Hack Attacks Denied: Complete Guide to Network LockDown

John Chirillo

  • 出版商: Wiley
  • 出版日期: 2001-04-02
  • 定價: $1,200
  • 售價: 3.3$399
  • 語言: 英文
  • 頁數: 512
  • 裝訂: Paperback
  • ISBN: 0471416258
  • ISBN-13: 9780471416258
  • 相關分類: 資訊安全駭客 Hack
  • 立即出貨(限量)

買這商品的人也買了...

相關主題

商品描述

Learn how to beat hackers at their own game
Hack Attacks Denied

If you’ve read John Chirillo’s provocative work,Hack Attacks Revealed, you’re well on your way to understanding how hackers view internetworking technologies, the techniques they use to exploit network security holes, and what you can do to recognize oncoming attacks.

Chirillo gives you step-by-step guidance on how to keep the hacks out of your network using the same powerful Tiger Box® tools that hackers use todetect and penetrate network vulnerabilities. Drawing on his experience as a consultant hired by Fortune 1000 companies to break into their corporate networks, Chirillo covers all the necessary security steps–from system to daemon–and helps you tie the information together to create a highly effective security policy.

Correlating each phase of this book to one described in Hack Attacks Revealed, Chirillo explains:

• Securing system infra-structure by protecting vulnerable ports and services, including well-known ports, concealed ports and services, and discovery countermeasures

• How to detect and protect against intrusion–from backdoor and flooding attacks to mail bombing, viral infections, and Web page hacking

• Essential technical hack countermeasures pertaining to popular gateways and routers, Internet server daemons, operating systems, and proxies and firewalls

商品描述(中文翻譯)

學習如何打敗駭客的遊戲
駭客攻擊被拒絕
如果你已經閱讀過約翰·奇里洛(John Chirillo)引人入勝的作品《揭示駭客攻擊》(Hack Attacks Revealed),你已經開始了解駭客如何看待互聯網技術,他們利用網絡安全漏洞的技巧,以及你可以做些什麼來識別即將發生的攻擊。
奇里洛提供了逐步指導,教你如何使用與駭客相同的強大Tiger Box®工具來防止駭客進入你的網絡,以檢測和滲透網絡漏洞。奇里洛以自己作為被財富1000強公司聘請來入侵其企業網絡的顧問的經驗,涵蓋了所有必要的安全步驟-從系統到守護進程-並幫助你將信息結合起來,創建一個高效的安全策略。
奇里洛將本書的每個階段與《揭示駭客攻擊》中描述的階段相對應,解釋了以下內容:
- 保護系統基礎設施,包括易受攻擊的端口和服務,包括知名端口、隱藏端口和服務,以及發現對策
- 如何檢測和防止入侵-從後門和洪水攻擊到郵件轟炸、病毒感染和網頁入侵
- 相關的技術防範措施,涉及流行的閘道器和路由器、互聯網服務器守護進程、操作系統以及代理和防火牆