Computers-Security

The hacker’s handbook: the strategy behind breaking into and defending networks

US$4.99 US$54.00

Title (user) : The hacker’s handbook: the strategy behind breaking into and defending networksTitle (google) : The Hacker's Handbook The Strategy Behind Breaking Into and Defending NetworksISBN : 0849308887,9780849308888,0203490045,9780203490044DDC :...
Description

Title (user) : The hacker’s handbook: the strategy behind breaking into and defending networks

Title (google) : The Hacker's Handbook The Strategy Behind Breaking Into and Defending Networks

ISBN : 0849308887,9780849308888,0203490045,9780203490044

DDC : 005.8—dc22

LCC : TK5105.59.Y68 2003

DOI : 10.1201/9780203490044

GoogleBook ID : AO2fsAPVC34C

GoogleBook ID : u2AOmAEACAAJ

Edition : 1

Authors (user) : Susan Young, Dave Aitel

Authors (google) : Susan Elizabeth Young,DAVE AUTOR AITEL

Publisher : Auerbach Publications

Language : English

Publication Date : 2003

File Format : pdf

Categories : Computers


------------------------------------------

Description (user) :
The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.
This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.
Each section provides a “path” to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

• Focuses on UNIX and Microsoft Windows® NT/2000 platforms
• Constructs a case study that demonstrates a complex network attack from both hacker and administrator perspectives, charting moves and countermoves within a likely security architecture
• Provides a technical foundation for: programming and the methods used to exploit code; protocols and their fundamental vulnerabilities; and databases and their weaknesses and defenses
• Analyzes the tactics and tools used by intruders to consolidate their positions inside a network, giving them consistent, covert access
• Explores forensic investigation, including pre-incident preparation and the protection of audit trails and evidence; investigates the methods that hackers use to evade audit logging controls and intrusion detection mechanisms
• Reveals technical aspects of hacking unknown to most network administrators


------------------------------------------

Description (google) :
Hackers' profiles, motivations, tricks, techniques, tools, methodologies, and strategies are revealed in this guide. It also discusses known system vulnerabilities and details how to mount countermeasures fast.

Additional Information
0 Reviews for The hacker’s handbook: the strategy behind breaking into and defending networks

Add a review

Your Rating

30004

Character Limit 400

-90%
Nokia Smartphone Hacks

Nokia Smartphone Hacks

US$4.99 US$51.00
-80%
Библия хакера 2

Библия хакера 2

US$4.99 US$25.00
-87%
Hacking Roomba: ExtremeTech

Hacking Roomba: ExtremeTech

US$4.99 US$38.00
-89%
Fuzzing: Brute Force Vulnerability Discovery

Fuzzing: Brute Force Vulnerability Discovery

US$4.99 US$44.00
-92%
Hacking Exposed: Network Security Secrets and Solutions

Hacking Exposed: Network Security Secrets and Solutions

US$4.99 US$61.00
-89%
Linux Forensics

Linux Forensics

US$4.99 US$46.00
-89%
Искусство легального, анонимного и безопасного доступа к ресурсам Интернета

Искусство легального, анонимного и безопасного доступа к ресурсам Интернета

US$4.99 US$47.00
-90%
Law Enforcement Use of Cell-Site Simulation Technologies: An unofficial reader

Law Enforcement Use of Cell-Site Simulation Technologies: An unofficial reader

US$4.99 US$52.00