Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It (Paperback)
暫譯: 防禦黑暗藝術:駭客如何行動及如何防範
Jesse Varsalone, Matthew Mcfadden, Michael Schearer, Sean Morrissey, Ben Smith
買這商品的人也買了...
-
Linux 驅動程式, 3/e (Linux Device Drivers, 3/e)$980$774 -
部落格行銷達人$420$332 -
$399CCNA ICND2 Official Exam Certification Guide (CCNA Exams 640-816 and 640-802), 2/e -
Tomcat: The Definitive Guide, 2/e (Paperback)$1,292$1,224 -
精通 Vi 與 Vim (Learning the vi and Vim Editors, 7/e)$680$537 -
深入淺出軟體開發 (Head First Software Development)$680$537 -
SIP 會談啟始協議操典, 2/e$860$679 -
全球最強 VMware vSphere 4 企業環境建構$860$731 -
王者歸來 Java Web 整合開發─ JSP + Servlet + Struts + Hibernate + Spring$980$833 -
行動通信概論─工程建置與測量實務$420$378 -
ExtJS 開發之練$650$514 -
iOS SDK 4 初心者的學習殿堂$420$328 -
網頁介面設計模式 (Designing Web Interfaces: Principles and Patterns for Rich Interactions)$880$695 -
一定要學會的 HTML5 + CSS3 網頁設計實作應用$450$351 -
Android 技術內幕-探索 Android 核心原理與系統開發$580$458 -
測試之美-領略頂尖專家改善軟體的測試法則 (Beautiful Testing: Leading Professionals Reveal How They Improve Software)$580$458 -
直達雲端運算的核心-SaaS、IaaS、PaaS 的營運教戰手冊$580$493 -
iPhone 4S 使用手冊$399$339 -
一次擁有 Linux 雙認證-LPIC Level I + Novell CLA 11 自學手冊$750$593 -
jQuery 網頁設計範例教學$490$387 -
Fedora 16 Linux 實務應用$650$553 -
操作介面設計模式, 2/e (Designing Interfaces, 2/e)$980$774 -
保證學會 C/C++ 演算法$480$408 -
Unity 3D 網路競速遊戲設計$480$408 -
SAP Solution Manager, 3/e (Hardcover)$2,450$2,328
商品描述
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, Defense against the Black Arts shows you how to outwit computer predators at their own game. Among the many things you’ll learn:
- How to get into a Windows operating system without having the username or password
- Vulnerabilities associated with passwords and how to keep them out of the hands of hackers
- How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies
- Hiding one’s IP address to avoid detection
- Manipulating data to and from a web page or application for nefarious reasons
- How to find virtually anything on the internet
- How hackers research the targets they plan to attack
- How network defenders collect traffic across the wire to indentify intrusions
- Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures
The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate understanding, giving you an insider’s view of the secrets of hackers.
商品描述(中文翻譯)
隨著科技的發展,電腦駭客變得越來越精明,掌握了入侵即使是最堅不可摧系統的能力。保護系統的最佳方法是了解駭客使用的工具,並知道如何繞過它們。《防禦黑暗藝術:駭客如何做到他們所做的,以及如何防範》提供了多種入侵各種系統的技術的實作指導。通過具體的例子揭示駭客的方法論,《防禦黑暗藝術》向您展示如何在駭客的遊戲中智勝他們。在這本書中,您將學到許多內容:
- 如何在沒有用戶名或密碼的情況下進入 Windows 作業系統
- 與密碼相關的漏洞以及如何將其防止在駭客手中
- 駭客如何利用電腦取證檢查員的技術對個人和公司造成破壞
- 隱藏自己的 IP 位址以避免被檢測
- 操控從網頁或應用程式傳輸的數據以達到不法目的
- 如何在互聯網上找到幾乎任何東西
- 駭客如何研究他們計劃攻擊的目標
- 網路防禦者如何收集網路流量以識別入侵
- 使用 Metasploit 攻擊未修補或安全措施實施不當的系統漏洞
本書介紹了各種攻擊工具,並檢視 Facebook 和其他網站如何用於進行社交網路攻擊。它還涵蓋了駭客用來攻擊現代作業系統(如 Windows 7、Windows Vista 和 Mac OS X)的技術。作者探討了駭客可以利用的多種技術,以利用物理訪問、網路訪問和無線向量。這本實用手冊使用截圖來澄清程序,並通過逐步示例和相關類比來促進理解,讓您深入了解駭客的秘密。
