The Hacker's Handbook: The Strategy behind Breaking into and Defending Networks
The Strategy behind Breaking into and Defending Networks
Résumé
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.
This book is divided into three parts.
Part I introduces programming, protocol, and attack concepts.
Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable.
Part III details consolidation activities that hackers may use following penetration.
Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.
Sommaire
- Introduction : the chess game
- Foundation material
- Case study in subversion
- Know your opponent
- Anatomy of an attack
- Your defensive arsenal
- Programming
- IP and layer 2 protocols
- The protocols
- System and network penetration
- Domain name server (DNS)
- Directory services
- Simple mail transfer protocol (SMTP)
- Hypertext transfer protocol (HTTP)
- Database hacking and security
- Malware and viruses
- Network hardware
- Consolidation
- Consolidating gains
- After the fall
- Conclusion
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Auerbach |
Auteur(s) | Dave Aitel, Susan Young |
Parution | 19/01/2004 |
Nb. de pages | 860 |
Format | 16 x 24 |
Couverture | Relié |
Poids | 1370g |
Intérieur | Noir et Blanc |
EAN13 | 9780849308888 |
ISBN13 | 978-0-8493-0888-8 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet