Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit - Couverture souple

Chirillo, John

 
9780471416241: Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

Synopsis

Network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. This book describes in detail the tools and techniques used by network hackers and how they work to exploit security loopholes.

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

Quatrième de couverture

Beat hackers at their own game – The world of a hacker revealed by a corporate hack master
Hack Attacks Revealed

Take a technogothic journey inside the world of a hacker as seen by security expert John Chirillo. Drawing on his own experience as a hacking consultant for Fortune 1000 companies, Chirillo shows how hackers can exploit network security holes and how you can recognize an oncoming threat to your security. The book features details of the powerful Tiger Box(r) system, used by hackers to penetrate vulnerable networks, and teaches you how to use that same tool to your advantage.

In this highly provocative work, you′ll discover:

? The hacker′s perspective on networking protocols and communication technologies

? A complete hacker′s technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks

? Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities

? Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks

Revue de presse

"Hack Attacks Revealed completely blows the other security books out of the water. It was the book I was looking for when I bought all the others!"
(Kelly M. Larsen , C2Protect, DoD Security Instructor)

"Speaking for the Air Force Computer Emergency Response Team, these books vastly facilitate our operations involving intrusion detection, incident response, and vulnerability assessment of Air Force automated information systems."
(L. Peterson, AFCERT)

"[Hack Attacks Denied] is quite extensive in providing the information that the users may need to prevent hack attacks." (HiTech Review)

"Whoever "you" are––sysadmin, internetworking engineer, or hacker (disaffected or otherwise), you′ll find that Chirillo is selling authentic goods." (Bill Camarda, Slashdot)

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.