Hack Proofing Your Network, 2/e
暫譯: 網路安全防護指南(第二版)
Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, K2, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik, Ryan Permeh
- 出版商: Syngress Media
- 定價: $1,600
- 售價: 2.5 折 $399
- 語言: 英文
- 頁數: 824
- 裝訂: Paperback
- ISBN: 1928994709
- ISBN-13: 9781928994701
-
相關分類:
資訊安全、駭客 Hack
立即出貨(限量) (庫存=4)
買這商品的人也買了...
-
$680$537 -
$600$540 -
$550$435 -
$920$727 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$199$157 -
$620$527 -
$650$514 -
$580$458 -
$590$466 -
$860$731 -
$480$374 -
$680$537 -
$480$408 -
$690$538 -
$420$332 -
$720$562 -
$780$616 -
$750$638 -
$560$476 -
$450$356 -
$480$379 -
$1,050$1,029 -
$2,890$2,746 -
$2,000$1,900
商品描述
Called "a bold, unsparing tour of information that never swerves from the practical", this updated and considerably expanded bestseller will quickly achieve top shelf placement on your information security bookshelf. Hack Proofing Your Network, Second Edition shows you that the only way to stop a hacker is to think like one.
- Know the Laws
of Security
Review the authors' guidelines for discovering security problems when reviewing or designing a system. - Learn the
Seven Categories of Attack
See how denial of service, information leakage, regular file access, misinformation, special file/database access, remote arbitrary code execution, and elevation of privileges can hurt you! - Prevent
Diffing
See how the comparison of a program, library, or file before and after some action can affect your network data. - Learn about
Standard Cryptographic Algorithms
See how secure your encrypted files and passwords really are. - Understand
Format String Vulnerabilities
Learn about one of the newest additions to the hacker's bag of tricks. - Read About
Session Hijacking Types
Review TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks. - Understand
the Strategic Constraints of Tunnel Design
Create tunnels that are end-to-end secure and learn how to use authentication in OpenSSH. - Hack Proof
Your Hardware
Design products with tamper mechanisms: resistance, evidence, detection, and response. - Download a
Free Sniffer from the Book's Web Site
Access the Hack Proofing Web site for complete source code and Carnivore Source Code. - Register for
Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Contents
Chapter 1: How To Hack
Chapter 2:The Laws Of Security
Chapter 3: Classes of Attack
Chapter 4: Methodology
Chapter 5: Diffing
Chapter 6: Cryptography
Chapter 7: Unexpected Input
Chapter 8: Buffer Overflow
Chapter 9: Format Strings
Chapter 10: Sniffing
Chapter 11: Session Hijacking
Chapter 12: Spoofing: Attacks on Trusted Identity
Chapter 13: Tunneling: Establishing Impossible Links through Improbable Networks
Chapter 14: Hardware Hacking
Chapter 15: Viruses, Trojan Horses, and Worms
Chapter 16: IDS Evasion
Chapter 17: Automated Security Review and Attack Tools
Chapter 18: Reporting Security Problems
商品描述(中文翻譯)
被稱為「一場大膽且毫不留情的資訊之旅,始終不偏離實用性」,這本更新且大幅擴充的暢銷書將迅速在您的資訊安全書架上獲得首要位置。《Hack Proofing Your Network, Second Edition》告訴您,阻止駭客的唯一方法就是像駭客一樣思考。
- **了解安全法則**
回顧作者在審查或設計系統時發現安全問題的指導方針。
- **學習七種攻擊類型**
了解拒絕服務、資訊洩漏、常規檔案存取、錯誤資訊、特殊檔案/資料庫存取、遠端任意程式碼執行和權限提升如何對您造成傷害!
- **防止差異比較攻擊**
了解在某些行動前後比較程式、函式庫或檔案如何影響您的網路數據。
- **了解標準加密演算法**
檢視您的加密檔案和密碼的安全性。
- **理解格式字串漏洞**
了解駭客工具包中最新的漏洞之一。
- **閱讀會話劫持類型**
回顧 TCP 會話劫持、ARP 攻擊、路由表修改、UDP 劫持和中間人攻擊。
- **理解隧道設計的戰略限制**
創建端到端安全的隧道,並學習如何在 OpenSSH 中使用身份驗證。
- **保護您的硬體**
設計具有防篡改機制的產品:抵抗、證據、檢測和回應。
- **從書籍網站下載免費嗅探器**
訪問 Hack Proofing 網站以獲取完整的源代碼和 Carnivore 源代碼。
- **註冊您的 1 年升級**
Syngress Solutions 升級計劃保護您免受內容過時的影響,並提供每月郵件、白皮書等!
**內容**
# 第 1 章:如何駭客攻擊
# 第 2 章:安全法則
## 第 3 章:攻擊類別
# 第 4 章:方法論
# 第 5 章:差異比較
# 第 6 章:加密學
# 第 7 章:意外輸入
# 第 8 章:緩衝區溢位
## 第 9 章:格式字串
# 第 10 章:嗅探
# 第 11 章:會話劫持
# 第 12 章:偽裝:對受信身份的攻擊
# 第 13 章:隧道:通過不可能的網路建立不可能的連結
# 第 14 章:硬體駭客
# 第 15 章:病毒、木馬和蠕蟲
# 第 16 章:IDS 迴避
# 第 17 章:自動安全審查和攻擊工具
# 第 18 章:報告安全問題