買這商品的人也買了...
-
$680$537 -
$399Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
-
$980$774 -
$1,840$1,748 -
$399CCNA Self-Study: CCNA Basics (CCNAB) (Hardcover)
-
$1,900$1,805 -
$650$553 -
$760$600 -
$590$466 -
$600$540 -
$690$538 -
$720$562 -
$720$569 -
$290$247 -
$149$149 -
$580$493 -
$750$638 -
$490$382 -
$690$538 -
$620$527 -
$560$476 -
$720$569 -
$860$731 -
$400$340 -
$480$379
相關主題
商品描述
Hack Attacks Denied
If youve read John Chirillos provocative work,Hack Attacks Revealed, youre well on your way to understanding how hackers view internetworking technologies, the techniques they use to exploit network security holes, and what you can do to recognize oncoming attacks.
Chirillo gives you step-by-step guidance on how to keep the hacks out of your network using the same powerful Tiger Box® tools that hackers use todetect and penetrate network vulnerabilities. Drawing on his experience as a consultant hired by Fortune 1000 companies to break into their corporate networks, Chirillo covers all the necessary security stepsfrom system to daemonand helps you tie the information together to create a highly effective security policy.
Correlating each phase of this book to one described in Hack Attacks Revealed, Chirillo explains:
Securing system infra-structure by protecting vulnerable ports and services, including well-known ports, concealed ports and services, and discovery countermeasures
How to detect and protect against intrusionfrom backdoor and flooding attacks to mail bombing, viral infections, and Web page hacking
Essential technical hack countermeasures pertaining to popular gateways and routers, Internet server daemons, operating systems, and proxies and firewalls
商品描述(中文翻譯)
學習如何打敗駭客的遊戲
駭客攻擊被拒絕
如果你已經閱讀過約翰·奇里洛(John Chirillo)引人入勝的作品《揭示駭客攻擊》(Hack Attacks Revealed),你已經開始了解駭客如何看待互聯網技術,他們利用網絡安全漏洞的技巧,以及你可以做些什麼來識別即將發生的攻擊。
奇里洛提供了逐步指導,教你如何使用與駭客相同的強大Tiger Box®工具來防止駭客進入你的網絡,以檢測和滲透網絡漏洞。奇里洛以自己作為被財富1000強公司聘請來入侵其企業網絡的顧問的經驗,涵蓋了所有必要的安全步驟-從系統到守護進程-並幫助你將信息結合起來,創建一個高效的安全策略。
奇里洛將本書的每個階段與《揭示駭客攻擊》中描述的階段相對應,解釋了以下內容:
- 保護系統基礎設施,包括易受攻擊的端口和服務,包括知名端口、隱藏端口和服務,以及發現對策
- 如何檢測和防止入侵-從後門和洪水攻擊到郵件轟炸、病毒感染和網頁入侵
- 相關的技術防範措施,涉及流行的閘道器和路由器、互聯網服務器守護進程、操作系統以及代理和防火牆