Hacking Exposed Ser.: Hacking Exposed 5th Edition : Network Security Secrets and Solutions by Joel Scambray, Stuart McClure and George Kurtz (2005, Trade Paperback)
nonastiching (378)
100% positive Bewertungen
Preis:
US $72,84
(inkl. MwSt.)
Ca.CHF 58,31
+ $37,27 Versand
Lieferung ca. Di, 16. Sep - Mi, 24. SepLieferung ca. Di, 16. Sep - Mi, 24. Sep
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen. Bedingungen variieren je nach Versandservice.
Table Of Content"A must-read for anyone in security…. One of the best security books available." --Tony Bradley, CISSP, About.com "Authoritative….Even readers of earlier editions will find critical new insight on the more modern attacks." --From the Foreword by Gene Hodges, President of McAfee "A cross between a spy novel and a tech manual." --Mark A. Kellner,Washington Times "The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure." -Bill Machrone,PC Magazine "With every edition this book keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course on the subject." -Mirko Zorz, Net-security.org The fifth edition of this world-renowned security reference offers completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using the provenHacking Exposedmethodology, the book shows you, step by step, how to locate and patch system vulnerabilities and explains what you need to know to stay vigilant in today's 24x7 digital world.New and Updated Material: New chapter on hacking code, with contributions by Michael Howard, covering the ways flaws get introduced into software and how best to prevent them New Windows hacks including RPCSS (Blaster), LSASS (Sasser), and PCT (Download.ject) buffer overflow exploits Updated denial of service chapter with descriptions of large scale zombie attacks and practical countermeasures Coverage of new web hacking tools and techniques including HTTP response splitting and automated vulnerability scanners New content on remote connectivity including VoIP hacking New coverage of web and e-mail client hacking, including the latest Internet Explorer exploits, phishing, spyware, rootkits, and bots New hacks and countermeasures using Google as a reconnaissance tool An updated footprinting chapter that deals with changes regarding finding information from Internet databases Brand new case studies covering relevant and timely security attacks including Google, wireless, UNIX/Linux, and Mac OS X hacks
Edition DescriptionRevised edition
SynopsisUsing real-world case studies, this work shows IT professionals how to protect computers and networks against the security vulnerabilities. It provides detailed examples of devious break-ins and helps you learn how to think like a hacker in order to thwart attacks. It also covers code hacking methods and countermeasures.