Skoudis, Ed.

Counter hack : a step-by-step guide to computer attacks and effective defenses / Ed Skoudis - Upper Saddle River, N.J. : Prentice Hall PTR, c2002 - xxii, 564 p. : ill. ; 23 cm. - Prentice Hall series in computer networking and distributed systems / Radia Perlman, series editor .

Foreword. - Preface. - Ch. 1 Introduction. - Ch. 2. Networking Overview: Pretty Much Everything You Need to Know about TCP/IP to Follow the Rest of This Book, in 55 Pages or Less. - Ch. 3. UNIX Overview: Pretty Much Everything You Need to Know about UNIX to Follow the Rest of This Book, in 30 Pages or Less. - Ch. 4. Windows NT/2000 Overview : Pretty Much Everything You Need to Know about Windows to Follow the Rest of This Book, in 40 Pages or Less. - Ch. 5. Phase 1: Reconnaissance. - Ch. 6. Phase 2 : Scanning. - Ch. 7. Phase 3 : Gaining Access Using Application and Operating System Attacks. - Ch. 8. Phase 3 : Gaining Access Using Network Attacks. - Ch. 9. Phase 3 : Denial-of-Service Attacks. - Ch. 10. Phase 4 : Maintaining Access : Trojans, Backdoors, and RootKits ... Oh My! - Ch. 11. Phase 5 : Covering Tracks and Hiding. - Ch. 12. Putting It All Together : Anatomy of an Attack. - Ch. 13. The Future, Resources, and Conclusions. - Glossary. - Index.

0130332739


Computer networks--Security measures.
Data protection.

005.8 / SKO