Hack Proofing Your Network -  Syngress

Hack Proofing Your Network (eBook)

(Autor)

eBook Download: PDF
2002 | 2. Auflage
704 Seiten
Elsevier Science (Verlag)
978-0-08-047816-6 (ISBN)
Systemvoraussetzungen
39,87 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
"A new edition the most popular Hack Proofing book around!
IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including:
?The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems

The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network.

Updated coverage of an international bestseller and series flagship
Covers more methods of attack and hacker secrets
Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books
Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials
?A great addition to the bestselling Hack Proofing... series
?Windows 2000 sales have surpassed those of Windows NT
?Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp
?Unrivalled web support at www.solutions@syngress.com"
A new edition the most popular Hack Proofing book around!IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network. - Updated coverage of an international bestseller and series flagship- Covers more methods of attack and hacker secrets- Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books- Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials- A great addition to the bestselling "e;Hack Proofing..."e; series- Windows 2000 sales have surpassed those of Windows NT- Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp- Unrivalled web support at www.solutions@syngress.com

Cover 1
Table of Contents 14
Foreword v 1.0 30
Foreword v 1.5 32
Chapter 1 How To Hack 36
Chapter 2 The Laws of Security 46
Chapter 3 Classes of Attack 80
Chapter 4 Methodology 134
Chapter 5 Diffing 166
Chapter 6 Cryptography 200
Chapter 7 Unexpected Input 240
Chapter 8 Buffer Overflow 278
Chapter 9 Format Strings 354
Chapter 10 Sniffing 396
Chapter 11 Session Hijacking 442
Chapter 12 Spoofing: Attacks on Trusted Identity 478
Chapter 13 Tunneling 562
Chapter 14 Hardware Hacking 644
Chapter 15 Viruses, Trojan Horses, and Worms 690
Chapter 16 IDS Evasion 724
Chapter 17 Automated Security Review and Attack Tools 754
Chapter 18 Reporting Security Problems 784
Index 802
Related Titles 825

Erscheint lt. Verlag 26.3.2002
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Mathematik / Informatik Informatik Betriebssysteme / Server
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
ISBN-10 0-08-047816-6 / 0080478166
ISBN-13 978-0-08-047816-6 / 9780080478166
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99