Keyword : Category :
 
 
 
 
Windows
Unix
Php and mysql
Linux
Java
Mobile programming
Certification
Asterisk
Python
Autocad
3d-animation
Hacks
Programming
Hardware
Networking
Web design
Multimedia - graphics
Simple steps
Dummies
.net programming
Oracle
Sql server
Operating system
Telecommunications
Microsoft
Office
Web development
Cisco
Graphics
C sharp
Software development
Database
Computer science
Uml
Security
General
Cms
Mac
Android
 
 
Email:
 
 
No bestsellers available!
 
Book details / order
HACKING EXPOSED 5TH EDITION
The seminal book on white-hat hacking and countermeasures... should be required reading for anyone with a server or a network to secure.? --bill machrone, pc magazine "the definitive compendium of intruder practices and tools." --steve steinke, network magazine "for almost any computer book, you can find a clone. but not this one... a one-of-a-kind study of the art of breaking in." --unix review here is the latest edition of international best-seller, hacking exposed. using real-world case studies, renowned security experts stuart mcclure, joel scambray, and george kurtz show it professionals how to protect computers and networks against the most recent security vulnerabilities. you'll find detailed examples of the latest devious break-ins and will learn how to think like a hacker in order to thwart attacks. coverage includes: code hacking methods and countermeasures new exploits for windows 2003 server, unix/linux, cisco, apache, and web and wireless applications latest ddos techniques--zombies, blaster, mydoom all new class of vulnerabilities--http response splitting and much more. new features: proven, cohesive, coherent methodology showing how a hacker thinks, to better educate those securing all parts of a network this edition continues the tradition of a one-stop security information resource with dozens of professionally-vetted references and tips new web application hacking tools and techniques, as well as new internet client attacks, and more new case studies based on fortune 500 security practices companion web site will be available with the most up-to-date security information. table of contents: part i: casing the establishment chapter 1: footprinting chapter 2: scanning chapter 3: enumeration part ii: system hacking chapter 4: hacking windows chapter 5: hacking unix chapter 6: remote connectivity and voip hacking part iii: network hacking chapter7: network devices chapter 8: wireless hacking chapter 9: firewalls chapter 10: denial of service attacks part iv: software hacking chapter 11: hacking code chapter 12: web hacking chapter 13: hacking the internet user part v: appendices a: ports b: top 14 security vulnerabilities index.

Author : Mcclure, stuart; scambray, joel; kurtz, george
Publication : Tata
Isbn : 978-0-07-060790-3
Store book number : 106
NRS 880.00
  
Order This Book
*Marked Field Is Necessary
Your Name: *
Your Address:
Your Email: *
Your Cell Phone:
Your Work Phone:
Quantity: *
Total:
Message (if any)
Security code: *
Case Sensitive
 
 
Packt publication
Microsoft press
Wrox
Bpb
Phi
Dreamtech press
Sybex
Wiley
Tata
Oreilly
Macmilan
Vikas
Apress
Spd
Pearson
Cambridge
Oxford
Idg
Charles river media
Murach
Niit
Black book
Bible
Elsevier
Sk kataria
Pragmatic bookshelf
Fusion books
 
 
MURACH'S PYTHON PROGRAMMING
NRS 1560.00
 
 
Professional ASP.NET MVC 4
Mastering Microsoft Exchange ...
Android Hacker's Handbook
CCNA Cisco Certified Network ...
Windows Phone 7 Application ...
Beginning Drupal (Wrox Progr ...
Troubleshooting Windows 7 In ...
 More>>
 
All Right Reserved © bookplus.com.np 2008