Edition |
2nd ed |
Description |
xix,376 p : ill; 23 cm. |
Bibliography |
Includes index. |
Contents |
Ethics of hacking and cracking -- Reconnaissance -- Scanning tools -- Sniffers -- TCP/IP vulnerabilities -- Encryption and password cracking -- Spoofing -- Session hijacking -- Hacking network devices -- Trojan horses -- Denial-of-service attacks -- Buffer overflows -- Programming exploits -- Mail vulnerabilities -- Web application vulnerabilities -- Windows vulnerabilities -- UNIX/Linux vulnerabilities -- Incident handling. |
Summary |
Spotlighting the latest threats and vulnerabilities, this book is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks, equipping readers with the knowledge and techniques to successfully combat hackers. Also includes new emphasis on ethics and legal issues and readers are provided with a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this comprehensive resource teaches the skills needed to go from hoping a system is secure to knowing that it is |
Subject |
Computer networks -- Security measures
|
Added Author |
Basta, Nadine
|
|
Brown, Mary
|
ISBN |
9780840020932 |
|
0840020937 |
|