Hackers Beware
Eric Cole
- 出版商: New Riders
- 出版日期: 2001-08-23
- 定價: $1,575
- 售價: 8.0 折 $1,260
- 語言: 英文
- 頁數: 800
- 裝訂: Paperback
- ISBN: 0735710090
- ISBN-13: 9780735710092
-
相關分類:
駭客 Hack
立即出貨(限量) (庫存=3)
買這商品的人也買了...
-
$2,610$2,480 -
$650$553 -
$2,510$2,385 -
$980$774 -
$970Introduction to Algorithms, 2/e
-
$1,150$1,127 -
$825Cisco CCNA Exam #640-607 Certification Guide, 3/e
-
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$720$569 -
$1,300$1,274 -
$1,650$1,568 -
$580$493 -
$490$387 -
$820$804 -
$2,340$2,223 -
$480$379 -
$750$593 -
$450$360 -
$890$703 -
$620$490 -
$990$782 -
$480$408 -
$880$581 -
$650$507 -
$450$351
相關主題
商品描述
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.
Table of Contents
1. Current State of the Industry.
2. Exploiting a System.
3. Defining an Exploit.
4. Exploits and the
3. three main areas of Information Security.
5. Information Gathering.
6. IP Spoofing.
7. Session Hijacking.
8. Denial of Service Attacks.
9. Buffer Overflows.
10. Password Attacks.
11. NT Password Crackers.
12. Unix Password Crackers.
13. How NT Exploits Work.
14. Exploits
for NT.
15. How Unix Exploits Work.
16. Exploits for Unix.
17.
Preserving Access.
18. Covering the Tracks.
19. Other Types of Attacks.
20. SANS Top 10.
21. Case Studies.
22. Summary.
Appendix A.
References.
Appendix B. Software on CD.
Appendix C. Additional Tools.
Appendix D. URLs and Mailing Lists.
商品描述(中文翻譯)
駭客小心從駭客的各個領域開始,但很快深入探討了特定攻擊的細節以及如何保護自己免受攻擊。由於我們聽到的大多數攻擊要麼發生在駭客手中,要麼被認為是駭客所為,人們對他們的攻擊技術非常感興趣。《駭客小心》的獨特之處在於它提供了具體的攻擊手法,以及它們的工作原理和如何保護自己免受攻擊。這本書將幫助讀者了解他們所面臨的安全威脅,以及他們需要做些什麼來保護自己。有些書籍僅從高層次上涵蓋這個問題,但並不深入探討具體的攻擊手法,也不以案例方式進行介紹。這本書將全面介紹這個問題。它不僅描述了攻擊手法的工作原理,還介紹了攻擊的特徵,以及在網絡上應該注意什麼以及如何保護自己。
目錄
1. 行業的現狀。
2. 利用系統漏洞。
3. 定義漏洞。
4. 漏洞和信息安全的三個主要領域。
5. 收集信息。
6. IP欺騙。
7. 會話劫持。
8. 拒絕服務攻擊。
9. 緩衝區溢出。
10. 密碼攻擊。
11. NT密碼破解器。
12. Unix密碼破解器。
13. NT漏洞的工作原理。
14. NT的漏洞。
15. Unix漏洞的工作原理。
16. Unix的漏洞。
17. 保持訪問權限。
18. 隱藏蹤跡。
19. 其他類型的攻擊。
20. SANS十大攻擊。
21. 案例研究。
22. 總結。
附錄A. 參考資料。
附錄B. 光碟上的軟體。
附錄C. 附加工具。
附錄D. 網址和郵件列表。