Hacking exposed : network security secrets & solutions / Joel Scambray, Stuart McClure, George Kurtz
By: Scambray, Joel.
Contributor(s): Kurtz, George [(j.a.)] | McClure, Stuart [(j.a.)].
Publisher: Berkeley, Calif. : Osborne/McGraw-Hill, c2001Edition: 2nd ed.Description: xxix, 703 p. ; 24 cm.ISBN: 0072127481.Subject(s): Computer networks -- Security measures | Computer securityDDC classification: 005.8Item type | Current location | Call number | Copy number | Status | Notes | Date due | Barcode | Remark |
---|---|---|---|---|---|---|---|---|
Main Collection | TC External Storage | 005.8 SCA (Browse shelf) | 1 | Available | GENxx,GENxx,03,GR | 5000064368 | Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1 |
McClure's name appears first on the previous edition
Foreword. - Acknowledgments. - Introduction. - Pt. 1. Casing the Establishment. Case Study: Target Acquisition. 1. Footprinting. 2. Scanning. 3. Enumeration. - Pt. II. System Hacking. Case Study: Know Your Enemy. 4. Hacking Windows 95/98 and ME. 5. Hacking Windows NT. 6. Hacking Windows 2000. 7. Novell NetWare Hacking. 8. Hacking UNIX. - Pt. III. Case Study: Sweat the Small Stuff! 9. Dial-Up, PBX, Voicemail, and VPN Hacking. 10. Network Devices. 11. Firewalls. 12. Denial of Service (DoS) Attacks. - Pt. 1V. Software Hacking. Case Study: Using All the Dirty Tricks to Get In. 13. Remote Control Insecurities. 14. Advanced Techniques. 15. Web Hacking. 16. Hacking the Internet User. - Pt. V. Appendixes. A. Ports. B. Top 14. Security Vulnerabilities. C: About the Companion Web Site. - Index.
"Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more depth insight into how hackers infiltrate e-business and how they can be stopped. Security insiders Joel Scambray, Stuart McClure, and George Kurtz present more than 220 all-new pages of technical detail and case studies in an easy-to-follow style. The world of internet security moves faster than the digital economy, and all of the brand-new tools and techniques that have surfaced since the publication of the best-selling first edition are covered here. Use the real-world counter measures in this one-of-a-kind volume to plug the holes in your network today- before they end up in the headlines tomorrow." - Back cover.
Computer programming, programs & data