Hack Attacks Revealed, w. CD-ROM
A Complete Reference for UNIX, Windows and Linux with Custom Security Toolkit
(Sprache: Englisch)
Leider schon ausverkauft
Buch
Produktdetails
Produktinformationen zu „Hack Attacks Revealed, w. CD-ROM “
Inhaltsverzeichnis zu „Hack Attacks Revealed, w. CD-ROM “
Acknowledgments.A Note to the Reader.
Introduction.
Part One: Technology.
Chapter 1: Understanding Communication Protocols.
A Brief History of the Internet.
ARP/RARP Engineering: Introduction to Physical.
Hardware Address Mapping Transmission Control Protocol.
User Datagram Protocol.
Internet Control Message Protocol.
Moving Forward.
Chapter 2: Novell IPX, SPX, and NetBIOS Technology.
NetWare: Introduction.
NetBIOS Technology: Introduction.
NetBEUI: Introduction.
Conclusion.
Chapter 3: Understanding Communication Mediums.
Ethernet Technology.
Token Ring Technology.
Fiber Distributed Data Interface Technology.
Analog Technology.
Integrated Services Digital Network Technology.
Digital Subscriber Line and Cable Modems.
Wireless 802.11 Preamble.
Point-to-Point Technology.
Frame Relay Technology.
Looking Ahead.
Part Two: Discovery.
Intuitive Intermission A Little Terminology.
Who Are Hackers, Crackers, Phreaks, Script Kiddies, and Cyberpunks?
Security Levels.
Kickoff.
Chap ter 4: Well-Known Ports and Their Services.
A Review of Ports.
Detrimental Services and Associated Ports.
What's Next.
Chapter 5: Discovery and Scanning Techniques.
Discovery.
Site Port Scans.
Summary.
Part Three: Penetration.
Intuitive Intermission A Hacker's Genesis.
Chapter 6: Port, Socket, and Service Vulnerability Penetrations.
Example Case Synopsis.
Backdoor Kits.
Common Backdoor Methods.
Flooding.
Log Bashing.
Mail Bombing, Spamming, and Spoofing.
Password Cracking.
Password Recovery (Cisco).
Remote Control.
Routing Elements and Discovery (Cisco).
Scanning Intrusion Detection Systems.
Sniffing.
Spoofing IP and DNS.
Trojan Infection.
Viral/Worm Infection.
Wardialing.
Web Page Hacking.
Wireless LAN (WLAN) Hacking.
Part Four: Vulnerabilities.
Intuitive Intermission A Hacker's Vocation.
Chapter 7: Gateways and Routers and HTTPd.
Gateways and Routers.
The Internet Server Daemon HTTPd.
Conclusion.
Chapter 8: Operating
... mehr
Systems.
-NIX 366
AIX.
BSD.
HP-UX.
IRIX.
Linux.
Macintosh.
MicrosoftWindows.
Novell NetWare.
OS/2.
SCO.
Solaris.
Conclusion.
Chapter 9: Proxies and Firewalls.
Internetworking Gateways.
Conclusion.
Chapter 10: The Top 75 Hack Attacks.
Part Five: The Hacker's Toolbox.
Intuitive Intermission The Evolution of a Hacker.
Chapter 11: TigerSuite: The Complete Internetworking Security Toolbox.
Tiger Terminology.
Introduction to TigerSuite Professional 3.5.
Program Modules.
TigerBox Toolkit.
Some Real-World Discovery.
Conclusion.
Chapter 12: The Hacker's Technology Handbook.
Networking Concepts.
Networking Technologies.
What Routers Need to Route Effectively.
Routing Protocols.
Virtual Local Area Networks.
Looking Ahead.
Chapter 13: Hacker Coding Fundamentals.
The C Programming Language.
A Crash Course in C.
C Programming Fundamentals.
Structure of C.
C Compilation.
Working with Graphics.
Appendixes
-NIX 366
AIX.
BSD.
HP-UX.
IRIX.
Linux.
Macintosh.
MicrosoftWindows.
Novell NetWare.
OS/2.
SCO.
Solaris.
Conclusion.
Chapter 9: Proxies and Firewalls.
Internetworking Gateways.
Conclusion.
Chapter 10: The Top 75 Hack Attacks.
Part Five: The Hacker's Toolbox.
Intuitive Intermission The Evolution of a Hacker.
Chapter 11: TigerSuite: The Complete Internetworking Security Toolbox.
Tiger Terminology.
Introduction to TigerSuite Professional 3.5.
Program Modules.
TigerBox Toolkit.
Some Real-World Discovery.
Conclusion.
Chapter 12: The Hacker's Technology Handbook.
Networking Concepts.
Networking Technologies.
What Routers Need to Route Effectively.
Routing Protocols.
Virtual Local Area Networks.
Looking Ahead.
Chapter 13: Hacker Coding Fundamentals.
The C Programming Language.
A Crash Course in C.
C Programming Fundamentals.
Structure of C.
C Compilation.
Working with Graphics.
Appendixes
... weniger
Autoren-Porträt von John Chirillo
John Chirillo is Senior Internetworking Engineer at a technology management company. He holds an impressive number of professional certifications, including those of Cisco, such as CCNA, CCDA, CCNP certifications, Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, Master Unix certifications, and a pending CCIE certification among others. With over ten years of experience in various computer systems and over five years of training experience, John interacts with clients and users at all levels. He frequently speaks at conferences such as Comdex, participates in IETF security work, and trains Microsoft and Cisco certification candidates. Chirillo is the author of Hack Attacks Revealed, Hack Attacks Denied, and Hack Attacks Encyclopedia (all from Wiley).
Bibliographische Angaben
- Autor: John Chirillo
- 2002, 2nd ed., XIII, 914 Seiten, mit Schwarz-Weiß-Abbildungen, mit Abbildungen, Maße: 23,5 cm, Kartoniert (TB), Englisch
- Verlag: Wiley & Sons
- ISBN-10: 0471232823
- ISBN-13: 9780471232827
Sprache:
Englisch
Kommentar zu "Hack Attacks Revealed, w. CD-ROM"
0 Gebrauchte Artikel zu „Hack Attacks Revealed, w. CD-ROM“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Hack Attacks Revealed, w. CD-ROM".
Kommentar verfassen