No Words Wasted Sale
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    The Powell's Playlist | January 15, 2015

    Mary Helen Specht: IMG The Powell's Playlist: Mary Helen Specht



    Migratory Animals is mostly set in Texas during the first years of the most recent recession, when the cast of characters — an eclectic group... Continue »
    1. $10.49 Sale Trade Paper add to wish list

      Migratory Animals (P.S.)

      Mary Helen Specht 9780062346032

    spacer

On Order

$40.50
New Trade Paper
Currently out of stock.
Add to Wishlist
available for shipping or prepaid pickup only
Qty Store Section
- Local Warehouse Networking- Computer Security

Hackers Beware: The Ultimate Guide to Network Security

by

Hackers Beware: The Ultimate Guide to Network Security Cover

 

Synopses & Reviews

Publisher Comments:

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.

Book News Annotation:

This is the "golden age of hacking" according to Cole, a former CIA employee now with the SANS (System Administration, Networking, and Security) Institute. He discusses trends, spoofing vs. highjacking, UNIX and Microsoft NT vulnerabilities, and protection against computer attacks. References include Internet URLs with information on hacking, network security, and other aspects of security. A companion website offers updates.
Annotation c. Book News, Inc., Portland, OR (booknews.com)

Synopsis:

"Hackers Beware" is intended for the intermediate to advanced networker who wants to understand hackers who have the ability to render their network helpless. By learning the whys and hows of hackers, security novices will be able to protect themselves.

About the Author

Eric Cole has worked in the information security arena for over 10 years. He is certified as a CISSP, MCSE and CCNA. Eric is very involved with the SANS Institute. He is in charge of the SANS Level One notebook, an instructor of hacking courses, and a member of the CVE (Common Vulnerabilities and Exposure) editorial board. Eric has extensive experience in the security and hacking area and devotes a lot of time to performing penetration testing for various clients. These clients range from banks, to hospitals, to health care providers, to large construction companies. Eric has also spent several years at the CIA performing security testing and red teaming. He is currently an adjunct professor at Georgetown University and has taught at NYIT.

Table of Contents

 1. Current State of the Industry.

 2. Exploiting a System.

 3. Defining an Exploit.

 4. Exploits and the 3. three main areas of Information Security.

 5. Information Gathering.

 6. IP Spoofing.

 7. Session Hijacking.

 8. Denial of Service Attacks.

 9. Buffer Overflows.

10. Password Attacks.

11. NT Password Crackers.

12. Unix Password Crackers.

13. How NT Exploits Work.

14. Exploits for NT.

15. How Unix Exploits Work.

16. Exploits for Unix.

17. Preserving Access.

18. Covering the Tracks.

19. Other Types of Attacks.

20. SANS Top 10.

21. Case Studies.

22. Summary.

Appendix A. References.

Appendix B. Software on CD.

Appendix C. Additional Tools.

Appendix D. URLs and Mailing Lists.

Product Details

ISBN:
9780735710092
Editor:
Cole, Eric
Publisher:
Sams
Author:
Cole, Eric
Location:
Indianapolis, Ind.
Subject:
Networking - General
Subject:
Computer networks
Subject:
Computers
Subject:
Computer security
Subject:
Security
Subject:
Computer hackers
Subject:
Electronic information resources.
Subject:
Firewalls
Subject:
Security - General
Subject:
Networking-Computer Security
Copyright:
Edition Number:
1st ed.
Edition Description:
Trade paper
Series:
NRG - Voices
Series Volume:
no. 99-31
Publication Date:
August 2001
Binding:
TRADE PAPER
Grade Level:
General/trade
Language:
English
Illustrations:
Yes
Pages:
800
Dimensions:
8.9 x 6.9 x 1.7 in 1116 gr

Other books you might like

  1. Internet Cryptography New Trade Paper $41.75
  2. Information Hiding Techniques for...
    New Hardcover $124.50
  3. Advances in Information Security... New Hardcover $180.25
  4. XML Schema Used Trade Paper $9.95

Related Subjects

Computers and Internet » Internet » General
Computers and Internet » Internet » Information
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General

Hackers Beware: The Ultimate Guide to Network Security New Trade Paper
0 stars - 0 reviews
$40.50 Backorder
Product details 800 pages Sams - English 9780735710092 Reviews:
"Synopsis" by , "Hackers Beware" is intended for the intermediate to advanced networker who wants to understand hackers who have the ability to render their network helpless. By learning the whys and hows of hackers, security novices will be able to protect themselves.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.