Hackers Beware - Eric Cole

Hackers Beware

The Ultimate Guide to Network Security

(Autor)

Buch | Softcover
800 Seiten
2001
Sams Publishing (Verlag)
978-0-7357-1009-2 (ISBN)
41,10 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
'Hackers Beware' gives specific exploits, exactly how they work and how to protect against them. This book should help students understand what security threats they are up against and what they need to do to protect against them. It describes how an exploit works, presents the signature of the attack and how to protect against it.
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.

Eric Cole has worked in the information security arena for over 10 years. He is certified as a CISSP, MCSE and CCNA. Eric is very involved with the SANS Institute. He is in charge of the SANS Level One notebook, an instructor of hacking courses, and a member of the CVE (Common Vulnerabilities and Exposure) editorial board. Eric has extensive experience in the security and hacking area and devotes a lot of time to performing penetration testing for various clients. These clients range from banks, to hospitals, to health care providers, to large construction companies. Eric has also spent several years at the CIA performing security testing and red teaming. He is currently an adjunct professor at Georgetown University and has taught at NYIT.

 1. Current State of the Industry.


 2. Exploiting a System.


 3. Defining an Exploit.


 4. Exploits and the 3. three main areas of Information Security.


 5. Information Gathering.


 6. IP Spoofing.


 7. Session Hijacking.


 8. Denial of Service Attacks.


 9. Buffer Overflows.


10. Password Attacks.


11. NT Password Crackers.


12. Unix Password Crackers.


13. How NT Exploits Work.


14. Exploits for NT.


15. How Unix Exploits Work.


16. Exploits for Unix.


17. Preserving Access.


18. Covering the Tracks.


19. Other Types of Attacks.


20. SANS Top 10.


21. Case Studies.


22. Summary.


Appendix A. References.


Appendix B. Software on CD.


Appendix C. Additional Tools.


Appendix D. URLs and Mailing Lists.

Erscheint lt. Verlag 21.8.2001
Verlagsort Indianapolis
Sprache englisch
Maße 228 x 178 mm
Gewicht 1179 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-7357-1009-0 / 0735710090
ISBN-13 978-0-7357-1009-2 / 9780735710092
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00