Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks

The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks

The Strategy behind Breaking into and Defending Networks

Dave Aitel, Susan Young

860 pages, parution le 19/01/2004

Résumé

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

This book is divided into three parts.
Part I introduces programming, protocol, and attack concepts.
Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable.
Part III details consolidation activities that hackers may use following penetration.
Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Sommaire

  • Introduction : the chess game
  • Foundation material
    • Case study in subversion
    • Know your opponent
    • Anatomy of an attack
    • Your defensive arsenal
  • Programming
    • IP and layer 2 protocols
    • The protocols
    • System and network penetration
    • Domain name server (DNS)
    • Directory services
    • Simple mail transfer protocol (SMTP)
    • Hypertext transfer protocol (HTTP)
    • Database hacking and security
    • Malware and viruses
    • Network hardware
  • Consolidation
    • Consolidating gains
    • After the fall
    • Conclusion
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Auerbach
Auteur(s) Dave Aitel, Susan Young
Parution 19/01/2004
Nb. de pages 860
Format 16 x 24
Couverture Relié
Poids 1370g
Intérieur Noir et Blanc
EAN13 9780849308888
ISBN13 978-0-8493-0888-8

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription