eBooks-it.org Logo
eBooks-IT.org Inner Image

The Hacker's Handbook

The Strategy Behind Breaking Into and Defending Networks

The Hacker's Handbook Image

Book Details:

Publisher:Auerbach Publications
Series: CRC Press , Handbook
Author:Susan Young
Edition:1
ISBN-10:0849308887
ISBN-13:9780849308888
Pages:896
Published:Nov 24 2003
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:18.07 MB

Book Description:

The Hackers Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a path to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Download Link:

Related Books:

Gray Hat Hacking

The Ethical Hacker's Handbook
Gray Hat Hacking Image
2nd Edition
A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in. --Bruce Potter, Founder, The Shmoo GroupVery highly recommended whether you are a seasoned professional or just starting out in the security business. --Simple Nomad, Hacker...

The Mac Hacker's Handbook

The Mac Hacker's Handbook Image
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating systemand how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't, and how to best handle those weaknesses....

The Database Hacker's Handbook

Defending Database Servers
The Database Hacker's Handbook Image
Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server* Learn the best defenses for IBM's DB2(r), Postgre...



2007 - 2021 © eBooks-IT.org