買這商品的人也買了...
-
$650$514 -
$650$553 -
$980$774 -
$580$452 -
$784E-Business & E-Commerce Infrastructure: Technologies Supporting the E-Business I
-
$1,840$1,748 -
$580$458 -
$450$360 -
$780$741 -
$590$466 -
$600$540 -
$690$538 -
$720$562 -
$720$569 -
$580$458 -
$750$638 -
$560$476 -
$420$332 -
$450$356 -
$780$663 -
$550$468 -
$490$417 -
$400$340 -
$480$379 -
$750$593
相關主題
商品描述
Hack Attacks encyclopedia
Network hacking continues to be an alarming problem for computer systems worldwide. From mysterious server crashes to lost data, the results are not only costly to fix but often difficult to recognize. Security expert John Chirillo, author of Hack Attacks Revealed and Hack Attacks Denied, provides another powerful tool in the battle against hacks, cracks, phreaks, and spies.
This book delves into the underground of hacking to offer a detailed look at the program files and code snippets used to get into companies. With files dating as far back as the 1970s all the way through to the present, Chirillo examines every variationnot just primary code modulesof all the hacks ever created. He also provides an in-depth look at the beginning of hacks and how it has evolved over the past three decades, and describes all of the collected hacks, phreak files, cracks, and virus hacks that have occurred during this time.
With close to 2,000 texts, program files, and code snippets (equating to over 11,000 pages of historical documentation on the CD), this comprehensive collection will help you uncover:
- Anarchist secrets on ATM machines, pay phones, cellular networks, locks, magnetic strip cards, credit cards, pirate radio, and television broadcasting
- The tools and exploits developed and used by the worlds top hackers to manipulate all types of computer security
- The files, tools, and techniques used by crackers
- Phreaking tools that can wreak havoc on a system
- Underground spy techniques involving wiretaps, video, and audio manipulation
Bonus CD!
The CD-ROM includes the techniques and source code for the historical compilation.
Also Available:
Hack Attacks Revealed a complete reference with custom security hacking toolkit.
Hack Attacks Denied a step-by-step guide to stopping hackers in their tracks.
Wiley Computer Publishing
Timely. Practical. Reliable.
Visit our Web site at www.wiley.com/compbooks/
商品描述(中文翻譯)
有史以來最完整的黑客、破解者、電話狂、間諜所使用的文本、程式檔案和程式碼片段的圖書館
《駭客攻擊百科全書》
對於全球電腦系統而言,網絡入侵仍然是一個令人擔憂的問題。從神秘的伺服器崩潰到數據丟失,其結果不僅成本高昂,而且往往難以識別。安全專家約翰·奇里洛(John Chirillo)是《揭示駭客攻擊》和《否認駭客攻擊》的作者,他在對抗駭客、破解者、電話狂和間諜的戰鬥中提供了另一個強大的工具。
本書深入探討了黑客的地下世界,詳細介紹了用於入侵公司的程式檔案和程式碼片段。從1970年代至今,奇里洛研究了所有駭客攻擊的每一個變體,不僅僅是主要的程式碼模塊。他還深入探討了駭客攻擊的起源以及在過去三十年中的演變,並描述了在此期間發生的所有駭客攻擊、破解檔案、破解和病毒攻擊。
這本綜合性的收藏包含近2,000個文本、程式檔案和程式碼片段(相當於超過11,000頁的歷史文獻),將幫助您揭示以下內容:
- 關於自動提款機、公用電話、蜂窩網絡、鎖、磁條卡、信用卡、盜版廣播和電視廣播的無政府主義者秘密
- 世界頂級駭客開發和使用的操縱各種類型電腦安全的工具和攻擊手法
- 破解者使用的檔案、工具和技術
- 可能對系統造成嚴重破壞的電話狂工具
- 涉及竊聽、視頻和音頻操縱的地下間諜技術
附贈CD!
CD-ROM包含歷史編輯的技術和原始程式碼。
還有:
《揭示駭客攻擊》-一本包含自定義安全駭客工具的完整參考書。
《否認駭客攻擊》-一本阻止駭客的逐步指南。
Wiley電腦出版社
及時。實用。可靠。
請訪問我們的網站www.wiley.com/compbooks/