Normal view MARC view ISBD view

Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis

By: Skoudis, Ed.
Series: Prentice Hall series in computer networking and distributed systems / Radia Perlman, series editor. Publisher: Upper Saddle River, N.J. : Prentice Hall PTR, c2002Description: xxii, 564 p. : ill. ; 23 cm.ISBN: 0130332739.Subject(s): Computer networks -- Security measures | Data protectionDDC classification: 005.8
Contents:
Foreword. - Preface. - Ch. 1 Introduction. - Ch. 2. Networking Overview: Pretty Much Everything You Need to Know about TCP/IP to Follow the Rest of This Book, in 55 Pages or Less. - Ch. 3. UNIX Overview: Pretty Much Everything You Need to Know about UNIX to Follow the Rest of This Book, in 30 Pages or Less. - Ch. 4. Windows NT/2000 Overview : Pretty Much Everything You Need to Know about Windows to Follow the Rest of This Book, in 40 Pages or Less. - Ch. 5. Phase 1: Reconnaissance. - Ch. 6. Phase 2 : Scanning. - Ch. 7. Phase 3 : Gaining Access Using Application and Operating System Attacks. - Ch. 8. Phase 3 : Gaining Access Using Network Attacks. - Ch. 9. Phase 3 : Denial-of-Service Attacks. - Ch. 10. Phase 4 : Maintaining Access : Trojans, Backdoors, and RootKits ... Oh My! - Ch. 11. Phase 5 : Covering Tracks and Hiding. - Ch. 12. Putting It All Together : Anatomy of an Attack. - Ch. 13. The Future, Resources, and Conclusions. - Glossary. - Index.
Item type Current location Call number Copy number Status Notes Date due Barcode
Main Collection Taylor's Library-TU
005.8 SKO (Browse shelf) 1 Available SOCIT,15009,03,GR 5000040909

Foreword. - Preface. - Ch. 1 Introduction. - Ch. 2. Networking Overview: Pretty Much Everything You Need to Know about TCP/IP to Follow the Rest of This Book, in 55 Pages or Less. - Ch. 3. UNIX Overview: Pretty Much Everything You Need to Know about UNIX to Follow the Rest of This Book, in 30 Pages or Less. - Ch. 4. Windows NT/2000 Overview : Pretty Much Everything You Need to Know about Windows to Follow the Rest of This Book, in 40 Pages or Less. - Ch. 5. Phase 1: Reconnaissance. - Ch. 6. Phase 2 : Scanning. - Ch. 7. Phase 3 : Gaining Access Using Application and Operating System Attacks. - Ch. 8. Phase 3 : Gaining Access Using Network Attacks. - Ch. 9. Phase 3 : Denial-of-Service Attacks. - Ch. 10. Phase 4 : Maintaining Access : Trojans, Backdoors, and RootKits ... Oh My! - Ch. 11. Phase 5 : Covering Tracks and Hiding. - Ch. 12. Putting It All Together : Anatomy of an Attack. - Ch. 13. The Future, Resources, and Conclusions. - Glossary. - Index.