Hackers Beware

Voorkant
Sams Publishing, 2002 - 778 pagina's

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.

 

Inhoudsopgave

I
1
II
2
III
3
IV
12
V
14
VI
18
VIII
19
IX
20
LXIX
316
LXX
334
LXXI
335
LXXIII
345
LXXIV
347
LXXV
348
LXXVI
352
LXXVII
354

XI
21
XII
23
XIII
35
XIV
36
XV
51
XVI
60
XVII
62
XVIII
63
XIX
64
XX
89
XXI
90
XXII
102
XXIII
103
XXIV
104
XXVI
140
XXVII
141
XXVIII
142
XXIX
143
XXX
144
XXXI
147
XXXII
151
XXXIII
152
XXXIV
172
XXXV
173
XXXVI
175
XXXVII
177
XXXVIII
178
XXXIX
179
XL
180
XLI
182
XLII
227
XLIII
229
XLIV
235
XLV
238
XLVI
241
XLVII
243
XLVIII
244
XLIX
245
L
248
LII
249
LIII
250
LV
280
LVI
282
LVII
283
LVIII
284
LIX
285
LX
286
LXI
288
LXII
291
LXIII
298
LXIV
309
LXV
311
LXVI
312
LXVII
313
LXXVIII
375
LXXIX
377
LXXX
382
LXXXI
383
LXXXII
384
LXXXIII
386
LXXXIV
387
LXXXV
410
LXXXVI
411
LXXXVII
412
LXXXVIII
477
LXXXIX
479
XCI
480
XCII
483
XCIII
491
XCIV
493
XCV
494
XCVI
542
XCVII
543
XCVIII
544
XCIX
548
C
553
CI
579
CII
581
CIII
582
CIV
604
CV
605
CVI
606
CVII
612
CVIII
621
CIX
636
CX
645
CXI
660
CXII
671
CXIII
684
CXIV
689
CXV
691
CXVI
692
CXVII
706
CXVIII
708
CXX
709
CXXI
710
CXXII
715
CXXIII
717
CXXIV
718
CXXV
719
CXXVI
723
CXXVII
724
CXXVIII
729
CXXIX
731
CXXX
736
CXXXI
739
CXXXII
749
Copyright

Overige edities - Alles bekijken

Veelvoorkomende woorden en zinsdelen

Over de auteur (2002)

Eric Cole has worked in the information security arena for over 10 years. He is certified as a CISSP, MCSE and CCNA. Eric is very involved with the SANS Institute. He is in charge of the SANS Level One notebook, an instructor of hacking courses, and a member of the CVE (Common Vulnerabilities and Exposure) editorial board. Eric has extensive experience in the security and hacking area and devotes a lot of time to performing penetration testing for various clients. These clients range from banks, to hospitals, to health care providers, to large construction companies. Eric has also spent several years at the CIA performing security testing and red teaming. He is currently an adjunct professor at Georgetown University and has taught at NYIT.

Bibliografische gegevens