Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks, and Spi
- 出版商: Wiley
- 出版日期: 2001-09-07
- 定價: USD $64.99
- 售價: $199
- 語言: 英文
- 頁數: 960
- 裝訂: Paperback
- ISBN: 0471055891
- ISBN-13: 9780471055891
貴賓價: $1,026The Art of Computer Programming, Volume 4, Fascicle 6: Satisfiability (Paperback)
貴賓價: $1,029The MMIX Supplement: Supplement to The Art of Computer Programming Volumes 1, 2, 3 by Donald E. Knuth (Paperback)
Hack Attacks encyclopedia
Network hacking continues to be an alarming problem for computer systems worldwide. From mysterious server crashes to lost data, the results are not only costly to fix but often difficult to recognize. Security expert John Chirillo, author of Hack Attacks Revealed and Hack Attacks Denied, provides another powerful tool in the battle against hacks, cracks, phreaks, and spies.
This book delves into the underground of hacking to offer a detailed look at the program files and code snippets used to get into companies. With files dating as far back as the 1970s all the way through to the present, Chirillo examines every variationnot just primary code modulesof all the hacks ever created. He also provides an in-depth look at the beginning of hacks and how it has evolved over the past three decades, and describes all of the collected hacks, phreak files, cracks, and virus hacks that have occurred during this time.
With close to 2,000 texts, program files, and code snippets (equating to over 11,000 pages of historical documentation on the CD), this comprehensive collection will help you uncover:
- Anarchist secrets on ATM machines, pay phones, cellular networks, locks, magnetic strip cards, credit cards, pirate radio, and television broadcasting
- The tools and exploits developed and used by the worlds top hackers to manipulate all types of computer security
- The files, tools, and techniques used by crackers
- Phreaking tools that can wreak havoc on a system
- Underground spy techniques involving wiretaps, video, and audio manipulation
The CD-ROM includes the techniques and source code for the historical compilation.
Hack Attacks Revealed a complete reference with custom security hacking toolkit.
Hack Attacks Denied a step-by-step guide to stopping hackers in their tracks.
Wiley Computer Publishing
Timely. Practical. Reliable.
Visit our Web site at www.wiley.com/compbooks/