- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
Currently out of stock.
available for shipping or prepaid pickup only
The Hacker's Handbookby J. Burke Hansen
Synopses & Reviews
The Hacker 's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.
This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.
Each section provides a path to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.
Book News Annotation:
For computer network administrators trying to keep a step ahead of hackers, U.S. security experts who work with the public and private sectors provide in-depth coverage of defensive and offensive hardware and software strategies for playing what they view as a chess game to foil unauthorized penetration of databases and such. They provide case studies, an anatomy of attack framework, and an explanation of hacker ethics. The Web sites references come with the warning to approach unknown sites with caution. Distributed by CRC.
Annotation ©2004 Book News, Inc., Portland, OR (booknews.com)
Hackers' profiles, motivations, tricks, techniques, tools, methodologies, and strategies are revealed in this guide. It also discusses known system vulnerabilities and details how to mount countermeasures fast.
Know your enemy. The best defense is a good offense. These adages have stood the test of time. As recent attacks have demonstrated, organizations are virtually helpless against most hacker, industrial espionage, or information terrorist attacks. The Hacker's Handbook presents an organized profile of these enemies of the commonwealth. It explains who they are, what they do, and how they do it. It details the tools they use and what they look like when they use them. It discusses effective countermeasures and how to deploy them quickly. By knowing how the bad guys think, or better yet, thinking like the bad guys, the good guys can start to turn the tide of battle.
-- Provides an organized physiological and sociological profile of the Hacker
-- Includes explicit instructions describing how hackers use techniques and tools to break into systems from both the inside and outside
-- Examines changing the focus of the IT admin's priorities and points to a more effective security philosophy
-- Addresses the "it can't happen to me thought process" at work and at home
-- Explores how to develop an offensive and defensive game plan and provides the tools to make it effective
What Our Readers Are Saying
Other books you might like
Computers and Internet » Networking » Computer Security