsen.

Inhoudsopgave

I
1
II
2
III
3
IV
12
V
14
VI
18
VII
19
VIII
20
LXVII
316
LXVIII
334
LXIX
335
LXX
345
LXXI
347
LXXII
348
LXXIII
352
LXXIV
354

IX
21
XI
23
XII
35
XIII
36
XIV
51
XV
60
XVI
62
XVII
63
XVIII
64
XIX
89
XX
90
XXI
102
XXII
103
XXIV
104
XXV
140
XXVI
141
XXVIII
142
XXIX
143
XXX
144
XXXI
147
XXXII
151
XXXIII
152
XXXIV
172
XXXV
173
XXXVI
175
XXXVII
177
XXXVIII
178
XXXIX
179
XL
180
XLI
182
XLII
227
XLIII
229
XLIV
235
XLV
238
XLVI
241
XLVII
243
XLVIII
244
XLIX
245
L
248
LI
249
LII
250
LIV
280
LV
282
LVI
283
LVII
284
LVIII
285
LIX
286
LX
288
LXI
291
LXII
298
LXIII
309
LXIV
311
LXV
312
LXVI
313
LXXV
375
LXXVI
377
LXXVII
382
LXXVIII
383
LXXIX
384
LXXX
386
LXXXI
387
LXXXII
410
LXXXIII
411
LXXXIV
412
LXXXV
477
LXXXVI
479
LXXXVIII
480
LXXXIX
483
XC
491
XCI
493
XCIII
494
XCIV
542
XCV
543
XCVI
544
XCVII
548
XCVIII
553
XCIX
579
C
581
CI
582
CII
604
CIII
605
CV
606
CVI
612
CVII
621
CVIII
636
CIX
645
CX
660
CXI
671
CXII
684
CXIII
689
CXIV
691
CXV
692
CXVI
706
CXVII
708
CXIX
709
CXX
710
CXXI
715
CXXII
717
CXXIII
718
CXXIV
719
CXXV
723
CXXVI
724
CXXVII
729
CXXVIII
731
CXXIX
736
CXXX
739
CXXXI
749
Copyright

Overige edities - Alles bekijken

Veelvoorkomende woorden en zinsdelen

Over de auteur (2002)

Eric Cole has worked in the information security arena for over 10 years. He is certified as a CISSP, MCSE and CCNA. Eric is very involved with the SANS Institute. He is in charge of the SANS Level One notebook, an instructor of hacking courses, and a member of the CVE (Common Vulnerabilities and Exposure) editorial board. Eric has extensive experience in the security and hacking area and devotes a lot of time to performing penetration testing for various clients. These clients range from banks, to hospitals, to health care providers, to large construction companies. Eric has also spent several years at the CIA performing security testing and red teaming. He is currently an adjunct professor at Georgetown University and has taught at NYIT.

Bibliografische gegevens