Hack Proofing your Network: Internet Tradecraft
Ryan Russell
- 出版商: Syngress Media
- 出版日期: 2000-01-15
- 定價: $1,250
- 售價: 2.4 折 $299
- 語言: 英文
- 頁數: 450
- 裝訂: Paperback
- ISBN: 1928994156
- ISBN-13: 9781928994152
-
相關分類:
資訊安全、駭客 Hack
立即出貨(限量)
買這商品的人也買了...
-
$780$663 -
$2,176Refactoring: Improving the Design of Existing Code (Hardcover)
-
$399Designing Enterprise Applications with the Java 2 Platform, Enterprise Edition (Paperback)
-
$2,650$2,518 -
$299Internet Open Trading Protocol
-
$1,920$1,824 -
$299CCNP: Routing Study Guide Exam 640-503 (Hardcover)
-
$2,040$1,938 -
$299Hack Proofing Your Wireless Network
-
$590$472 -
$1,920$1,824 -
$1,920$1,824 -
$560$476 -
$450$351 -
$399CCNA Self-Study: CCNA Basics (CCNAB) (Hardcover)
-
$780$741 -
$1,920$1,824 -
$2,240$2,128 -
$680$578 -
$600$510 -
$720$612 -
$2,720$2,584 -
$390$304 -
$760$600 -
$400$340
相關主題
商品描述
The Only Way to Stop a Hacker Is to Think Like One!
BESTSELLER!
This book provides a bold, unsparing tour of information security
that never swerves from the practical.
--Kevin L. Poulsen, Editorial Director, SecurityFocus.com
Systems and software packages are being connected to the internet at an astounding rate. Many of these systems and packages were not designed with security in mind. IT professionals need to keep their systems secure: this shows them how to make a meaningful security assessment of their own systems, by thinking like a hacker. Using forensics-based analysis this book gives ;the reader insight to the mind of a hacker. This understanding is crucial for security, Classes of attack, Diffing, Decrypting, Session Hijacking, Client and Server Holes, and choosing Secure Systems.
Ryan Russell has an important message for us all: "What you don't
know will hurt you." In his book, 'Hack-Proofing Your Network: Internet
Tradecraft' Ryan reveals the "how to" of systems penetration techniques
that intruders may use against you! While full disclosure is a two-edged
sword, the benefits include forcing software manufactures to quickly fix
security holes and informing potential victims of the vulnerabilities
that exist in their infrastructures.
Kevin Mitnick