New material! Contains more than 200 new pages of what customers want - in depth insight into how hackers infiltrate networks, and strategies to stop them. Also, brand new forword written by a prominent security expert. Hot topic - computer security is a huge topic in today's super-connected all-dig
Hacking Exposed: Network Security Secrets & Solutions, Third Edition (Hacking Exposed)
โ Scribed by Scambray, Joel;McClure, Stuart;Kurtz, George
- Book ID
- 127447065
- Year
- 2001
- Tongue
- English
- Weight
- 6 MB
- Edition
- 3
- Category
- Library
- ISBN
- 0072193816
No coin nor oath required. For personal study only.
โฆ Synopsis
The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET Server (code named Whistler), and IIS 5 - plus a whole lot more!Features:Hacking Exposed, Third Edition is the revision of the #1 security book on the market!Includes a new CD-Based on customer demand, there will be a bonus CD-ROM with this edition. It will contain an electronic outline of the book with live links to all of the tools, and a password database with a list of default passwordsCompletely revised to include the latest hacks and countermeasures, including the recent denial of service attacks, email attacks, viruses, & Web hacks. Also includes coverage of the new version of Windows Whistler Server.Expert authors-security experts, keynote speakers, and instructors for worldwide security conferences where they give a Hacking Exposed Live!
๐ SIMILAR VOLUMES
The latest Windows security attack and defense strategies"Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world mali
Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, FacebookProtec
If you have a vulnerable computer attached to the BIG BAD INTERNET, sooner or later your box will be compromised. Notice I prefer the term compromised to hacked. Hacking is a benign activity. You hack out of curiosity and [hopefully] with prior permission. Can this be done? Can I get into this box?
Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers devi