Hack Proofing Your Network, 2/e
Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, K2, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik, Ryan Permeh
- 出版商: Syngress Media
- 定價: $1,600
- 售價: 2.5 折 $399
- 語言: 英文
- 頁數: 824
- 裝訂: Paperback
- ISBN: 1928994709
- ISBN-13: 9781928994701
-
相關分類:
資訊安全、駭客 Hack
立即出貨(限量) (庫存=4)
買這商品的人也買了...
-
$680$537 -
$600$540 -
$550$468 -
$920$727 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$199$157 -
$620$558 -
$650$553 -
$580$458 -
$590$466 -
$860$731 -
$480$374 -
$680$537 -
$480$408 -
$690$538 -
$420$332 -
$720$562 -
$780$663 -
$750$675 -
$560$504 -
$450$356 -
$480$379 -
$1,050$1,029 -
$2,830$2,689 -
$1,960$1,862
相關主題
商品描述
Called "a bold, unsparing tour of information that never swerves from the practical", this updated and considerably expanded bestseller will quickly achieve top shelf placement on your information security bookshelf. Hack Proofing Your Network, Second Edition shows you that the only way to stop a hacker is to think like one.
- Know the Laws
of Security
Review the authors' guidelines for discovering security problems when reviewing or designing a system. - Learn the
Seven Categories of Attack
See how denial of service, information leakage, regular file access, misinformation, special file/database access, remote arbitrary code execution, and elevation of privileges can hurt you! - Prevent
Diffing
See how the comparison of a program, library, or file before and after some action can affect your network data. - Learn about
Standard Cryptographic Algorithms
See how secure your encrypted files and passwords really are. - Understand
Format String Vulnerabilities
Learn about one of the newest additions to the hacker's bag of tricks. - Read About
Session Hijacking Types
Review TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks. - Understand
the Strategic Constraints of Tunnel Design
Create tunnels that are end-to-end secure and learn how to use authentication in OpenSSH. - Hack Proof
Your Hardware
Design products with tamper mechanisms: resistance, evidence, detection, and response. - Download a
Free Sniffer from the Book's Web Site
Access the Hack Proofing Web site for complete source code and Carnivore Source Code. - Register for
Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Contents
Chapter 1: How To Hack
Chapter 2:The Laws Of Security
Chapter 3: Classes of Attack
Chapter 4: Methodology
Chapter 5: Diffing
Chapter 6: Cryptography
Chapter 7: Unexpected Input
Chapter 8: Buffer Overflow
Chapter 9: Format Strings
Chapter 10: Sniffing
Chapter 11: Session Hijacking
Chapter 12: Spoofing: Attacks on Trusted Identity
Chapter 13: Tunneling: Establishing Impossible Links through Improbable Networks
Chapter 14: Hardware Hacking
Chapter 15: Viruses, Trojan Horses, and Worms
Chapter 16: IDS Evasion
Chapter 17: Automated Security Review and Attack Tools
Chapter 18: Reporting Security Problems
商品描述(中文翻譯)
這本更新且大幅擴充的暢銷書被稱為「一本大膽而毫不留情的實用資訊之旅」,將迅速成為您資訊安全書架上的頂尖選擇。《防止駭客入侵您的網絡,第二版》向您展示,唯一阻止駭客的方法就是像他們一樣思考。
以下是書中的內容摘要:
- 瞭解安全法則:檢視作者提供的指南,以發現系統設計或審查中的安全問題。
- 學習七種攻擊類別:了解服務拒絕、資訊洩漏、常規檔案存取、錯誤資訊、特殊檔案/資料庫存取、遠程任意程式碼執行和特權提升等攻擊方式對您的傷害。
- 防止Diffing:瞭解在某些操作之前和之後對程式、程式庫或檔案進行比較如何影響您的網絡數據。
- 了解標準加密演算法:瞭解您的加密檔案和密碼的安全性。
- 理解格式字串漏洞:瞭解駭客最新的技巧之一。
- 閱讀有關會話劫持類型的內容:回顧TCP會話劫持、ARP攻擊、路由表修改、UDP劫持和中間人攻擊等。
- 理解隧道設計的戰略限制:創建端到端安全的隧道,並學習如何在OpenSSH中使用身份驗證。
- 防止硬體駭客入侵:設計具有防篡改機制的產品,包括抗性、證據、檢測和回應。
- 從書籍網站上下載免費封包嗅探器:訪問《防止駭客入侵您的網絡》網站,獲取完整的原始碼和Carnivore原始碼。
- 註冊1年升級計劃:Syngress Solutions升級計劃保護您免受內容過時的影響,並提供每月郵件、白皮書等。
書中章節包括:
- 第1章:如何進行駭客攻擊
- 第2章:安全法則
- 第3章:攻擊類別
- 第4章:方法論
- 第5章:Diffing
- 第6章:加密學
- 第7章:意外輸入
- 第8章:緩衝區溢位
- 第9章:格式字串
- 第10章:封包嗅探
- 第11章:會話劫持
- 第12章:偽造:對受信任身份的攻擊
- 第13章:隧道:在不可能的網絡中建立不可能的連接
- 第14章:硬體駭客入侵
- 第15章:病毒、木馬和蠕蟲