Normal view MARC view ISBD view

Hacking exposed : network security secrets and solutions / Stuart McClure, Joel Scambray and George Kurtz

By: McClure, Stuart.
Contributor(s): Kurtz, George [(j.a.)] | Scambray, Joel [(j.a.)].
Publisher: New York : Osborne/McGraw-Hill, c2001Edition: 3rd ed.Description: xxviii, 729 p. : ill. ; 24 cm. + 1 electronic optical disc (CD-ROM) (4 3/4 in.).ISBN: 0072193816.Subject(s): Computer networks -- Security measures | Data protectionDDC classification: 005.8
Contents:
Foreword. - Commentary on the State of Network Security. - Acknowledgements. - Introduction. - Pt.1. Casing the establishment. 1. Footprinting. 2. Scanning. 3. Enumeration. - Pt.II. System Hacking. 4. Hacking Windows 95/98, Me, and XP Home Edition. 5. Hacking Windows NT. 6. Hacking Windows 2000. 7. Novell Netware Hacking. 8. Hacking UNIX. - Pt.III. Network Hacking. 9. Dial-Up, PBX, Voicemail, and VPN Hacking. 10. Network Devices. 11. Firewalls. 12. Denial of Service (DoS) Attacks. - Pt.IV. Software Hacking. 13. Remote Control Insecurities. 14. Advanced Techniques. 15. Web Hacking. 16. Hacking the Internet User. - Pt.V. Appendixes. - A. Ports. B. Top 14 Security Vulnerabilities. - Index.
Item type Current location Call number Vol info Copy number Status Notes Date due Barcode Remark
Accompanying Material (Media Resource) TU External Storage-LCS
005.8 MAC (Browse shelf) CD-ROM 1 Available SOCIT,15009,03,GR 1000116617 Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1

Foreword. - Commentary on the State of Network Security. - Acknowledgements. - Introduction. - Pt.1. Casing the establishment. 1. Footprinting. 2. Scanning. 3. Enumeration. - Pt.II. System Hacking. 4. Hacking Windows 95/98, Me, and XP Home Edition. 5. Hacking Windows NT. 6. Hacking Windows 2000. 7. Novell Netware Hacking. 8. Hacking UNIX. - Pt.III. Network Hacking. 9. Dial-Up, PBX, Voicemail, and VPN Hacking. 10. Network Devices. 11. Firewalls. 12. Denial of Service (DoS) Attacks. - Pt.IV. Software Hacking. 13. Remote Control Insecurities. 14. Advanced Techniques. 15. Web Hacking. 16. Hacking the Internet User. - Pt.V. Appendixes. - A. Ports. B. Top 14 Security Vulnerabilities. - Index.