Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.
Product Identifiers
Publisher
Pearson Education
ISBN-10
0735710090
ISBN-13
9780735710092
eBay Product ID (ePID)
1712461
Product Key Features
Author
Eric Cole
Publication Name
Hackers Beware : the Ultimate Guide to Network Security
Format
Trade Paperback
Language
English
Series
New Riders Games Ser.
Publication Year
2001
Type
Textbook
Number of Pages
800 Pages
Dimensions
Item Length
7in
Item Height
1.6in
Item Width
9in
Item Weight
41.6 Oz
Additional Product Features
Lc Classification Number
Qa76.9.A25c597 2002
Table of Content
1. Current State of the Industry. 2. Exploiting a System. 3. Defining an Exploit. 4. Exploits and the 3. three main areas of Information Security. 5. Information Gathering. 6. IP Spoofing. 7. Session Hijacking. 8. Denial of Service Attacks. 9. Buffer Overflows. 10. Password Attacks. 11. NT Password Crackers. 12. Unix Password Crackers. 13. How NT Exploits Work. 14. Exploits for NT. 15. How Unix Exploits Work. 16. Exploits for Unix. 17. Preserving Access. 18. Covering the Tracks. 19. Other Types of Attacks. 20. SANS Top 10. 21. Case Studies. 22. Summary. Appendix A. References. Appendix B. Software on CD. Appendix C. Additional Tools. Appendix D. URLs and Mailing Lists.
Copyright Date
2001
Target Audience
Trade
Topic
Networking / Vendor Specific, Security / General
Lccn
00-102952
Dewey Decimal
005.8
Dewey Edition
21
Illustrated
Yes
Genre
Computers
Best Selling in Adult Learning & University
Current slide {CURRENT_SLIDE} of {TOTAL_SLIDES}- Best Selling in Adult Learning & University