Hacking Exposed: Network Security Secrets And Solutions

Author: Stuart McClure

Stock information

General Fields

  • : 109.95 NZD
  • : 9780072193817
  • : McGraw-Hill Education - Europe
  • : Osborne/McGraw-Hill
  • : Contains Paperback and CD-ROM
  • :
  • : 31 October 2001
  • : 235mm X 189mm X 46mm
  • : United States
  • : 109.95
  • :
  • :
  • :
  • : books

Special Fields

  • :
  • :
  • : Stuart McClure
  • : Hacking Exposed
  • : Mixed media product
  • : 3rd Revised edition
  • :
  • :
  • : 005.8
  • :
  • :
  • : 740
  • : Computer fraud & hacking; Data security & data encryption
  • : 200 illustrations
  • :
  • :
  • :
  • :
  • :
  • :
Barcode 9780072193817
9780072193817

Description

Learn in-depth insight into how hackers infiltrate e-business and how they can be stopped. The book contains updated hacks and countermeasures, including the latest denial of service attacks, email attacks, viruses, and Web hacks. There is also coverage of Windows XP Server.

Author description

George Kurtz (CISSP) is CEO/Founder, Stuart McClure (CISSP, CNE, CCSE) is President/Founder, and Joel Scambray (CISSP, CCSE) is Managing Principal of Foundstone, Inc., an elite security consulting and training company. George Kurtz (CISSP) is a renowned Black Hat speaker and an Ultimate Hacking instructor. The authors have written numerous technical articles, been interviewed by almost every major trade and business publication, and featured on such TV and radio as CNN, CNNFN, and ABC. Kurtz & McClure present Hacking Exposed Live while Scambray presents Hacking Exposed Windows 2000 at networking & security trade shows such as Networld + InterOp, RSA Security Conference, Black Hat, NetSec, CSI, SANS, USENIX, and others. Scambray, McClure & Kurtz are the authors of the first and second editions of Hacking Exposed and Kurtz is the co-author of Hacking Linux Exposed. Scambray is the author of Microsoft's "Ask Us About...Security" Monthly Column. http://www.Microsoft.com/technet/security/columns.asp

Table of contents

Part I: Casing the Establishment; Ch. 1: Footprinting; Ch. 2: Scanning; Ch. 3: Enumeration; Part II: System Hacking; Ch. 4: Hacking Windows 95/98, ME & Windows XP; Ch. 5: Hacking Windows NT; Ch. 6: Hacking Windows 2000/Windows XP Server; Ch. 7: Novell NetWare Hacking; Ch. 8: Hacking Unix/Linux; Part III: Network Hacking; Ch. 9: Dial-up, PBX, Voicemail, and VPN Hacking; Ch. 10: Network Devices; Ch. 11: Firewalls; Ch. 12: Denial of Service (DoS) Attacks; Part IV: Software Hacking; Ch. 13: Remote Control Insecurities; Ch. 14: Advanced Techniques; Ch. 15: Web Hacking; Ch. 16: Hacking the Internet User; Part V: Appendixes; Appendix A: Ports; Appendix B: Top 14 Security Vulnerabilities; Appendix C: About the Companion Web Site & CD-ROM