eBooks-it.org Logo
eBooks-IT.org Inner Image

Practical Hacking Techniques and Countermeasures

Practical Hacking Techniques and Countermeasures Image

Book Details:

Publisher:Auerbach Publications
Series: CRC Press , Practical
Author:Mark D. Spivey
Edition:1
ISBN-10:0849370574
ISBN-13:9780849370571
Pages:752
Published:Nov 02 2006
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:143.97 MB

Book Description:

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws.Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks.Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

Download Link:

Related Books:

Programming Windows Workflow Foundation

Practical WF Techniques and Examples using XAML and C#
Programming Windows Workflow Foundation Image
A fast-paced and practical developer's road map to working with Windows WF, from compilation to the base activity library to runtime services. This book is for .NET developers who want to enhance their applications with flexible workflow capabilities using Microsoft Windows Workflow Foundation. The author assumes that you have read other texts on the overall architecture of WF and on WF application design strategies, and instead focuses on real-work implementation issues for C# developers....

Hacking VoIP

Protocols, Attacks, and Countermeasures
Hacking VoIP Image
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to...

The Basics of Web Hacking

Tools and Techniques to Attack the Web
The Basics of Web Hacking Image
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities. The Basics of Web Hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as...



2007 - 2021 © eBooks-IT.org