Normal view MARC view ISBD view

Hacking exposed : network security secrets & solutions / Joel Scambray, Stuart McClure, George Kurtz

By: Scambray, Joel.
Contributor(s): Kurtz, George [(j.a.)] | McClure, Stuart [(j.a.)].
Publisher: Berkeley, Calif. : Osborne/McGraw-Hill, c2001Edition: 2nd ed.Description: xxix, 703 p. ; 24 cm.ISBN: 0072127481.Subject(s): Computer networks -- Security measures | Computer securityDDC classification: 005.8
Contents:
Foreword. - Acknowledgments. - Introduction. - Pt. 1. Casing the Establishment. Case Study: Target Acquisition. 1. Footprinting. 2. Scanning. 3. Enumeration. - Pt. II. System Hacking. Case Study: Know Your Enemy. 4. Hacking Windows 95/98 and ME. 5. Hacking Windows NT. 6. Hacking Windows 2000. 7. Novell NetWare Hacking. 8. Hacking UNIX. - Pt. III. Case Study: Sweat the Small Stuff! 9. Dial-Up, PBX, Voicemail, and VPN Hacking. 10. Network Devices. 11. Firewalls. 12. Denial of Service (DoS) Attacks. - Pt. 1V. Software Hacking. Case Study: Using All the Dirty Tricks to Get In. 13. Remote Control Insecurities. 14. Advanced Techniques. 15. Web Hacking. 16. Hacking the Internet User. - Pt. V. Appendixes. A. Ports. B. Top 14. Security Vulnerabilities. C: About the Companion Web Site. - Index.
Summary: "Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more depth insight into how hackers infiltrate e-business and how they can be stopped. Security insiders Joel Scambray, Stuart McClure, and George Kurtz present more than 220 all-new pages of technical detail and case studies in an easy-to-follow style. The world of internet security moves faster than the digital economy, and all of the brand-new tools and techniques that have surfaced since the publication of the best-selling first edition are covered here. Use the real-world counter measures in this one-of-a-kind volume to plug the holes in your network today- before they end up in the headlines tomorrow." - Back cover.
Item type Current location Call number Copy number Status Notes Date due Barcode Remark
Main Collection TC External Storage
005.8 SCA (Browse shelf) 1 Available GENxx,GENxx,03,GR 5000064368 Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1

McClure's name appears first on the previous edition

Foreword. - Acknowledgments. - Introduction. - Pt. 1. Casing the Establishment. Case Study: Target Acquisition. 1. Footprinting. 2. Scanning. 3. Enumeration. - Pt. II. System Hacking. Case Study: Know Your Enemy. 4. Hacking Windows 95/98 and ME. 5. Hacking Windows NT. 6. Hacking Windows 2000. 7. Novell NetWare Hacking. 8. Hacking UNIX. - Pt. III. Case Study: Sweat the Small Stuff! 9. Dial-Up, PBX, Voicemail, and VPN Hacking. 10. Network Devices. 11. Firewalls. 12. Denial of Service (DoS) Attacks. - Pt. 1V. Software Hacking. Case Study: Using All the Dirty Tricks to Get In. 13. Remote Control Insecurities. 14. Advanced Techniques. 15. Web Hacking. 16. Hacking the Internet User. - Pt. V. Appendixes. A. Ports. B. Top 14. Security Vulnerabilities. C: About the Companion Web Site. - Index.

"Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more depth insight into how hackers infiltrate e-business and how they can be stopped. Security insiders Joel Scambray, Stuart McClure, and George Kurtz present more than 220 all-new pages of technical detail and case studies in an easy-to-follow style. The world of internet security moves faster than the digital economy, and all of the brand-new tools and techniques that have surfaced since the publication of the best-selling first edition are covered here. Use the real-world counter measures in this one-of-a-kind volume to plug the holes in your network today- before they end up in the headlines tomorrow." - Back cover.

Computer programming, programs & data