Code Hacking
A Developer's Guide To Network Security
Richard Conway, Julian Cordingley - Collection Networking Series
Résumé
See your code through the eye of a hacker!
Code Hacking: A Developer's Guide to Network Security provides a hands-on approach to learning vital security skills needed to protect your systems. It details the software and techniques hackers use and provides practical insights on what is really important in understanding hacking issues. The book cuts through the cursory issues and quickly delves into the essentials at a code and implementation level. It teaches users how to write and use scanners, sniffers, exploits, and helps developers write network security test harnesses for application and infrastructure. In addition, it explains how to create passive defense strategies to collect data on hackers, as well as how to use active defense strategies through techniques such as penetration testing.
Unlike other books on hacking, Code Hacking covers hacking issues using a variety of languages. Software explanations and code samples are provided in C#, C++, Java, and Perl, allowing developers to learn from a variety of perspectives. The companion CD-ROM contains a custom security scanner written in C#. This scanner is a combination of a port and vulnerability scanner that scans IP addresses, allows certain services to be "brute forced,"and exploits well-known vulnerabilities. By knowing how to hack a system you'll be better prepared to secure your own.
KEY FEATURES
- Covers the essential issues of network security, including firewalls, DMZ & NAT architecture, authentication, encryption, Web hacking, application hacks, operating system vulnerabilities, writing exploits, and wireless LANs
- Outlines hacking techniques and software, and provides a history of hacking with the appropriate context for the evolution in code applications, and exploits
- Provides software explanations and code examples in C#, Perl, Java, and C++
L'auteur - Julian Cordingley
Julian Cordingley (Surrey, England) is a full time consultant specializing in security and distributed applications. He is the Chief Technical Security Architect for the central UK governmentís eGovernment Initiatives, and advises on Technical Architecture issues.
Sommaire
- Introduction
- Networking
- Tools of the Trade
- Encryption and Password Cracking
- Hacking the Web
- Cracks, Hacks, and Counterattacks
- Firewalls
- Passive Defense
- Wireless Networking
- Appendix A About the CD-ROM
- Appendix B GNU General public License
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Charles River Media |
Auteur(s) | Richard Conway, Julian Cordingley |
Collection | Networking Series |
Parution | 05/07/2004 |
Nb. de pages | 386 |
Format | 18,5 x 23,5 |
Couverture | Broché |
Poids | 830g |
Intérieur | Noir et Blanc |
EAN13 | 9781584503149 |
ISBN13 | 978-1-58450-314-9 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet