Hack Proofing Your Network, 2/e
Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, K2, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik, Ryan Permeh
- 出版商: Syngress
- 出版日期: 2002-02-28
- 定價: USD $52.95
- 售價: $399
- 語言: 英文
- 頁數: 824
- 裝訂: Paperback
- ISBN: 1928994709
- ISBN-13: 9781928994701
Called "a bold, unsparing tour of information that never swerves from the practical", this updated and considerably expanded bestseller will quickly achieve top shelf placement on your information security bookshelf. Hack Proofing Your Network, Second Edition shows you that the only way to stop a hacker is to think like one.
- Know the Laws
Review the authors' guidelines for discovering security problems when reviewing or designing a system.
- Learn the
Seven Categories of Attack
See how denial of service, information leakage, regular file access, misinformation, special file/database access, remote arbitrary code execution, and elevation of privileges can hurt you!
See how the comparison of a program, library, or file before and after some action can affect your network data.
- Learn about
Standard Cryptographic Algorithms
See how secure your encrypted files and passwords really are.
Format String Vulnerabilities
Learn about one of the newest additions to the hacker's bag of tricks.
- Read About
Session Hijacking Types
Review TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks.
the Strategic Constraints of Tunnel Design
Create tunnels that are end-to-end secure and learn how to use authentication in OpenSSH.
- Hack Proof
Design products with tamper mechanisms: resistance, evidence, detection, and response.
- Download a
Free Sniffer from the Book's Web Site
Access the Hack Proofing Web site for complete source code and Carnivore Source Code.
- Register for
Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Chapter 1: How To Hack
Chapter 2:The Laws Of Security
Chapter 3: Classes of Attack
Chapter 4: Methodology
Chapter 5: Diffing
Chapter 6: Cryptography
Chapter 7: Unexpected Input
Chapter 8: Buffer Overflow
Chapter 9: Format Strings