Hack Proofing Your Network, 2/e
Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, K2, David Ahmad, Hal Flynn, Ido Dubrawsky, Steve W. Manzuik, Ryan Permeh
- 出版商: Syngress Media
- 定價: $1,600
- 售價: 2.5 折 $399
- 語言: 英文
- 頁數: 824
- 裝訂: Paperback
- ISBN: 1928994709
- ISBN-13: 9781928994701
-
相關分類:
資訊安全、駭客 Hack
立即出貨(限量) (庫存=4)
買這商品的人也買了...
-
$680$537 -
$600$540 -
$550$363 -
$920$727 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$199$157 -
$620$527 -
$650$553 -
$580$458 -
$590$466 -
$860$731 -
$480$360 -
$680$537 -
$480$408 -
$690$518 -
$420$332 -
$720$540 -
$780$663 -
$750$638 -
$560$476 -
$450$356 -
$480$379 -
$1,050$1,029 -
$2,870$2,727 -
$1,990$1,891
商品描述
Called "a bold, unsparing tour of information that never swerves from the practical", this updated and considerably expanded bestseller will quickly achieve top shelf placement on your information security bookshelf. Hack Proofing Your Network, Second Edition shows you that the only way to stop a hacker is to think like one.
- Know the Laws
of Security
Review the authors' guidelines for discovering security problems when reviewing or designing a system. - Learn the
Seven Categories of Attack
See how denial of service, information leakage, regular file access, misinformation, special file/database access, remote arbitrary code execution, and elevation of privileges can hurt you! - Prevent
Diffing
See how the comparison of a program, library, or file before and after some action can affect your network data. - Learn about
Standard Cryptographic Algorithms
See how secure your encrypted files and passwords really are. - Understand
Format String Vulnerabilities
Learn about one of the newest additions to the hacker's bag of tricks. - Read About
Session Hijacking Types
Review TCP session hijacking, ARP attacks, route table modification, UDP hijacking, and man-in-the-middle attacks. - Understand
the Strategic Constraints of Tunnel Design
Create tunnels that are end-to-end secure and learn how to use authentication in OpenSSH. - Hack Proof
Your Hardware
Design products with tamper mechanisms: resistance, evidence, detection, and response. - Download a
Free Sniffer from the Book's Web Site
Access the Hack Proofing Web site for complete source code and Carnivore Source Code. - Register for
Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Contents
Chapter 1: How To Hack
Chapter 2:The Laws Of Security
Chapter 3: Classes of Attack
Chapter 4: Methodology
Chapter 5: Diffing
Chapter 6: Cryptography
Chapter 7: Unexpected Input
Chapter 8: Buffer Overflow
Chapter 9: Format Strings