Counter Hack : A Step-by-Step Guide to Computer Attacks and Effective Defenses (Paperback)
暫譯: 反駁駭客:電腦攻擊與有效防禦的逐步指南(平裝本)
Edward Skoudis
- 出版商: Prentice Hall
- 出版日期: 2001-07-23
- 定價: $1,500
- 售價: 2.7 折 $399
- 語言: 英文
- 頁數: 592
- 裝訂: Paperback
- ISBN: 0130332739
- ISBN-13: 9780130332738
-
相關分類:
資訊安全、駭客 Hack
-
其他版本:
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2/e
買這商品的人也買了...
-
$520$411 -
$680$537 -
$550$435 -
$680$537 -
$980$774 -
$880$695 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$450$351 -
$420$328 -
$580$458 -
$580$493 -
$590$466 -
$480$408 -
$690$538 -
$600$474 -
$780$616 -
$720$569 -
$750$638 -
$860$679 -
$560$476 -
$850$723 -
$480$379 -
$750$593 -
$480$379 -
$640$506
商品描述
Summary
The Next Generation Hacker Book
The step-by-step guide to defending against hacker intrusions!
- Defend against today's most powerful hacker attacks!
- Hands-on, step-by-step techniques for UNIX/Linux and Windows environments
- Intrusion detection: New evasion techniquesand countermeasures
- By the security expert who demonstrated hacking to the U.S. Senate!
This easy-to-use, step-by-step guide will empower network and system administrators to defend their information and computing assetswhether or not they have security experience. In Counter Hack, leading network security expert Edward Skoudis presents comprehensive, insider's explanations of today's most destructive hacker tools and tactics-and specific, proven countermeasures for both UNIX and Windows environments. Skoudis covers all this and more:
- Know your adversary: from script kiddies to elite attackers
- A hacker's view of networks, TCP/IP protocols, and their vulnerabilities
- Five phases of hacking: reconnaissance, scanning, gaining access, maintaining access, and preventing detection
- The most dangerous and widespread attack scenariosexplained in depth
- Key hacker tools: port scanners, firewall scanners, sniffers, session hijackers, RootKits, and more
- How hackers build elegant attacks from simple building blocks
- Detecting and preventing IP spoofing, covert channels, denial of service attacks, and other key attacks
- How hackers cover their tracksand how you can uncover their handiwork
- A preview of tomorrow's hacker tools, attacks, and countermeasures
Whatever your role in protecting network infrastructure and data, Counter Hack delivers proven solutions you can implement right nowand long-term strategies that will improve security for years to come.
商品描述(中文翻譯)
摘要
下一代駭客書
防禦駭客入侵的逐步指南!
- 防禦當今最強大的駭客攻擊!
- 針對 UNIX/Linux 和 Windows 環境的實作逐步技術
- 入侵偵測:新的迴避技術及對策
- 由向美國參議院展示駭客技術的安全專家撰寫!
這本易於使用的逐步指南將使網路和系統管理員能夠保護他們的信息和計算資產——無論他們是否具備安全經驗。在《Counter Hack》中,頂尖的網路安全專家 Edward Skoudis 提供了當今最具破壞性的駭客工具和戰術的全面內部解釋,以及針對 UNIX 和 Windows 環境的具體、經過驗證的對策。Skoudis 涵蓋了所有這些內容及更多:
- 瞭解你的對手:從腳本小子到精英攻擊者
- 駭客對網路、TCP/IP 協議及其漏洞的看法
- 駭客的五個階段:偵查、掃描、獲取訪問、維持訪問和防止被檢測
- 最危險和最廣泛的攻擊場景——深入解釋
- 主要駭客工具:端口掃描器、防火牆掃描器、嗅探器、會話劫持器、RootKits 等
- 駭客如何從簡單的構建塊中構建優雅的攻擊
- 偵測和防止 IP 偽造、隱蔽通道、拒絕服務攻擊及其他關鍵攻擊
- 駭客如何掩蓋他們的痕跡——以及你如何揭露他們的手法
- 明天的駭客工具、攻擊和對策的預覽
無論你在保護網路基礎設施和數據方面的角色如何,《Counter Hack》提供了你可以立即實施的經過驗證的解決方案——以及將在未來幾年內改善安全的長期策略。