Hack proofing your network
โ Scribed by Ed Mitchell, Ido Dubrawsky, Wyman Miles, F. William Lynch, Syngress
- Publisher
- Syngress
- Year
- 2002
- Tongue
- English
- Leaves
- 826
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The only way to stop a hacker is to think like one! Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers. The fifth title in the popular series that brought us the bestseller Hack Proofing Your Network Teaches strategy and techniques using forensic-based analysis Up to the minute Web-based support with [email protected]
๐ SIMILAR VOLUMES
A new edition the most popular Hack Proofing book around!<br>IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including:<br>ยท The Politi
The book explains important terms like "smashing the stack, " "blind spoofing, " "building a backward bridge, " "steganography, " and "buffer overflow, " and why you need to worry about them. It also shows how to protect servers from attacks by using a five-step approach: Planning, Network/Machine R
A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: ะโะยท