The Hacker's Handbook - Susan Young, Dave Aitel

The Hacker's Handbook

The Strategy Behind Breaking into and Defending Networks

, (Autoren)

Buch | Hardcover
894 Seiten
2003
Auerbach (Verlag)
978-0-8493-0888-8 (ISBN)
149,60 inkl. MwSt
Reveals those aspects of hacking least understood by network administrators. This handbook analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. It includes chapters which are organized around specific components and tasks.
The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Each section provides a “path” to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Dave Aitel is the founder of Immunity, Inc. (www.immunitysec.com), with prior experience at both private industry security consulting companies and the National Security Agency. His tools, SPIKE and SPIKE Proxy, are widely regarded as the best black box application assessment tools available.Susan Young has worked in the security field for the past seven years, four of which have been spent in the security consulting arena, helping clients design and implement secure networks, training on security technologies, and conducting security assessments and penetration tests of client system or network defenses (so-called ethical hacking). Her experience has included consulting work in the defense sector and the financial industry, as well as time spent evaluating and deconstructing various security products. She currently works as a senior security consultant in the Boston area security practice of International Network Services (INS).

Preface. Case Study in Subversion. Know Your Opponent. Anatomy of an Attack. Your Defensive Arsenal. Programming. The Protocols. Domain Name Service. Directory Services. Simple Mail Transfer Protocol. Hypertext Transfer Protocol. Database Hacking. Malware. Network Hardware. Consolidating Gains. After the Fall. Conclusion.

Erscheint lt. Verlag 24.11.2003
Zusatzinfo 246 Tables, black and white; 195 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 156 x 234 mm
Gewicht 1800 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-8493-0888-7 / 0849308887
ISBN-13 978-0-8493-0888-8 / 9780849308888
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00