Counter Hack : A Step-by-Step Guide to Computer Attacks and Effective Defenses (Paperback)
Edward Skoudis
- 出版商: Prentice Hall
- 出版日期: 2001-07-23
- 定價: $1,500
- 售價: 2.7 折 $399
- 語言: 英文
- 頁數: 592
- 裝訂: Paperback
- ISBN: 0130332739
- ISBN-13: 9780130332738
-
相關分類:
資訊安全、駭客 Hack
-
其他版本:
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2/e
買這商品的人也買了...
-
$520$343 -
$680$537 -
$550$363 -
$680$578 -
$980$774 -
$880$695 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$450$351 -
$420$328 -
$580$458 -
$580$458 -
$590$466 -
$480$408 -
$690$538 -
$600$474 -
$780$663 -
$720$569 -
$750$638 -
$860$731 -
$560$476 -
$850$723 -
$480$379 -
$750$593 -
$480$408 -
$640$506
相關主題
商品描述
Summary
The Next Generation Hacker Book
The step-by-step guide to defending against hacker intrusions!
- Defend against today's most powerful hacker attacks!
- Hands-on, step-by-step techniques for UNIX/Linux and Windows environments
- Intrusion detection: New evasion techniquesand countermeasures
- By the security expert who demonstrated hacking to the U.S. Senate!
This easy-to-use, step-by-step guide will empower network and system administrators to defend their information and computing assetswhether or not they have security experience. In Counter Hack, leading network security expert Edward Skoudis presents comprehensive, insider's explanations of today's most destructive hacker tools and tactics-and specific, proven countermeasures for both UNIX and Windows environments. Skoudis covers all this and more:
- Know your adversary: from script kiddies to elite attackers
- A hacker's view of networks, TCP/IP protocols, and their vulnerabilities
- Five phases of hacking: reconnaissance, scanning, gaining access, maintaining access, and preventing detection
- The most dangerous and widespread attack scenariosexplained in depth
- Key hacker tools: port scanners, firewall scanners, sniffers, session hijackers, RootKits, and more
- How hackers build elegant attacks from simple building blocks
- Detecting and preventing IP spoofing, covert channels, denial of service attacks, and other key attacks
- How hackers cover their tracksand how you can uncover their handiwork
- A preview of tomorrow's hacker tools, attacks, and countermeasures
Whatever your role in protecting network infrastructure and data, Counter Hack delivers proven solutions you can implement right nowand long-term strategies that will improve security for years to come.