๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition

โœ Scribed by McClure, Stuart;Scambray, Joel


Book ID
127457181
Publisher
McGraw-Hill Professional Publishing;McGraw-Hill Osborne Media
Year
2008
Tongue
English
Weight
8 MB
Series
Hacking Exposed
Edition
3rd Edition
Category
Library
ISBN
007149426X

No coin nor oath required. For personal study only.

โœฆ Synopsis


The latest Windows security attack and defense strategies"Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors' and contributors' many years as security professionals hired to break into the world's largest IT infrastructures. Dramatically improve the security of Microsoft technology deployments of all sizes when you learn to: Establish business relevance and context for security by highlighting real-world risksTake a tour of the Windows security architecture from the hacker's perspective, exposing old and new vulnerabilities that can easily be avoidedUnderstand how hackers use reconnaissance techniques such as footprinting, scanning, banner grabbing, DNS queries, and Google searches to locate vulnerable Windows systems Learn how information is extracted anonymously from Windows using simple NetBIOS, SMB, MSRPC, SNMP, and Active Directory enumeration techniquesPrevent the latest remote network exploits such as password grinding via WMI and Terminal Server, passive Kerberos logon sniffing, rogue server/man-in-the-middle attacks, and cracking vulnerable servicesSee up close how professional hackers reverse engineer and develop new Windows exploitsIdentify and eliminate rootkits, malware, and stealth softwareFortify SQL Server against external and insider attacksHarden your clients and users against the latest e-mail phishing, spyware, adware, and Internet Explorer threats Deploy and configure the latest Windows security countermeasures, including BitLocker, Integrity Levels, User Account Control, the updated Windows Firewall, Group Policy, Vista Service Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and Address Space Layout Randomization


๐Ÿ“œ SIMILAR VOLUMES


Hacking Exposed: Network Security Secret
โœ Scambray, Joel;McClure, Stuart;Kurtz, George ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐ŸŒ English โš– 6 MB

The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET

Hacking exposed, network security secret
โœ Stuart McClure, George Kurtz, Joel Scambray ๐Ÿ“‚ Library ๐Ÿ“… 2000 ๐Ÿ› McGraw-Hill/OsborneMedia ๐ŸŒ English โš– 8 MB

New material! Contains more than 200 new pages of what customers want - in depth insight into how hackers infiltrate networks, and strategies to stop them. Also, brand new forword written by a prominent security expert. Hot topic - computer security is a huge topic in today's super-connected all-dig

Hacking Exposed Web 2.0: Web 2.0 Securit
โœ Rich Cannings, Himanshu Dwivedi, Zane Lackey ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› McGraw-Hill ๐ŸŒ English โš– 6 MB

Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, FacebookProtec