Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It (Paperback)
Jesse Varsalone, Matthew Mcfadden, Michael Schearer, Sean Morrissey, Ben Smith
買這商品的人也買了...
-
$980$774 -
$420$332 -
$399CCNA ICND2 Official Exam Certification Guide (CCNA Exams 640-816 and 640-802), 2/e
-
$1,292$1,224 -
$680$537 -
$680$578 -
$860$731 -
$860$774 -
$980$833 -
$420$378 -
$650$553 -
$420$328 -
$880$695 -
$450$351 -
$580$458 -
$580$458 -
$580$493 -
$399$339 -
$750$638 -
$490$417 -
$650$553 -
$980$774 -
$480$432 -
$480$432 -
$2,450$2,328
相關主題
商品描述
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, Defense against the Black Arts shows you how to outwit computer predators at their own game. Among the many things you’ll learn:
- How to get into a Windows operating system without having the username or password
- Vulnerabilities associated with passwords and how to keep them out of the hands of hackers
- How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies
- Hiding one’s IP address to avoid detection
- Manipulating data to and from a web page or application for nefarious reasons
- How to find virtually anything on the internet
- How hackers research the targets they plan to attack
- How network defenders collect traffic across the wire to indentify intrusions
- Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures
The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate understanding, giving you an insider’s view of the secrets of hackers.
商品描述(中文翻譯)
隨著科技的發展,電腦駭客變得越來越精湛,能夠入侵甚至最堅不可摧的系統。保護系統的最佳方法是了解駭客使用的工具,並知道如何規避它們。《防禦黑暗藝術:駭客如何行事以及如何保護自己》提供了一系列用於入侵各種系統的技術的實踐指導。通過具體示例揭示駭客的方法論,《防禦黑暗藝術》向您展示如何在駭客的遊戲中智勝。以下是您將學到的許多內容:
- 如何在沒有使用者名稱或密碼的情況下進入Windows操作系統
- 密碼相關的漏洞以及如何防止它們落入駭客之手
- 駭客如何利用電腦取證專家的技術對個人和公司造成破壞
- 隱藏IP地址以避免被檢測
- 為不良目的而對網頁或應用程序進行數據操作
- 如何在互聯網上尋找幾乎任何東西
- 駭客如何研究他們計劃攻擊的目標
- 網絡防禦者如何收集流量以識別入侵
- 使用Metasploit攻擊未修補或安全措施實施不良的系統漏洞
該書介紹了各種攻擊工具,並探討了Facebook和其他網站如何用於進行社交網絡攻擊的技術。它還涵蓋了駭客用於攻擊現代操作系統(如Windows 7、Windows Vista和Mac OS X)的技術。作者探討了駭客可以利用的多種技術,包括物理訪問、網絡訪問和無線矢量的利用。通過屏幕截圖來澄清步驟,這本實用手冊使用逐步示例和相關類比來促進理解,讓您深入了解駭客的秘密。