|
Book details / order |
HACKING EXPOSED 5TH EDITION |
The seminal book on white-hat hacking and countermeasures... should be required reading for anyone with a server or a network to secure.? --bill machrone, pc magazine
"the definitive compendium of intruder practices and tools." --steve steinke, network magazine
"for almost any computer book, you can find a clone. but not this one... a one-of-a-kind study of the art of breaking in." --unix review
here is the latest edition of international best-seller, hacking exposed. using real-world case studies, renowned security experts stuart mcclure, joel scambray, and george kurtz show it professionals how to protect computers and networks against the most recent security vulnerabilities. you'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. coverage includes:
code hacking methods and countermeasures
new exploits for windows 2003 server, unix/linux, cisco, apache, and web and wireless applications
latest ddos techniques--zombies, blaster, mydoom
all new class of vulnerabilities--http response splitting
and much more.
new features:
proven, cohesive, coherent methodology showing how a hacker thinks, to better educate those securing all parts of a network
this edition continues the tradition of a one-stop security information resource with dozens of professionally-vetted references and tips
new web application hacking tools and techniques, as well as new internet client attacks, and more
new case studies based on fortune 500 security practices
companion web site will be available with the most up-to-date security information.
table of contents:
part i: casing the establishment
chapter 1: footprinting
chapter 2: scanning
chapter 3: enumeration
part ii: system hacking
chapter 4: hacking windows
chapter 5: hacking unix
chapter 6: remote connectivity and voip hacking
part iii: network hacking
chapter7: network devices
chapter 8: wireless hacking
chapter 9: firewalls
chapter 10: denial of service attacks
part iv: software hacking
chapter 11: hacking code
chapter 12: web hacking
chapter 13: hacking the internet user
part v: appendices
a: ports
b: top 14 security vulnerabilities
index.
Author : Mcclure, stuart; scambray, joel; kurtz, george
Publication : Tata
Isbn : 978-0-07-060790-3
Store book number : 106
NRS 880.00
|
|
|
|
|
|
|
|
|
|