Young / Aitel | The Hacker's Handbook | E-Book | sack.de
E-Book

E-Book, Englisch, 896 Seiten

Young / Aitel The Hacker's Handbook

The Strategy Behind Breaking into and Defending Networks
1. Auflage 2003
ISBN: 978-1-135-51654-3
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

The Strategy Behind Breaking into and Defending Networks

E-Book, Englisch, 896 Seiten

ISBN: 978-1-135-51654-3
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts.  Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a “path” to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Young / Aitel The Hacker's Handbook jetzt bestellen!

Zielgruppe


Top level managers and managers and staff involved in network security, network administration, data communications, telecommunications, LAN/WAN network applications, network/systems integration, network engineering


Autoren/Hrsg.


Weitere Infos & Material


Preface
FOUNDATION MATERIAL
Case Study in Subversion
Know Your Opponent
Anatomy of an Attack
Your Defensive Arsenal
Programming
The Protocols (TCP/IP) (OSI Layers 2-3)
The Protocols (TCP/IP) (OSI Layers 4-7)
SYSTEM AND NETWORK PENETRATION
Domain Name Service (DNS)
Directory Services
Simple Mail Transfer Protocol (SMTP)
Hypertext Transfer Protocol (http)
Database Hacking
Malware
Network Hardware
CONSOLIDATION
Consolidating Gains
After the Fall
Conclusion



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.