Search Books
Java Programming for Engine… Digital Color Imaging Handb…

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

Author Susan Young, Dave Aitel
Publisher Auerbach Publications
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
116.15 125.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $15.77

✓ Usually ships in 24 hours

Share:
Book Details
ISBN / ASIN0849308887
ISBN-139780849308888
AvailabilityUsually ships in 24 hours
Sales Rank692,615
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

This book is divided into three parts. Part I introduces programming, protocol, and attack concepts.  Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Each section provides a “path” to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View