Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks, The

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hackin...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Những tác giả chính: Aitel, Dave, Young, Susan
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1333
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1333
record_format dspace
spelling oai:scholar.dlu.edu.vn:DLU123456789-13332009-11-27T08:28:36Z Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks, The Aitel, Dave Young, Susan The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets. Preface FOUNDATION MATERIAL * Case Study in Subversion * Know Your Opponent * Anatomy of an Attack * Your Defensive Arsenal * Programming * The Protocols (TCP/IP) (OSI Layers 2-3) * The Protocols (TCP/IP) (OSI Layers 4-7) SYSTEM AND NETWORK PENETRATION * Domain Name Service (DNS) * Directory Services * Simple Mail Transfer Protocol (SMTP) * Hypertext Transfer Protocol (HTTP) * Database Hacking * Malware * Network Hardware CONSOLIDATION * Consolidating Gains * After the Fall * Conclusion 2009-11-27T08:28:36Z 2009-11-27T08:28:36Z 2003 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1333 en application/octet-stream CRC Press
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.
format Book
author Aitel, Dave
Young, Susan
spellingShingle Aitel, Dave
Young, Susan
Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks, The
author_facet Aitel, Dave
Young, Susan
author_sort Aitel, Dave
title Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks, The
title_short Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks, The
title_full Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks, The
title_fullStr Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks, The
title_full_unstemmed Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks, The
title_sort hacker's handbook: the strategy behind breaking into and defending networks, the
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1333
_version_ 1757670728419770368